CN116978150A - Intelligent lock control method, device and system - Google Patents
Intelligent lock control method, device and system Download PDFInfo
- Publication number
- CN116978150A CN116978150A CN202311239144.8A CN202311239144A CN116978150A CN 116978150 A CN116978150 A CN 116978150A CN 202311239144 A CN202311239144 A CN 202311239144A CN 116978150 A CN116978150 A CN 116978150A
- Authority
- CN
- China
- Prior art keywords
- state
- shortcut
- intelligent lock
- verification code
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012795 verification Methods 0.000 claims description 297
- 230000008859 change Effects 0.000 claims description 38
- 230000004044 response Effects 0.000 claims description 25
- 238000012544 monitoring process Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 238000011112 process operation Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000015654 memory Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to the technical field of intelligent lock password authentication and discloses an intelligent lock control method, device and system.
Description
Technical Field
The invention relates to the technical field of intelligent lock password authentication, in particular to an intelligent lock control method, an intelligent lock control device and an intelligent lock control system.
Background
In recent years, with the popularization of intelligent locks, various intelligent locks have come into households of residents, people have also become accustomed to using the intelligent locks in daily life, for example, intelligent door locks, as a guard for home security care, have become products just needed for resident purchase, and with the popularization of intelligent door locks, particularly when others need to use the intelligent door locks to enter and exit the households, how to use the intelligent door locks safely and conveniently has become important.
The existing mode of sharing the intelligent door lock product of intelligent house to other people is that a temporary password is generated by an owner to inform a second user, the second user inputs the temporary password to unlock the intelligent door lock, but identity verification of the second user is lacked, the second user cannot be guaranteed to leak the temporary password to a third person, and potential safety hazards exist.
Disclosure of Invention
In view of the above, the invention provides a method, a device and a system for controlling an intelligent lock, which are used for solving the problem that the existing sharing and using mechanism of the intelligent door lock can not ensure that a second user leaks a temporary password to a third person, and potential safety hazards exist.
In a first aspect, the present invention provides an intelligent lock control method, applied to a web page end, the method comprising: the method comprises the steps that in response to receiving an intelligent lock control start instruction, a shortcut identification and an access token are sent to a background server side, and a control start request is sent, wherein the background server side sends a hyperlink to a second user after a first user builds a shortcut and configures intelligent lock access information corresponding to the shortcut, and the second user clicks the hyperlink to pop up a webpage, and the hyperlink comprises the identification and the access token corresponding to the shortcut built by the first user; after receiving a request for starting control agreement from the background server, switching the page into a page for guiding a second user to operate the intelligent lock, and inquiring the shortcut state change from the background server; after the state of the shortcut is a first state, switching the page into a page for guiding a second user to input the verification code, wherein the first state represents that the second user inputs the verification code after generating the dynamic random verification code; responding to the received verification code input by the second user, sending the identification of the shortcut, the access token and the verification code to a background server, and sending a verification code verification request; and responding to successful verification of the verification code which is responded by the background server, switching the page into the page for selecting the opening or closing operation of the intelligent lock, so that the second user selects the operation, and sending the identification of the shortcut, the access token and the opening or closing operation request of the intelligent lock selected by the second user to the background server, so that the background server executes the opening or closing operation of the intelligent lock.
According to the intelligent lock control method, the identification of the shortcut, the access token and the control start request are sent to the background server side through receiving the intelligent lock control start instruction, after receiving the control start request, the page can be switched to the page for guiding the second user to operate the intelligent lock, the state change of the shortcut is inquired, after the state change of the shortcut is inquired, the page is switched to the page for inputting the verification code by the second user, the verification code is sent to the background server side for verification of the verification code, after verification is successful, the page is switched to the page for selecting the opening or closing operation of the intelligent lock, so that the second user can select the operation, and then the operation selected by the second user is sent to the background server side, so that the opening or closing operation of the intelligent lock is executed by the background server side, the fact that the user who operates the intelligent lock each time must use the dynamically generated verification code is achieved, and the risk of leakage of the access token of the user can be avoided.
In an alternative embodiment, the method further comprises: and when the state of the shortcut is the second state, the third state or the fourth state, switching the page to a first error report page, wherein the first error report page comprises information representing that the operation of the second user is overtime and a restarted button, so that the second user clicks the restarted button, the step of restarting the step of sending the identification of the shortcut and the access token to the background server in response to receiving the intelligent lock control starting instruction, and sending a control starting request to the step of sending the opening or closing operation request of the intelligent lock selected by the second user to the background server, the second state represents the overtime state of a second user operation change event in response to the intelligent lock, the third state represents the overtime state of the second user input verification code, and the fourth state represents the overtime state of the opening or closing operation of the intelligent lock selected by the second user.
In an alternative embodiment, the method further comprises: and when the state of the shortcut is a fifth state, switching the page to a second error reporting page, wherein the second error reporting page prompts a second user that the intelligent lock is locked and cannot operate, and the fifth state represents a state that the shortcut is locked due to the fact that the error times of the verification code input by the second user exceeds a preset error trial times threshold value.
In a second aspect, the present invention provides an intelligent lock control method, applied to a background server, where the background server stores a shortcut created by a first user and intelligent lock access information corresponding to the shortcut, where the intelligent access information includes effective time of use of an intelligent lock, number of times of use and an intelligent lock identifier, and stores a state of the shortcut, and the method includes: receiving a shortcut identifier, an access token and a control start request sent by a webpage end, verifying whether the shortcut identifier and the access token are legal or not, if the shortcut identifier and the access token are legal, verifying that the control start request time sent by the webpage end is within the effective time of using the intelligent lock and the current operation times of the intelligent lock is smaller than the threshold value of the use times, sending a consent control start request to the webpage end, opening the monitoring of the operation event of the intelligent lock, and switching the shortcut state to a sixth state, wherein the sixth state represents that after the consent control start request is met, waiting for a second user to operate the intelligent lock; after responding to a second user operation change event of the intelligent lock, generating a dynamic random verification code, sending the dynamic random verification code to the second user, and switching the state of the shortcut to a first state; receiving a shortcut identifier, an access token and a verification code verification request sent by a webpage end, verifying whether the shortcut identifier and the access token are legal or not, if the shortcut identifier and the access token are legal, verifying whether a verification code is consistent with the generated dynamic random verification code, if the verification code is consistent with the generated dynamic random verification code, responding to the webpage end to verify the verification code successfully, and switching the state of the shortcut to a seventh state, wherein the seventh state represents the state of successful verification of the verification code; and receiving a shortcut identification, an access token and an intelligent lock opening or closing operation request sent by a webpage end, verifying whether the shortcut identification and the access token are legal, judging whether the shortcut state is a seventh state or not if the shortcut identification and the access token are legal, executing the intelligent lock opening or closing operation if the shortcut state is the seventh state, and switching the shortcut state to an eighth state, wherein the eighth state indicates that the intelligent lock is completely executed.
The background server side can generate the dynamic random verification code only after responding to the second user operation change event of the intelligent lock, can ensure that the second user can only perform door lock control operation before the intelligent lock, improves the safety, presets the starting time, the ending time and the using times of the intelligent lock, ensures the temporary property of an access token, dynamically generates the random verification code when the background server side of the intelligent lock is operated each time, and avoids the risk of leakage of the access token of the user.
In an alternative embodiment, after monitoring the operational event of the smart lock is opened, the method further comprises: if the time of the second user operation change event responding to the intelligent lock is greater than a preset first time threshold, switching the state of the shortcut to a second state; if the time for receiving the verification code verification request sent by the webpage end is greater than a preset second time threshold, switching the state of the shortcut to a third state; and if the time for receiving the intelligent lock opening or closing operation request sent by the webpage end is larger than a preset third time threshold, switching the state of the shortcut to a fourth state.
The invention sets the overtime time of the intelligent lock operation, the second user needs to operate within the preset time when operating the intelligent lock each time, otherwise, the overtime is confirmed, and the second user needs to operate again, thereby avoiding the influence of operation failure caused by other factors when operating the intelligent lock on the safety, and improving the safety of intelligent lock verification.
In an optional implementation manner, if the verification request of the verification code sent by the web page end is received within the preset second time, the method further includes: and verifying whether the verification code is consistent with the generated dynamic random verification code, if the verification code is inconsistent with the generated dynamic random verification code, adding one to the trial-and-error times of the verification code until the trial-and-error times of the verification code are accumulated to a preset trial-and-error times threshold, and switching the shortcut to a fifth state.
The invention sets the maximum number of verification code errors, if the verification code input by the second user is inconsistent with the generated dynamic random verification code and inconsistent for a plurality of times, the shortcut is locked, and the shortcut can be used only by the owner who unlocks again, so that the verification code input by other people for a plurality of times is prevented from being consistent with the generated verification code, and the safety of the intelligent lock is improved.
In an alternative embodiment, the method further comprises: and when the state of the shortcut is switched to the eighth state, feeding back the opening or closing operation of the intelligent lock executed by the second user to the first user. When the state of the shortcut is switched to a second state, a third state or a fourth state, feeding back the overtime information when the second user executes the corresponding operation to the first user; when the state of the shortcut is switched to the fifth state, the number of times that the verification code is input by the second user is wrong reaches a preset error trial and error number threshold value, so that the locked information of the shortcut is fed back to the first user, and the first user unlocks the shortcut.
The invention pushes the process of operating the intelligent lock by the second user to the first user, so that the first user can control the use dynamic state of the intelligent lock in real time.
In a third aspect, the present invention provides an intelligent lock control device, applied to a web page end, where the device includes: the intelligent lock control starting module is used for responding to the receiving of an intelligent lock control starting instruction, sending the identification of the shortcut and the access token to the background server side, and sending a control starting request, wherein the webpage side is used for sending a hyperlink to a second user after the first user builds the shortcut and configures intelligent lock access information corresponding to the shortcut, and the second user clicks the webpage popped up after clicking the hyperlink, and the hyperlink comprises the identification and the access token corresponding to the shortcut which is built by the first user; the first page switching module is used for switching the page into a page for guiding the second user to operate the intelligent lock after receiving the control start request of the background server, and inquiring the shortcut state change from the background server; the second page switching module is used for switching the page into a page for guiding a second user to input the verification code after the state of the shortcut is a first state in response to the inquiry, wherein the first state represents that the dynamic random verification code is generated and then the second user is waited for inputting the verification code; the verification code verification request module responds to the received verification code input by the second user, and sends the identification of the shortcut, the access token and the verification code to the background server side and sends a verification code verification request; and the intelligent lock operation module is used for responding to successful verification of the verification code responded by the background server, switching the page into the page for selecting the opening or closing operation of the intelligent lock so as to enable the second user to select the operation, and sending the identification of the shortcut, the access token and the opening or closing operation request of the intelligent lock selected by the second user to the background server so as to enable the background server to execute the opening or closing operation of the intelligent lock.
In a fourth aspect, the present invention provides an intelligent lock control device, applied to a background server, where the device includes: the control start request verification module is used for receiving the identification, the access token and the control start request of the shortcut sent by the webpage end, verifying whether the identification and the access token of the shortcut are legal or not, if the identification and the access token of the shortcut are legal, verifying that the control start request time sent by the received webpage end is within the effective time of using the intelligent lock and the current operation times of the intelligent lock is smaller than the threshold value of the use times, sending a consent control start request to the webpage end, opening the monitoring of the operation event of the intelligent lock, and switching the state of the shortcut to a sixth state, wherein the sixth state represents that after the consent control start request is consent, waiting for a second user to operate the intelligent lock; the verification code generation module is used for generating a dynamic random verification code after responding to a second user operation change event of the intelligent lock, sending the dynamic random verification code to the second user and switching the state of the shortcut to a first state; the verification code verification module is used for receiving a verification code verification request sent by a webpage end, verifying whether the identification of the shortcut and the access token are legal or not, if the identification of the shortcut and the access token are legal, verifying whether the verification code is consistent with the generated dynamic random verification code, if the verification code is consistent with the generated dynamic random verification code, responding to the webpage end to verify the verification code successfully, and switching the state of the shortcut to a seventh state, wherein the seventh state represents the state of successful verification of the verification code; and the intelligent lock operation execution module is used for receiving an intelligent lock opening or closing operation request sent by the webpage end, verifying whether the shortcut identification and the access token are legal, judging whether the shortcut state is a seventh state or not if the shortcut identification and the access token are legal, executing the intelligent lock opening or closing operation if the shortcut state is the seventh state, and switching the shortcut state to an eighth state, wherein the eighth state indicates that the intelligent lock is completely executed.
In a fifth aspect, the present invention provides an intelligent lock control system, comprising: the system comprises a webpage end and a background server end; the webpage end is used for responding to the receiving of the intelligent lock control start instruction, sending the shortcut identification and the access token to the background server end and sending a control start request; after receiving a request for starting control agreement from the background server, switching the page into a page for guiding a second user to operate the intelligent lock, and inquiring the shortcut state change from the background server; after responding to the inquiry that the state of the shortcut is the first state, switching the page into a page for guiding a second user to input a verification code; responding to the received verification code input by the second user, sending the identification of the shortcut, the access token and the verification code to a background server, and sending a verification code verification request; responding to successful verification of the verification code received by the background server, switching the page into a page for selecting the opening or closing operation of the intelligent lock, so that a second user selects the operation, and sending the identification of the shortcut, the access token and the opening or closing operation request of the intelligent lock selected by the second user to the background server; the background server side is used for receiving the identification, the access token and the control start request of the shortcut sent by the webpage side, verifying that the control start request time sent by the webpage side is in the effective time of using the intelligent lock and the current operation times of the intelligent lock is smaller than the threshold value of the use times, sending a consent control start request to the webpage side, switching the state of the shortcut to a sixth state, generating a dynamic random verification code after responding to a second user operation change event of the intelligent lock, sending the dynamic random verification code to a second user, and switching the state of the shortcut to the first state; receiving a shortcut identifier, an access token and a verification code verification request sent by a webpage end, verifying whether the verification code is consistent with the generated dynamic random verification code, if so, responding to the webpage end that the verification code verification is successful, and switching the state of the shortcut to a seventh state; and receiving the shortcut identification, the access token and the intelligent lock opening or closing operation request sent by the webpage end, judging whether the shortcut state is a seventh state, and executing the intelligent lock opening or closing operation if the shortcut state is the seventh state.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an intelligent lock control system in an embodiment of the present invention;
FIG. 2 is a schematic diagram of an interaction process of the intelligent lock control system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an interaction process of another smart lock control system according to an embodiment of the present invention;
fig. 4 shows a schematic structural diagram of the intelligent lock control device provided by the invention;
fig. 5 shows a schematic structural diagram of another intelligent lock control device provided by the invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 1 shows an intelligent lock control system provided by the invention, which comprises a webpage end 1 and a background server end 2;
specifically, the web page end 1 is configured to send, in response to receiving an intelligent lock control start instruction, a shortcut identifier and an access token to the background server end 2, and send a control start request; after receiving the request for starting control agreement from the background server 2, switching the page to a page for guiding the second user to operate the intelligent lock, and inquiring the shortcut state change from the background server 2; after responding to the inquiry that the state of the shortcut is the first state, switching the page into a page for guiding a second user to input the verification code; in response to receiving the verification code input by the second user, sending the identification of the shortcut, the access token and the verification code to the background server side 2, and sending a verification code verification request; responding to successful verification of the verification code received by the background server 2, switching the page to a page for selecting the opening or closing operation of the intelligent lock, so that a second user selects the operation, and sending the identification of the shortcut, the access token and the opening or closing operation request of the intelligent lock selected by the second user to the background server 2;
Specifically, the shortcut (shortcut) has the following properties:
{
ID String, shortcut unique ID
name String, shortcut name
owner_id, string, owner ID
effective_ts1: long, effective start time
effective_ts2: long, effective end time
total_times Int, total number of available times
used_times, int, number of times used
Lock_id, string, intelligent Lock ID
create_ts Long, creation time
email String, shared mailbox
token, string, access token
OPer_ts Long, operation start time
code String, 6-bit dynamic verification code
code_err_num:int, dynamic verification code error-transmission times
state Int, state
}
The background server side 2 is used for receiving the identification, the access token and the control start request of the shortcut sent by the webpage side 1, verifying that the authentication request time sent by the webpage side 1 is in the effective time of using the intelligent lock and the current operation times of the intelligent lock is smaller than the threshold value of the use times, sending a consent control start request to the webpage side 1, switching the state of the shortcut to a sixth state, generating a dynamic random verification code after responding to a second user operation change event of the intelligent lock, sending the dynamic random verification code to a second user, and switching the state of the shortcut to the first state; receiving a shortcut identifier, an access token and a verification code verification request sent by the webpage end 1, verifying whether the verification code is consistent with the generated dynamic random verification code, if so, responding to the webpage end 1 that the verification code is successfully authenticated, and switching the shortcut state to a seventh state; and receiving the shortcut identification, the access token and the intelligent lock opening or closing operation request sent by the webpage end 1, judging whether the shortcut state is a seventh state, and executing the intelligent lock opening or closing operation if the shortcut state is the seventh state.
Specifically, a first user indicates a person to be shared of the intelligent lock, a second user indicates a person to be shared of the intelligent lock, a shortcut can be created first, specific intelligent lock access information can be configured for the shortcut, for example, the time when the intelligent lock is effective, the identification of the intelligent lock, a threshold value of the number of times the intelligent lock is used, and the like, wherein the identification of the intelligent lock can be an intelligent lock ID or other identifications, the time when the intelligent lock is effective and the threshold value of the number of times of use can be set according to actual requirements by itself, the method is not limited, the newly-built shortcut corresponds to an access token with uniqueness and a corresponding identification, the identification can be an ID or name of the shortcut, and the like, the identification of the intelligent lock in the embodiment of the invention is the intelligent lock ID, the identification of the shortcut is the shortcut ID, and the shortcut can be stored in a background server 2 by way of example only, the background server 2 can be searched for the shortcut through the shortcut identification, the owner can create the shortcut, after the owner creates the shortcut, the access token can be sent to the user after the access token is opened, and the access token can be opened after the user has a hyperlink is received, and the access link is not requested by clicking a hyperlink, and the access link is opened by the user 1. After the webpage is opened, the webpage end 1 is provided with a start button, if a shared person wants to operate the door lock, the start button can be clicked, after the webpage end 1 receives an intelligent lock control start instruction of the shared person, the webpage end 1 can request the ID, the access token and the control start of the shortcut, after receiving the control start request, the background server end 2 can firstly verify whether the ID and the access token of the shortcut are legal or not, and if the ID and the access token are legal and verify whether the current time for operating the intelligent lock is within the effective time of the intelligent lock or not, and the using times of operating the intelligent lock do not exceed the threshold value of the using times, the control start can be agreed.
Specifically, the background server 2 may unlock a monitoring task, monitor an operation event of the smart lock related to the shortcut, where the operation event of the smart lock may be a touch of a shared person to the smart lock, etc., may be set by itself according to an actual smart lock model, etc., and may not be limited, and may also be started from a current time to perform timing, where the timing method may be to assign an attribute of an operator_ts (operation start time) of the shortcut to the current time, and may switch a state of the shortcut to a "WaitTouch" state, and update a state of the shortcut in real time based on a flow operation.
Specifically, after receiving the successful response of the control start request, the web page end 1 can switch the page of the current web page end 1 into a page for guiding the user to touch the intelligent door lock, and can start a polling mechanism on the web page, and can query the state change of the shortcut from the background server end 2 at fixed time. When the shared person sees that the page of the current webpage end 1 is switched to a page for guiding the user to touch the intelligent lock, the shared person can touch the intelligent lock, after the shared person touches the intelligent lock, the background service receives a touch change event of the intelligent lock, firstly, whether the time from opening timing to receiving the touch change event of the intelligent lock exceeds preset time can be judged, the preset time can be set according to actual application conditions, for example, the preset time is 180 seconds, if the background service does not receive the touch change event of the intelligent door lock within 180 seconds, the shared person is considered to be not in front of the door, and then the state of the shortcut is switched to a WaitToucherr state. If the background service receives the touch change event of the intelligent door lock within 180 seconds, a dynamic random verification code can be generated, wherein the length of the dynamic random verification code is not limited, for example, the embodiment of the invention can be a 6-bit verification code, the code (verification code) attribute of the shortcut is updated to be the 6-bit dynamic random verification code, the code_err_num (verification code error input number) attribute is set to be 0, then the state of the shortcut is switched to a "WaitCode" (waiting for the user to input the verification code) state, then the background service end 2 can send the generated dynamic random verification code to the shared person, the mode of sending the dynamic random verification code to the shared person is not limited, and if the webpage end 1 inquires that the state of the shortcut is switched to the "WaitCode" (waiting for the user to input the verification code) state, the webpage is also switched to a page for guiding the user to input the 6-bit verification code, and waiting for the user to input the verification code.
Specifically, after receiving the dynamic random verification code, the sharee can fill in the page waiting for the user to input the verification code, after receiving the verification code input by the sharee, the web page end 1 can send the ID, the access token and the verification code verification request of the shortcut to the background server end 2, after receiving the verification code verification request, the background server end 2 can firstly verify whether the ID and the access token of the shortcut are legal, if the time of legal re-verification of the input verification code exceeds the preset time, the preset time is not limited, for example, the preset time can be 240 seconds, if the time of input of the verification code exceeds 240 seconds, the state of the shortcut is considered to be switched to a "WaitCodeErr" state, if the time of input of the verification code does not exceed 240 seconds, the state of the shortcut input by the sharee can be verified to be consistent with the generated random dynamic verification code, if the state of the shortcut is consistent, the state of the shortcut is switched to a "Codeiif the time of legal re-verification code exceeds the preset time, the preset time is not limited by the preset time, if the condition of the condition is met, the condition is set to be the maximum number of error, and the error is set to be the error-limited number of the error is 5, if the error is maximum number of error is reached, and the error is set to the error-limited number is maximum, and the error is set to the error-limited number is the error-limited, and the error is 5.
Specifically, if the web page end 1 receives the verification code verification of the response of the background server end 2, the web page can be switched to the selected action web page, the sharee can select the unlocking/locking operation, the sharee can select the good operation, the shortcut ID, the access token and the intelligent lock opening or closing operation request can be sent to the background server end 2, after receiving the verification code verification request, the background server end 2 can firstly verify whether the shortcut ID and the access token are legal, if the shortcut state is legal and is in the "code verification" state, then verify whether the time of the selection operation exceeds the preset time, if the time exceeds the preset time, the shortcut state is changed into the state that the second user selects the intelligent lock opening or closing operation is overtime, if the preset time is not exceeded, the lock opening/closing operation of the intelligent lock designated by the shortcut lock ID attribute is called, and the shortcut state is switched to the "Done" state after the execution is completed.
Specifically, after the operation is completed, the background server 2 may send a mobile phone push message to the owner specified by the owner_id attribute of the shortcut. So that the owner knows that the sharee performs the unlocking/locking operation at a certain time.
Specifically, if the response of the request sent by the web page end 1 to the background server end 2 is wrong or the state of the shortcut is queried to indicate that the timeout or the trial-and-error number reaches the maximum number, the web page is switched to the wrong page to inform the shared person of the reason of the error, if the reason of the error is that the user inputs the verification code to be locked for more than 5 times, the shortcut is locked and cannot be used any more, and the shared owner must unlock the shortcut and then can be used again. If this is the other cause of error, the page will also contain a restart button, which the user can restart. And the background service also sends a message to the host to push a mobile phone, so that the host is informed that the shared person makes errors in the process of executing the unlocking/locking operation, if the shared person inputs the verification code to verify errors, the background service end 2 can change the state of the shortcut into the verification error state, so that the webpage end 1 monitors the state or the background service end 2 directly responds to the verification code verification error information of the webpage end 1, the webpage end 1 can prompt the shared person for the verification code input error information, such as popping up a popup window of 'the verification code input error', for example only, if the background service end 2 monitors the corresponding state because of the verification of the shortcut caused by the overtime of the shared person operation, the webpage end 1 can switch the webpage to the webpage prompting the user to operate overtime, and if the number of errors of the background service end 2 caused by the verification code verification error reaches the maximum number of times, the webpage can be switched to prompt the user to input the error number of times, and the locking is performed.
In accordance with an embodiment of the present invention, there is also provided an intelligent lock control method embodiment, it being noted that the steps shown in the flowchart of the figures may be performed in a computer system, such as a set of computer executable instructions, and, although a logical sequence is shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than what is shown herein.
In this embodiment, there is further provided an intelligent lock control method, where the method is applied to the web page end 1 and the background server end 2 shown in fig. 1, and fig. 2 is a flowchart of the intelligent lock control method according to an embodiment of the present invention, and as shown in fig. 2, the flowchart includes the following steps:
step S101, in response to receiving the intelligent lock control start instruction, the identification of the shortcut and the access token are sent to the background server side, and a control start request is sent.
The method comprises the steps that after a first user establishes a shortcut and configures intelligent lock access information corresponding to the shortcut, a background server sends a hyperlink to a second user, the second user clicks the hyperlink and then pops up the webpage, and the hyperlink comprises an identifier and an access token corresponding to the shortcut established by the first user.
In the embodiment of the invention, the owner, namely the first user, can establish the shortcut and the configuration information through the Application corresponding to the smart home system, and also can establish the shortcut and the configuration information through the WeChat applet, without limitation, the way of sending the hyperlink to the second user is not limited, for example, the mailbox of the shared person can be configured in the access information of the smart lock, the mail containing the hyperlink can be sent to the mailbox of the shared person, the mobile phone number of the shared person and the like can be configured, the hyperlink can be directly sent to the shared person in a short message mode, without limitation, the background service manager can directly pop up the webpage corresponding to the browser after clicking the hyperlink, or pop up the WeChat applet, and the operation of the smart lock is performed in the WeChat applet.
According to the embodiment of the invention, the sharee clicks the intelligent lock start button in the webpage popped up by clicking the hyperlink, and the webpage receives the intelligent lock control start instruction, so that the identification of the shortcut, the access token and the control start request can be sent to the background server.
Step S102, after receiving the request for starting control agreement of the background server, switching the page to a page for guiding the second user to operate the intelligent lock, and inquiring the shortcut state change from the background server.
After receiving the request for starting control agreement from the background server, the embodiment of the invention can switch the page to the page for guiding the second user to operate the intelligent lock, wherein the mode for operating the intelligent lock is not limited, and can be a touch intelligent lock, which is only used as an example, and a polling mechanism is started to inquire the state change of the shortcut from the background server.
Step S103, after responding to the inquiry that the state of the shortcut is the first state, switching the page into the page for guiding the second user to input the verification code.
Wherein the first state represents waiting for the second user to input the verification code after generating the dynamic random verification code.
When the state of the shortcut is queried as the state of 'WaitCode (waiting for the user to input the verification code)', the webpage end indicates that the shared person has completed touching the intelligent lock event, and the background server end has generated the dynamic random verification code, the webpage can be switched to the webpage for guiding the second user to input the verification code, so that the second user can input the verification code into an input box of the webpage display after receiving the verification code.
Step S104, in response to receiving the verification code input by the second user, the identification of the shortcut, the access token and the verification code are sent to the background server side, and a verification code verification request is sent.
After receiving the verification code input by the shared person, the embodiment of the invention can send the verification code and the shortcut identification and the access token to the background server side so as to enable the background server side to verify the verification code.
Step S105, in response to the successful verification of the verification code responded by the background server, switching the page to the page for selecting the opening or closing operation of the intelligent lock, so that the second user selects the operation, and sending the identification of the shortcut, the access token and the opening or closing operation request of the intelligent lock selected by the second user to the background server, so that the background server executes the opening or closing operation of the intelligent lock.
After the verification code is successfully verified by the background server side, the webpage side can switch the page to the page for selecting the opening or closing operation of the intelligent lock, the sharee selects the intelligent lock operation after seeing the page, and after the selection is completed, the webpage side can send the operation selected by the sharee to the background server side so that the background server side can execute the opening or closing operation of the intelligent lock.
Step S201, receiving the shortcut identification, the access token and the control start request sent by the webpage end, verifying whether the shortcut identification and the access token are legal, if the shortcut identification and the access token are legal, verifying that the control start request time sent by the received webpage end is within the effective time of using the intelligent lock and the current operation times of the intelligent lock is smaller than the threshold value of the operation times, sending a consent control start request to the webpage end, starting monitoring of operation events of the intelligent lock, and switching the state of the shortcut to a sixth state.
Wherein the sixth state indicates waiting for the second user to operate the smart lock after the control start request is granted.
After receiving a control start request sent by a webpage end, a background server end can verify whether a shortcut identifier and an access token are legal or not, if not, the webpage end is responded to verify errors, if so, the method can judge whether the time of an authentication request sent by the webpage end is within the effective time of using an intelligent lock and whether the operation times of the intelligent lock by using the shortcut are smaller than the threshold value of the use times currently, if the effective time of using the intelligent lock is not longer or is larger than the threshold value of the use times, verification error information is responded to the webpage end, and if the effective time of using the intelligent lock and the operation times of the intelligent lock are smaller than the threshold value of the use times, the method sends an approval authentication request to the webpage end.
Step S202, after responding to a second user operation change event of the intelligent lock, generating a dynamic random verification code, sending the dynamic random verification code to the second user, and switching the state of the shortcut to the first state.
The background server responds to the operation change event of the intelligent lock, wherein the operation change event can be a touch event of the intelligent lock, and the dynamic random verification code can be generated and sent to the second user without limitation.
Step S203, receiving a shortcut identifier, an access token and a verification code verification request sent by a webpage end, verifying whether the shortcut identifier and the access token are legal or not, if the shortcut identifier and the access token are legal, verifying whether the verification code is consistent with the generated dynamic random verification code, if the verification code is consistent with the generated dynamic random verification code, responding to the webpage end to verify the verification code successfully, and switching the shortcut state to a seventh state, wherein the seventh state represents the verification successful state of the verification code.
Step S204, receiving the shortcut identification, the access token and the intelligent lock opening or closing operation request sent by the webpage end, verifying whether the shortcut identification and the access token are legal, judging whether the shortcut state is a seventh state if the shortcut identification and the access token are legal, executing the intelligent lock opening or closing operation if the shortcut state is the seventh state, and switching the shortcut state to an eighth state, wherein the eighth state indicates that the intelligent lock is completely executed.
In step S205, when the shortcut state is switched to the eighth state, the smart lock opening or closing operation performed by the second user is fed back to the first user.
After receiving an intelligent lock opening or closing operation request sent by a webpage end, the embodiment of the application judges that the state of the shortcut is a seventh state, determines that verification code verification is successful, and executes the opening or closing operation of the intelligent lock if the opening or closing operation of the intelligent lock of the second user is known, and switches the state of the shortcut to the state of 'Done', so that the executed information can be fed back to the first user, namely the owner of the intelligent lock, and can be pushed through a message on a software APP or can be pushed through a message of a micro-communication applet without limitation.
Specifically, in an embodiment, as shown in fig. 3, the web page 1 is further used for executing steps S106 to S109, and the background server 2 is further used for executing steps S206 to S209.
And step S106, switching the page to the first error reporting page in response to the fact that the state of the shortcut is the second state.
Wherein the second state represents a state in which a change event times out in response to a second user operation to the smart lock.
Step S107, when the state of the shortcut is the second state, the page is switched to the first error page.
Wherein the third state represents a state in which the second user inputs the authentication code overtime.
Step S108, when the state of the shortcut is the second state, the page is switched to the first error page.
The first error report page comprises information indicating that the operation of the second user is overtime and a button for restarting, so that the second user clicks the button for restarting, the step of restarting to send the shortcut identification and the access token to the background server in response to receiving the intelligent lock control starting instruction, and to send a control starting request to send the intelligent lock opening or closing operation request selected by the second user to the background server is performed again, and the fourth state indicates that the second user selects the state that the intelligent lock opening or closing operation is overtime.
In the embodiment of the invention, when the state of the shortcut is queried to be the second state, the third state or the fourth state by the webpage end, the webpage is switched to the error reporting page to prompt the second user to specifically correspond to the information of the overtime of the process operation when the time of the specific process is longer than the preset time, wherein the error reporting page can further comprise a restarted button, and the second user can click the restarted button to restart the execution process after knowing that the process operation is overtime.
Step S109, when the shortcut state is the fifth state, the page is switched to the second error page.
The second error reporting page prompts the second user that the intelligent lock is locked and cannot be operated.
The fifth state represents a state that the shortcut is locked when the error number of the verification code input by the second user exceeds a preset error number threshold.
In the embodiment of the invention, if the state of the shortcut is the fifth state, the webpage end indicates that the second user inputs the verification code for many times, so that the shortcut is locked, at this time, the webpage of the webpage end can be switched to the webpage for prompting the second user that the shortcut is locked, and the second user cannot execute any operation.
Step S206, starting timing after the operation event of the intelligent lock is monitored, switching the state of the shortcut to the second state if the time of the operation change event of the second user responding to the intelligent lock is larger than the preset first time threshold, and feeding back the information of the operation timeout executed by the second user to the first user.
Step S207, if the time of receiving the verification code verification request sent by the webpage end is greater than the preset second time threshold, the state of the shortcut is switched to the third state, and the information of the operation timeout executed by the second user is fed back to the first user.
Step S208, if the time of receiving the request for opening or closing the intelligent lock sent by the webpage end is greater than a preset third time threshold, the state of the shortcut is switched to a fourth state, and the information of the timeout of the operation executed by the second user is fed back to the first user.
Step S209, verifying whether the verification code is consistent with the generated dynamic random verification code, if the verification code is inconsistent with the generated dynamic random verification code, adding one to the trial-and-error times of the verification code until the trial-and-error times of the verification code are accumulated to a preset trial-and-error times threshold, switching the shortcut to a fifth state, and feeding back the locked information of the shortcut to the first user when the times of the errors of the verification code input by the second user reach the preset trial-and-error times threshold.
The preset first time threshold, the preset second time threshold and the preset third time threshold in the embodiment of the invention can be set according to the actual application scene and the requirement, and are not limited, wherein the preset three time thresholds can be equal or unequal, the preset first time threshold is 180 seconds, the preset second time threshold is 240 seconds, the preset third time threshold is 240 seconds, and other times can be set by way of example only.
In this embodiment, an intelligent lock control device is further provided, and the device is used to implement the foregoing embodiments and preferred embodiments, and is not described in detail. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
The embodiment provides an intelligent lock control device, as shown in fig. 4, applied to a web page end, the intelligent lock control device includes:
the intelligent lock control starting module 401 is configured to send the identification of the shortcut and the access token to the background server in response to receiving the intelligent lock control starting instruction, and send a control starting request, where the web page end is configured to send the hyperlink to the second user after the first user creates the shortcut and configures the intelligent lock access information corresponding to the shortcut, and the second user clicks the webpage popped up after clicking the hyperlink, where the hyperlink includes the identification and the access token corresponding to the shortcut created by the first user;
the first page switching module 402 is configured to switch a page to a page for guiding the second user to operate the intelligent lock after receiving a request for starting control agreement from the background server, and query a shortcut state change from the background server;
The second page switching module 403 is configured to switch the page to a page for guiding the second user to input the verification code after the state of the shortcut is the first state in response to the query, where the first state indicates that the dynamic random verification code is generated, and wait for the second user to input the verification code;
the verification code verification request module 404 is used for responding to the received verification code input by the second user, sending the identification of the shortcut, the access token and the verification code to the background server and sending a verification code verification request;
the intelligent lock operation module 405 is configured to switch the page to a page for selecting an opening or closing operation of the intelligent lock in response to receiving a verification code response from the background server to succeed in verification, so that the second user selects the operation, and send the identification of the shortcut, the access token and an opening or closing operation request of the intelligent lock selected by the second user to the background server, so that the background server executes the opening or closing operation of the intelligent lock.
In some alternative embodiments, the smart lock control device further comprises: the first error reporting page switching module is used for switching the page to the first error reporting page when the state of the shortcut is the second state, the third state or the fourth state, wherein the first error reporting page comprises information representing that the operation of the second user is overtime and a restarted button, so that the second user clicks the restarted button, the identification of the shortcut and the access token are sent to the background server in response to receiving the intelligent lock control starting instruction, a control starting request is sent, the step of sending the opening or closing operation request of the intelligent lock selected by the second user to the background server is carried out, the second state represents the overtime state of the second user operation change event responding to the intelligent lock, the third state represents the overtime state of the second user input verification code, and the fourth state represents the overtime state of the opening or closing operation of the intelligent lock selected by the second user.
In some alternative embodiments, the smart lock control device further comprises: the second error reporting page switching module is used for switching the page to a second error reporting page when the state of the shortcut is a fifth state in response to the inquiry, the second error reporting page prompts the second user that the intelligent lock is locked and cannot be operated, and the fifth state represents a state that the shortcut is locked due to the fact that the error times of the verification code input by the second user exceeds a preset error testing time threshold.
The embodiment also provides an intelligent lock control device, as shown in fig. 5, applied to a background server, the intelligent lock control device includes:
the control start request verification module 501 is configured to receive the shortcut identifier, the access token and the control start request sent by the web page end, verify whether the shortcut identifier and the access token are legal, and if the shortcut identifier and the access token are legal, verify that the control start request time sent by the web page end is within the effective time of use of the smart lock and the current operation frequency of the smart lock is less than the threshold value of the use frequency, send a grant control start request to the web page end, unlock monitoring of an operation event of the smart lock, and switch the shortcut state to a sixth state, where the sixth state indicates that the second user waits for operating the smart lock after granting the control start request;
The verification code generation module 502 is configured to generate a dynamic random verification code after responding to a second user operation change event of the intelligent lock, send the dynamic random verification code to the second user, and switch the state of the shortcut to the first state;
the verification code verification module 503 is configured to receive a verification code verification request sent by the web page end, verify whether the identification of the shortcut and the access token are legal, if the identification of the shortcut and the access token are legal, verify whether the verification code is consistent with the generated dynamic random verification code, if the verification code is consistent with the generated dynamic random verification code, respond to the web page end to verify the verification code successfully, and switch the state of the shortcut to a seventh state, where the seventh state represents a state that the verification code is verified successfully;
the intelligent lock operation executing module 504 is configured to receive an intelligent lock opening or closing operation request sent by the web page end, verify whether the shortcut identifier and the access token are legal, determine whether the shortcut state is a seventh state if the shortcut identifier and the access token are legal, execute the opening or closing operation of the intelligent lock if the shortcut state is the seventh state, and switch the shortcut state to an eighth state, where the eighth state indicates that the intelligent lock is executed.
In some alternative embodiments, the smart lock control apparatus starts timing after monitoring an operational event of the smart lock is opened, and further comprises: the second state switching module is used for switching the state of the shortcut to a second state if the time of responding to the second user operation change event of the intelligent lock is greater than a preset first time threshold; the third state switching module is used for switching the state of the shortcut to a third state if the time for receiving the verification code verification request sent by the webpage end is greater than a preset second time threshold; and the fourth state switching module is used for switching the state of the shortcut to the fourth state if the time for receiving the intelligent lock opening or closing operation request sent by the webpage end is greater than a preset third time threshold.
In some alternative embodiments, after verifying whether the verification code is consistent with the generated dynamic random verification code, the smart lock control apparatus further includes: and the fifth state switching module is used for adding one to the trial-and-error times of the verification code if the verification code is inconsistent with the generated dynamic random verification code until the trial-and-error times of the verification code are accumulated to a preset trial-and-error times threshold value, and switching the shortcut to the fifth state.
In some alternative embodiments, the smart lock control device further comprises: the first information feedback module is used for feeding back the opening or closing operation of the intelligent lock executed by the second user to the first user when the state of the shortcut is switched to the eighth state; the second information feedback module is used for feeding back the overtime information of the second user when the state of the shortcut is switched to the second state, the third state or the fourth state and the corresponding operation is executed by the second user to the first user; and the third information feedback module is used for feeding back the locked information of the shortcut to the first user when the state of the shortcut is switched to the fifth state and the number of errors of the verification code input by the second user reaches a preset error trial number threshold value, so that the first user can unlock the shortcut.
Further functional descriptions of the above respective modules and units are the same as those of the above corresponding embodiments, and are not repeated here.
The smart lock control in this embodiment is presented in the form of functional units, herein referred to as ASIC (Application Specific Integrated Circuit ) circuits, processors and memories executing one or more software or firmware programs, and/or other devices that can provide the functionality described above.
Claims (10)
1. An intelligent lock control method is characterized by being applied to a webpage end, and comprises the following steps:
the method comprises the steps that in response to receiving an intelligent lock control start instruction, a shortcut identification and an access token are sent to a background server side, and a control start request is sent, wherein the background server side sends a hyperlink to a second user after a first user builds a shortcut and configures intelligent lock access information corresponding to the shortcut, and the second user clicks the hyperlink to pop up a webpage, and the hyperlink comprises the identification and the access token corresponding to the shortcut built by the first user;
after receiving a request for starting control agreement from the background server, switching the page into a page for guiding a second user to operate the intelligent lock, and inquiring the shortcut state change from the background server;
after the state of the shortcut is a first state, switching the page into a page for guiding a second user to input the verification code, wherein the first state represents that the second user inputs the verification code after generating the dynamic random verification code;
responding to the received verification code input by the second user, sending the identification of the shortcut, the access token and the verification code to a background server, and sending a verification code verification request;
And responding to successful verification of the verification code which is responded by the background server, switching the page into the page for selecting the opening or closing operation of the intelligent lock, so that the second user selects the operation, and sending the identification of the shortcut, the access token and the opening or closing operation request of the intelligent lock selected by the second user to the background server, so that the background server executes the opening or closing operation of the intelligent lock.
2. The method according to claim 1, wherein the method further comprises:
and when the state of the shortcut is the second state, the third state or the fourth state, switching the page to a first error report page, wherein the first error report page comprises information representing that the operation of the second user is overtime and a restarted button, so that the second user clicks the restarted button, the step of restarting the step of sending the identification of the shortcut and the access token to the background server in response to receiving the intelligent lock control starting instruction, and sending a control starting request to the step of sending the opening or closing operation request of the intelligent lock selected by the second user to the background server, the second state represents the overtime state of a second user operation change event in response to the intelligent lock, the third state represents the overtime state of the second user input verification code, and the fourth state represents the overtime state of the opening or closing operation of the intelligent lock selected by the second user.
3. The method according to claim 1, wherein the method further comprises:
and when the state of the shortcut is a fifth state, switching the page to a second error reporting page, wherein the second error reporting page prompts a second user that the intelligent lock is locked and cannot operate, and the fifth state represents a state that the shortcut is locked due to the fact that the error times of the verification code input by the second user exceeds a preset error trial times threshold value.
4. The intelligent lock control method is characterized by being applied to a background server, wherein the background server stores a shortcut newly created by a first user and intelligent lock access information corresponding to the shortcut, the intelligent access information comprises effective time of intelligent lock use, usable times and intelligent lock identification, and the state of the shortcut is stored, and the method comprises the following steps:
receiving a shortcut identifier, an access token and a control start request sent by a webpage end, verifying whether the shortcut identifier and the access token are legal or not, if the shortcut identifier and the access token are legal, verifying that the control start request time sent by the webpage end is within the effective time of using the intelligent lock and the current operation times of the intelligent lock is smaller than the threshold value of the use times, sending a consent control start request to the webpage end, opening the monitoring of the operation event of the intelligent lock, and switching the shortcut state to a sixth state, wherein the sixth state represents that after the consent control start request is met, waiting for a second user to operate the intelligent lock;
After responding to a second user operation change event of the intelligent lock, generating a dynamic random verification code, sending the dynamic random verification code to the second user, and switching the state of the shortcut to a first state;
receiving a shortcut identifier, an access token and a verification code verification request sent by a webpage end, verifying whether the shortcut identifier and the access token are legal or not, if the shortcut identifier and the access token are legal, verifying whether a verification code is consistent with the generated dynamic random verification code, if the verification code is consistent with the generated dynamic random verification code, responding to the webpage end to verify the verification code successfully, and switching the state of the shortcut to a seventh state, wherein the seventh state represents the state of successful verification of the verification code;
and receiving a shortcut identification, an access token and an intelligent lock opening or closing operation request sent by a webpage end, verifying whether the shortcut identification and the access token are legal, judging whether the shortcut state is a seventh state or not if the shortcut identification and the access token are legal, executing the intelligent lock opening or closing operation if the shortcut state is the seventh state, and switching the shortcut state to an eighth state, wherein the eighth state indicates that the intelligent lock is completely executed.
5. The method of claim 4, wherein the timing is started after the monitoring of the operational event of the smart lock is opened, the method further comprising:
if the time of the second user operation change event responding to the intelligent lock is greater than a preset first time threshold, switching the state of the shortcut to a second state;
if the time for receiving the verification code verification request sent by the webpage end is greater than a preset second time threshold, switching the state of the shortcut to a third state;
and if the time for receiving the intelligent lock opening or closing operation request sent by the webpage end is larger than a preset third time threshold, switching the state of the shortcut to a fourth state.
6. The method of claim 5, wherein after verifying that the verification code is consistent with the dynamic random verification code generated, the method further comprises:
and if the verification code is inconsistent with the generated dynamic random verification code, adding one to the verification code trial-error times until the verification code trial-error times are accumulated to a preset trial-error times threshold value, and switching the shortcut to a fifth state.
7. The smart lock control method of claim 4, further comprising:
When the state of the shortcut is switched to an eighth state, feeding back the opening or closing operation of the intelligent lock executed by the second user to the first user;
when the state of the shortcut is switched to a second state, a third state or a fourth state, feeding back the overtime information when the second user executes the corresponding operation to the first user;
when the state of the shortcut is switched to the fifth state, the number of times that the verification code is input by the second user is wrong reaches a preset error trial and error number threshold value, so that the locked information of the shortcut is fed back to the first user, and the first user unlocks the shortcut.
8. An intelligent lock control device, characterized in that, be applied to the webpage end, the device includes:
the intelligent lock control starting module is used for responding to the receiving of an intelligent lock control starting instruction, sending the identification of the shortcut and the access token to the background server side, and sending a control starting request, wherein the webpage side is used for sending a hyperlink to a second user after the first user builds the shortcut and configures intelligent lock access information corresponding to the shortcut, and the second user clicks the webpage popped up after clicking the hyperlink, and the hyperlink comprises the identification and the access token corresponding to the shortcut which is built by the first user;
The first page switching module is used for switching the page into a page for guiding the second user to operate the intelligent lock after receiving the control start request of the background server, and inquiring the shortcut state change from the background server;
the second page switching module is used for switching the page into a page for guiding a second user to input the verification code after the state of the shortcut is a first state in response to the inquiry, wherein the first state represents that the dynamic random verification code is generated and then the second user is waited for inputting the verification code;
the verification code verification request module responds to the received verification code input by the second user, and sends the identification of the shortcut, the access token and the verification code to the background server side and sends a verification code verification request;
and the intelligent lock operation module is used for responding to successful verification of the verification code responded by the background server, switching the page into the page for selecting the opening or closing operation of the intelligent lock so as to enable the second user to select the operation, and sending the identification of the shortcut, the access token and the opening or closing operation request of the intelligent lock selected by the second user to the background server so as to enable the background server to execute the opening or closing operation of the intelligent lock.
9. An intelligent lock control device, characterized in that, be applied to the backstage service end, the device includes:
the control start request verification module is used for receiving the identification, the access token and the control start request of the shortcut sent by the webpage end, verifying whether the identification and the access token of the shortcut are legal or not, if the identification and the access token of the shortcut are legal, verifying that the control start request time sent by the received webpage end is within the effective time of using the intelligent lock and the current operation times of the intelligent lock is smaller than the threshold value of the use times, sending a consent control start request to the webpage end, opening the monitoring of the operation event of the intelligent lock, and switching the state of the shortcut to a sixth state, wherein the sixth state represents that after the consent control start request is consent, waiting for a second user to operate the intelligent lock;
the verification code generation module is used for generating a dynamic random verification code after responding to a second user operation change event of the intelligent lock, sending the dynamic random verification code to the second user and switching the state of the shortcut to a first state;
the verification code verification module is used for receiving a verification code verification request sent by a webpage end, verifying whether the identification of the shortcut and the access token are legal or not, if the identification of the shortcut and the access token are legal, verifying whether the verification code is consistent with the generated dynamic random verification code, if the verification code is consistent with the generated dynamic random verification code, responding to the webpage end to verify the verification code successfully, and switching the state of the shortcut to a seventh state, wherein the seventh state represents the state of successful verification of the verification code;
And the intelligent lock operation execution module is used for receiving an intelligent lock opening or closing operation request sent by the webpage end, verifying whether the shortcut identification and the access token are legal, judging whether the shortcut state is a seventh state or not if the shortcut identification and the access token are legal, executing the intelligent lock opening or closing operation if the shortcut state is the seventh state, and switching the shortcut state to an eighth state, wherein the eighth state indicates that the intelligent lock is completely executed.
10. An intelligent lock control system, the intelligent lock control system comprising:
the system comprises a webpage end and a background server end;
the webpage end is used for responding to the receiving of the intelligent lock control start instruction, sending the shortcut identification and the access token to the background server end and sending a control start request; after receiving a request for starting control agreement from the background server, switching the page into a page for guiding a second user to operate the intelligent lock, and inquiring the shortcut state change from the background server; after responding to the inquiry that the state of the shortcut is the first state, switching the page into a page for guiding a second user to input a verification code; responding to the received verification code input by the second user, sending the identification of the shortcut, the access token and the verification code to a background server, and sending a verification code verification request; responding to successful verification of the verification code received by the background server, switching the page into a page for selecting the opening or closing operation of the intelligent lock, so that a second user selects the operation, and sending the identification of the shortcut, the access token and the opening or closing operation request of the intelligent lock selected by the second user to the background server;
The background server side is used for receiving the identification, the access token and the control start request of the shortcut sent by the webpage side, verifying that the control start request time sent by the webpage side is in the effective time of using the intelligent lock and the current operation times of the intelligent lock is smaller than the threshold value of the use times, sending a consent control start request to the webpage side, switching the state of the shortcut to a sixth state, generating a dynamic random verification code after responding to a second user operation change event of the intelligent lock, sending the dynamic random verification code to a second user, and switching the state of the shortcut to the first state; receiving a shortcut identifier, an access token and a verification code verification request sent by a webpage end, verifying whether the verification code is consistent with the generated dynamic random verification code, if so, responding to the webpage end that the verification code verification is successful, and switching the state of the shortcut to a seventh state; and receiving the shortcut identification, the access token and the intelligent lock opening or closing operation request sent by the webpage end, judging whether the shortcut state is a seventh state, and executing the intelligent lock opening or closing operation if the shortcut state is the seventh state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311239144.8A CN116978150B (en) | 2023-09-25 | 2023-09-25 | Intelligent lock control method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311239144.8A CN116978150B (en) | 2023-09-25 | 2023-09-25 | Intelligent lock control method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116978150A true CN116978150A (en) | 2023-10-31 |
CN116978150B CN116978150B (en) | 2024-01-05 |
Family
ID=88483583
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311239144.8A Active CN116978150B (en) | 2023-09-25 | 2023-09-25 | Intelligent lock control method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116978150B (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008305332A (en) * | 2007-06-11 | 2008-12-18 | Synchro Co Ltd | Security management system |
US20130145458A1 (en) * | 2011-12-02 | 2013-06-06 | Rong-Feng Cheng | Electronic device and method for unlocking locked operating system |
CN105574968A (en) * | 2015-12-16 | 2016-05-11 | 江苏嘉泽建设有限公司 | Intelligent building visitor system |
CN106934881A (en) * | 2015-12-30 | 2017-07-07 | 李平川 | Based on wireless charging and wireless carrier communication intelligence lock system and open and close locking method |
CN107180464A (en) * | 2017-05-04 | 2017-09-19 | 深圳家美达科技有限公司 | A kind of smart lock method for unlocking and the system using this method |
CN107680227A (en) * | 2017-10-20 | 2018-02-09 | 莲花丝路科技有限公司 | A kind of application method and system of smart lock low power consumption remote control system |
CN108109241A (en) * | 2017-12-21 | 2018-06-01 | 广东汇泰龙科技有限公司 | Safe domestic intelligent cloud lock embedding grammar, system and the cloud lock of embedded SE modules |
CN109615730A (en) * | 2018-10-26 | 2019-04-12 | 杭州云时智创科技有限公司 | A kind of secondary authentication unlocking system of smart lock and method |
CN109712293A (en) * | 2018-12-28 | 2019-05-03 | 深圳市简工智能科技有限公司 | Control method, mobile terminal and the readable storage medium storing program for executing of smart lock |
CN109903469A (en) * | 2019-01-17 | 2019-06-18 | 杭州新定位科技有限公司 | Method is given back in shared device borrow, sharing means unlocking shuts method and terminal |
CN110197545A (en) * | 2019-06-03 | 2019-09-03 | 凯拔(中国)科技有限公司 | A kind of smart lock and its management method, system |
CN110601931A (en) * | 2019-09-10 | 2019-12-20 | 杭州行至云起科技有限公司 | Batch configuration method and system of intelligent home system |
WO2021023164A1 (en) * | 2019-08-02 | 2021-02-11 | 云丁网络技术(北京)有限公司 | Intelligent lock control method and system |
CN112819999A (en) * | 2020-12-31 | 2021-05-18 | 重庆房慧科技有限公司 | Intelligent security system |
CN113593088A (en) * | 2021-07-27 | 2021-11-02 | 胡奕旸 | Intelligent unlocking method, intelligent lock, mobile terminal and server |
CN113689607A (en) * | 2021-09-15 | 2021-11-23 | 深圳指芯物联技术有限公司 | Intelligent door lock code scanning unlocking method and system based on application program |
CN116543482A (en) * | 2023-05-17 | 2023-08-04 | 深圳市慧星辰科技有限公司 | Unlocking method, intelligent door lock and storage medium |
-
2023
- 2023-09-25 CN CN202311239144.8A patent/CN116978150B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008305332A (en) * | 2007-06-11 | 2008-12-18 | Synchro Co Ltd | Security management system |
US20130145458A1 (en) * | 2011-12-02 | 2013-06-06 | Rong-Feng Cheng | Electronic device and method for unlocking locked operating system |
CN105574968A (en) * | 2015-12-16 | 2016-05-11 | 江苏嘉泽建设有限公司 | Intelligent building visitor system |
CN106934881A (en) * | 2015-12-30 | 2017-07-07 | 李平川 | Based on wireless charging and wireless carrier communication intelligence lock system and open and close locking method |
CN107180464A (en) * | 2017-05-04 | 2017-09-19 | 深圳家美达科技有限公司 | A kind of smart lock method for unlocking and the system using this method |
CN107680227A (en) * | 2017-10-20 | 2018-02-09 | 莲花丝路科技有限公司 | A kind of application method and system of smart lock low power consumption remote control system |
CN108109241A (en) * | 2017-12-21 | 2018-06-01 | 广东汇泰龙科技有限公司 | Safe domestic intelligent cloud lock embedding grammar, system and the cloud lock of embedded SE modules |
CN109615730A (en) * | 2018-10-26 | 2019-04-12 | 杭州云时智创科技有限公司 | A kind of secondary authentication unlocking system of smart lock and method |
CN109712293A (en) * | 2018-12-28 | 2019-05-03 | 深圳市简工智能科技有限公司 | Control method, mobile terminal and the readable storage medium storing program for executing of smart lock |
CN109903469A (en) * | 2019-01-17 | 2019-06-18 | 杭州新定位科技有限公司 | Method is given back in shared device borrow, sharing means unlocking shuts method and terminal |
CN110197545A (en) * | 2019-06-03 | 2019-09-03 | 凯拔(中国)科技有限公司 | A kind of smart lock and its management method, system |
WO2021023164A1 (en) * | 2019-08-02 | 2021-02-11 | 云丁网络技术(北京)有限公司 | Intelligent lock control method and system |
CN110601931A (en) * | 2019-09-10 | 2019-12-20 | 杭州行至云起科技有限公司 | Batch configuration method and system of intelligent home system |
CN112819999A (en) * | 2020-12-31 | 2021-05-18 | 重庆房慧科技有限公司 | Intelligent security system |
CN113593088A (en) * | 2021-07-27 | 2021-11-02 | 胡奕旸 | Intelligent unlocking method, intelligent lock, mobile terminal and server |
CN113689607A (en) * | 2021-09-15 | 2021-11-23 | 深圳指芯物联技术有限公司 | Intelligent door lock code scanning unlocking method and system based on application program |
CN116543482A (en) * | 2023-05-17 | 2023-08-04 | 深圳市慧星辰科技有限公司 | Unlocking method, intelligent door lock and storage medium |
Non-Patent Citations (2)
Title |
---|
姬鹏飞;: "基于OneNET的智能门锁系统平台软件设计与实现", 现代计算机(专业版), no. 27 * |
廖杰;黄文强;: "基于云计算的动态密码门禁系统", 智能建筑, no. 07 * |
Also Published As
Publication number | Publication date |
---|---|
CN116978150B (en) | 2024-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109819426B (en) | Network distribution method of household appliance, mobile terminal and storage medium | |
CN108173822B (en) | Intelligent door lock control method, intelligent door lock and computer readable storage medium | |
US7539863B2 (en) | Remote services for portable computing environment | |
CN112822222B (en) | Login verification method, automatic login verification method, server and client | |
CN108183950B (en) | Method and device for establishing connection of network equipment | |
CN101515927A (en) | Isolation mode supportive internet access control method, system and equipment | |
CN105100094B (en) | A kind of solution lock control method and terminal | |
CN110932944A (en) | Method and system for controlling intelligent household equipment by visitor terminal | |
CN101854250A (en) | Electronic device management system and method | |
CN105553920A (en) | Data interaction method, apparatus, and system | |
CN113674455B (en) | Remote control method, device, system, equipment and storage medium for intelligent door lock | |
US20090031011A1 (en) | Device management system and method for setting configuration-valve therein | |
CN1885770B (en) | Authentication method | |
CN109451496A (en) | Connection authentication method and authentication system thereof | |
WO2016115759A1 (en) | Method for logging in website, server, client and peripheral | |
CN112532662A (en) | Control method and system of Internet of things equipment and computer equipment | |
CN117022030A (en) | Safety protection method and device for vehicle charging pile, electronic equipment and storage medium | |
CN109472904B (en) | Door lock password management system and method | |
CN116978150B (en) | Intelligent lock control method, device and system | |
CN113037736B (en) | Authentication method, device, system and computer storage medium | |
CN112437071B (en) | Method, system, device and storage medium for controlling device | |
CN113626789A (en) | User operation request processing method and device and electronic equipment | |
US11163863B2 (en) | Biometrics-based control device | |
CN116627595A (en) | Virtual machine creation method and related components | |
CN116546062A (en) | Cloud mobile phone control method and device, cloud server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |