CN117253306A - Base station intelligent lock control method, system and computer equipment - Google Patents

Base station intelligent lock control method, system and computer equipment Download PDF

Info

Publication number
CN117253306A
CN117253306A CN202311270739.XA CN202311270739A CN117253306A CN 117253306 A CN117253306 A CN 117253306A CN 202311270739 A CN202311270739 A CN 202311270739A CN 117253306 A CN117253306 A CN 117253306A
Authority
CN
China
Prior art keywords
intelligent lock
unlocking
base station
monitoring platform
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311270739.XA
Other languages
Chinese (zh)
Inventor
甘国勇
夏琨雄
谢麒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuling Branch Of China Iron Tower Co ltd
Original Assignee
Fuling Branch Of China Iron Tower Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuling Branch Of China Iron Tower Co ltd filed Critical Fuling Branch Of China Iron Tower Co ltd
Priority to CN202311270739.XA priority Critical patent/CN117253306A/en
Publication of CN117253306A publication Critical patent/CN117253306A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to a base station intelligent lock control method, a base station intelligent lock control system and computer equipment, and belongs to the technical field of communication. The base station intelligent lock control system utilizes an intelligent lock to realize access control of the base station, a terminal of a legal user is in communication connection with the movable ring monitoring platform, and the movable ring monitoring platform is in communication with the intelligent lock of the base station through an FSU (frequency shift unit) deployed in the base station. When the legal user needs to unlock the intelligent lock, an unlocking instruction can be issued to the terminal, under the condition that communication connection is kept between the terminal and the movable ring monitoring platform, the terminal sends a first unlocking request to the movable ring monitoring platform according to the unlocking instruction, the movable ring monitoring platform carries out identity authentication on the unlocking application user according to the first unlocking request, and under the condition that authentication passes, the movable ring monitoring platform controls the intelligent lock to unlock, so that the legal user can obtain the access control formed by the intelligent lock. The scheme simplifies the flow of personnel entering and exiting the base station, reduces the difficulty and workload of access control management of the base station, and obviously enhances the safety of base station facilities.

Description

Base station intelligent lock control method, system and computer equipment
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, a system, and a computer device for controlling an intelligent lock of a base station.
Background
At present, a communication base station door is generally managed by adopting a mechanical door lock, the number of mechanical keys is large, the duplication is simple, the risk of illegal invasion of a base station is high, and the safety of base station facilities is seriously threatened; meanwhile, according to the demands of different people for entering and exiting the base station, keys of the mechanical door lock also need to be circulated among different people, so that the keys are inconvenient to manage and use.
Disclosure of Invention
In order to enhance the safety of base station facilities and improve the convenience of access control of base stations, the embodiment of the application provides a control method, a system and computer equipment for intelligent locks of base stations.
In a first aspect, the present application provides a base station intelligent lock control method, applied to a terminal in a base station intelligent lock control system, where the base station intelligent lock control system includes a mobile ring monitoring platform, a terminal configured to be in communication connection with the mobile ring monitoring platform, an intelligent lock (intelligent door lock) disposed on a base station, and a field monitoring unit (Field Supervision Unit, FSU), where the FSU is configured to be in communication connection with the mobile ring monitoring platform and the intelligent lock, respectively; the base station intelligent lock control method comprises the following steps:
The terminal receives unlocking instructions aiming at the intelligent lock;
under the condition that communication connection exists between the mobile ring monitoring platform and the mobile ring monitoring platform, the terminal sends a first unlocking request to the mobile ring monitoring platform according to the unlocking instruction, so that the mobile ring monitoring platform authenticates an unlocking application user according to the first unlocking request, and controls the intelligent lock to unlock through the FSU under the condition that authentication is passed, and the unlocking application user is a user bound with the terminal.
By adopting the technical scheme, the access control of the base station is realized by utilizing the intelligent lock, the terminal of the legal user is in communication connection with the movable ring monitoring platform, and the movable ring monitoring platform is in communication with the intelligent lock of the base station through the FSU deployed in the base station. When a legal user wants to unlock the intelligent lock, the legal user can serve as an unlocking application user to issue an unlocking instruction for the intelligent lock to the terminal of the legal user, under the condition that communication connection is kept between the terminal and the movable ring monitoring platform, the terminal sends a first unlocking request to the movable ring monitoring platform according to the unlocking instruction, the movable ring monitoring platform carries out identity authentication on the unlocking application user according to the first unlocking request, and under the condition that authentication passes, the movable ring monitoring platform can control the intelligent lock to unlock, so that the legal user can obtain an access control formed by the intelligent lock. In the scheme, personnel enter the base station and do not depend on an entity key, the management of the base station door lock abandons the key circulation process and the key circulation registration process, the flow of personnel entering and exiting the base station is simplified, and the difficulty and the workload of base station access control management are reduced; meanwhile, in the intelligent lock access control management process, the risk that an entity key is copied basically does not exist, and the safety of base station facilities is obviously enhanced.
Optionally, the terminal is further configured to communicate with the smart lock by means of close range communication;
after the terminal sends a first unlocking request to the movable ring monitoring platform according to the unlocking instruction, the base station intelligent lock control method further comprises the following steps: the terminal receives an FSU off-line notification sent by the movable ring monitoring platform, wherein the FSU off-line notification is used for indicating that the FSU is in an off-line state currently; the terminal sends a second unlocking request to the intelligent lock in the short-range communication mode so that the intelligent lock can authenticate the unlocking application user according to the second unlocking request and unlock the intelligent lock under the condition that authentication is passed;
or alternatively, the first and second heat exchangers may be,
after the terminal receives the unlocking instruction, the base station intelligent lock control method further comprises the following steps: under the condition that communication connection does not exist between the intelligent lock and the movable ring monitoring platform, the terminal sends a third unlocking request to the intelligent lock in the short-range communication mode according to the unlocking instruction, so that the intelligent lock authenticates the unlocking application user according to the third unlocking request, and the intelligent lock is unlocked under the condition that authentication passes.
Through adopting above-mentioned technical scheme, still can communicate through the close range communication mode between terminal and the intelligent lock, FSU is in offline state in some occasions, consequently the movable ring monitor platform can't control the intelligent lock through FSU, nevertheless the movable ring monitor platform receives first unlocking request and confirm after FSU is in offline state, can send FSU off-line notice to the terminal. The terminal can know the condition that the FSU is in an offline state currently through the FSU offline notification, so that the terminal can send a second unlocking request to the intelligent lock in a near-field communication mode, and the intelligent lock side can authenticate the unlocking application user according to the second unlocking request and unlock the intelligent lock under the condition that authentication is passed. Under the condition that no communication connection exists between the terminal and the movable ring monitoring platform in other situations, the terminal can send a third unlocking request to the intelligent lock in a near field communication mode according to the unlocking instruction, so that the intelligent lock side authenticates an unlocking application user according to the third unlocking request, and the intelligent lock is unlocked under the condition that authentication is passed. Based on the scheme, under the condition that no communication connection exists between the terminal and the movable ring monitoring platform or between the movable ring monitoring platform and the FSU, unlocking application users can still control the intelligent lock to unlock through own terminal, the purpose of accessing through the base station is achieved, and the application scene of unlocking paths of the intelligent lock and control of the intelligent lock of the base station is expanded.
In a second aspect, the present application provides a base station intelligent lock control method, which is applied to a mobile ring monitoring platform in a base station intelligent lock control system, where the base station intelligent lock control system includes the mobile ring monitoring platform, a terminal configured to be in communication connection with the mobile ring monitoring platform, an intelligent lock deployed at a base station, and an FSU configured to be in communication connection with the mobile ring monitoring platform and the intelligent lock, respectively; the base station intelligent lock control method comprises the following steps:
the movable ring monitoring platform receives a first unlocking request which is sent by the terminal and aims at the intelligent lock;
the movable ring monitoring platform authenticates an unlocking application user according to the first unlocking request, wherein the unlocking application user is a user bound with the terminal;
and under the condition that authentication is passed and the FSU is in an on-line state, the movable ring monitoring platform sends an unlocking instruction to the FSU so as to instruct the FSU to control the intelligent lock to be unlocked.
By adopting the technical scheme, the access control of the base station is realized by utilizing the intelligent lock, the terminal of the legal user is in communication connection with the movable ring monitoring platform, and the movable ring monitoring platform is in communication with the intelligent lock of the base station through the FSU deployed in the base station. When a legal user wants to unlock the intelligent lock, the legal user can serve as an unlocking application user to issue an unlocking instruction for the intelligent lock to the terminal of the legal user, under the condition that communication connection is kept between the terminal and the movable ring monitoring platform, the terminal sends a first unlocking request to the movable ring monitoring platform according to the unlocking instruction, after the movable ring monitoring platform receives the first unlocking request, the movable ring monitoring platform carries out identity authentication on the unlocking application user according to the first unlocking request, and under the condition that authentication passes (namely, the unlocking application person is determined to be the legal user), an unlocking instruction is sent to the FSU to control the intelligent lock to unlock, so that the legal user can obtain an access control formed by the intelligent lock. In the scheme, personnel enter the base station and do not depend on an entity key, the management of the base station door lock abandons the key circulation process and the key circulation registration process, the flow of personnel entering and exiting the base station is simplified, and the difficulty and the workload of base station access control management are reduced; meanwhile, in the intelligent lock access control management process, the risk that an entity key is copied basically does not exist, and the safety of base station facilities is obviously enhanced.
Optionally, the terminal is further configured to communicate with the smart lock by means of close range communication;
after the movable ring monitoring platform receives the first unlocking request for the intelligent lock sent by the terminal, the base station intelligent lock control method further comprises the following steps: under the condition that the FSU is in an offline state, the movable ring monitoring platform sends an FSU offline notification to the terminal so that the terminal can control the intelligent lock to be unlocked through the short-range communication mode;
or alternatively, the first and second heat exchangers may be,
the base station intelligent lock control method further comprises the following steps: under the condition that communication connection is not established between the mobile ring monitoring platform and the terminal, the mobile ring monitoring platform receives a third unlocking request from the FSU, and the third unlocking request is generated by the terminal and sent to the FSU through the intelligent lock; the movable ring monitoring platform authenticates the unlocking application user according to the third unlocking request; and under the condition that authentication is passed, the movable ring monitoring platform sends an unlocking instruction to the FSU so as to instruct the FSU to control the intelligent lock to be unlocked.
Through adopting above-mentioned technical scheme, still can communicate through the close range communication mode between terminal and the intelligent lock, FSU is in offline state in some occasions, consequently the movable ring monitor platform can't control the intelligent lock through FSU, nevertheless the movable ring monitor platform receives first unlocking request and confirm after FSU is in offline state, can send FSU off-line notice to the terminal. The terminal can know the condition that the FSU is in an offline state currently through the FSU offline notification, so that the terminal can send a second unlocking request to the intelligent lock in a near-field communication mode, and the intelligent lock side can authenticate the unlocking application user according to the second unlocking request and unlock the intelligent lock under the condition that authentication is passed. Under the condition that communication connection does not exist between the terminal and the movable ring monitoring platform in other situations, the movable ring monitoring platform can receive a third unlocking request generated and sent by the terminal through the FSU, then authenticate an unlocking application user according to the third unlocking request, and send an unlocking instruction to the FSU under the condition that authentication is passed so as to instruct the FSU to control the intelligent lock to unlock. Based on the scheme, under the condition that no communication connection exists between the terminal and the movable ring monitoring platform or between the movable ring monitoring platform and the FSU, unlocking application users can still control the intelligent lock to unlock through own terminal, the purpose of accessing through the base station is achieved, and the application scene of unlocking paths of the intelligent lock and control of the intelligent lock of the base station is expanded.
In a third aspect, the present application provides a control method for an intelligent lock of a base station, which is applied to an intelligent lock control system of a base station, where the control system of the intelligent lock of the base station includes a moving ring monitoring platform, a terminal configured to be in communication connection with the moving ring monitoring platform, the intelligent lock deployed in the base station, and an FSU configured to be in communication connection with the moving ring monitoring platform and the intelligent lock, respectively; the base station intelligent lock control method comprises the following steps:
the intelligent lock receives an unlocking notification sent by the FSU, the unlocking notification is generated by the FSU according to an unlocking instruction sent by the movable ring monitoring platform, and the unlocking instruction is generated and sent to the FSU by the movable ring monitoring platform after the authentication of an unlocking application user bound with the terminal is passed;
and the intelligent lock is unlocked according to the unlocking notification.
By adopting the technical scheme, the access control of the base station is realized by utilizing the intelligent lock, the terminal of the legal user is in communication connection with the movable ring monitoring platform, and the movable ring monitoring platform is in communication with the intelligent lock of the base station through the FSU deployed in the base station. When a legal user wants to unlock the intelligent lock, the legal user can serve as an unlocking instruction of the unlocking application user to issue an unlocking instruction for the intelligent lock to the terminal of the legal user, the terminal sends an unlocking request to the movable ring monitoring platform according to the unlocking instruction, the movable ring monitoring platform carries out identity authentication on the unlocking application user according to the unlocking request after receiving the unlocking request, under the condition that authentication is passed (namely, the unlocking application personnel is determined to be a legal user), the movable ring monitoring platform sends the unlocking instruction to the FSU, the FSU sends an unlocking notification to the intelligent lock according to the received unlocking instruction, and the intelligent lock is instructed to unlock according to the unlocking instruction, so that the legal user can obtain the access control formed by the intelligent lock. In the scheme, personnel enter the base station and do not depend on an entity key, the management of the base station door lock abandons the key circulation process and the key circulation registration process, the flow of personnel entering and exiting the base station is simplified, and the difficulty and the workload of base station access control management are reduced; meanwhile, in the intelligent lock access control management process, the risk that an entity key is copied basically does not exist, and the safety of base station facilities is obviously enhanced.
Optionally, the intelligent lock is further configured to be in communication connection with the terminal through a short-range communication manner;
before the intelligent lock receives the unlocking notification sent by the FSU, the base station intelligent lock control method further comprises the following steps: the intelligent lock receives a third unlocking request sent by the terminal; when the FSU is in an on-line state, the intelligent lock forwards the third unlocking request to the movable ring monitoring platform through the FSU so that the movable ring monitoring platform authenticates the unlocking application user according to the third unlocking request;
or alternatively, the first and second heat exchangers may be,
the base station intelligent lock control method further comprises the following steps: the intelligent lock receives a third unlocking request sent by the terminal; under the condition that the FSU is in an offline state, the intelligent lock authenticates the unlocking application user according to the third unlocking request; and under the condition that authentication is passed, unlocking the intelligent lock.
Through adopting above-mentioned technical scheme, still can communicate through the close range communication mode between terminal and the intelligent lock, in the scene that does not have communication connection between terminal and the rotating ring monitor platform, the terminal can be sent to the intelligent lock according to the third request of unblanking that the instruction was generated, and the intelligent lock can decide according to FSU current state by rotating ring monitor platform or intelligent lock itself according to this third request of unblanking to apply for the user to carry out the authentication to the unlocking to unblanking under the condition that the authentication passed. Based on the scheme, under the condition that no communication connection exists between the terminal and the movable ring monitoring platform or between the movable ring monitoring platform and the FSU, unlocking application users can still control the intelligent lock to unlock through own terminal, the purpose of accessing through the base station is achieved, and the application scene of unlocking paths of the intelligent lock and control of the intelligent lock of the base station is expanded.
Optionally, after the intelligent lock is unlocked, the method further comprises:
the intelligent lock generates unlocking record information;
and under the condition that the FSU is in an on-line state, the intelligent lock sends the unlocking record information to the movable ring monitoring platform through the FSU, and the movable ring monitoring platform stores and manages the unlocking record information.
Optionally, the unlocking record information generated by the intelligent lock includes at least one of the following:
the unlocking application user information;
the unlocking time information of the intelligent lock;
a door unopened event, wherein the door unopened event is an event triggered by the door unopened in a preset first time period after the intelligent lock is unlocked;
and the door non-closing event is an event triggered by the fact that the door is not closed within a preset second time period after the intelligent lock is unlocked, and the second time period is longer than the first time period.
In a fourth aspect, the present application provides a computer device, including a processor, a memory, and a communication bus, where the communication bus is configured to implement a communication connection between the processor and the memory, where the memory stores any one of a first base station smart lock control program, a second base station smart lock control program, and a third base station smart lock control program, where the first base station smart lock control program is executable by the processor to implement the base station smart lock control method of any one of the first aspects; the second base station intelligent lock control program is executable by the processor to implement the base station intelligent lock control method according to any one of the foregoing second aspects; the third base station intelligent lock control program is executable by the processor to implement the base station intelligent lock control method of any one of the foregoing third aspects.
In a fifth aspect, the present application further provides a base station intelligent lock control system, including a mobile ring monitoring platform, a terminal communicatively connected with the mobile ring monitoring platform, an intelligent lock deployed in a base station, and an FSU, where the FSU is configured to be communicatively connected with the mobile ring monitoring platform and the intelligent lock, respectively, where the terminal is a computer device in which a first base station intelligent lock control program is stored in the memory, the mobile ring monitoring platform is a computer device in which a second base station intelligent lock control program is stored in the memory, and the mobile ring monitoring platform is a computer device in which a third base station intelligent lock control program is stored in the memory.
In summary, the present application at least includes the following beneficial technical effects:
1. the personnel entering the base station is independent of an entity key, the management of the base station door lock abandons the key circulation process and the key circulation registration process, the process of entering and exiting the base station by personnel is simplified, and the difficulty and the workload of base station access control management are reduced;
2. in the intelligent lock access control process, the risk that an entity key is copied basically does not exist, and the safety of base station facilities is obviously enhanced.
Drawings
Fig. 1 is a first system schematic diagram of a base station intelligent lock control system provided in an embodiment of the present application;
fig. 2 is a schematic diagram of an interaction flow of a base station intelligent lock control method provided in an embodiment of the present application;
fig. 3a is a schematic diagram of an interaction interface of a terminal provided in an embodiment of the present application;
fig. 3b is a schematic diagram of another interactive interface of the terminal provided in the embodiment of the present application;
fig. 4 is a second system schematic diagram of the base station intelligent lock control system provided in the embodiment of the present application;
fig. 5 is a third system schematic diagram of a base station intelligent lock control system provided in an embodiment of the present application;
fig. 6a is a fourth system schematic diagram of a base station smart lock control system provided in an embodiment of the present application;
FIG. 6b is a schematic diagram of an interaction flow of a base station intelligent lock control method based on the base station intelligent lock control system shown in FIG. 6 a;
fig. 7a is a fifth system schematic diagram of a base station smart lock control system provided in an embodiment of the present application;
FIG. 7b is a schematic diagram of an interaction flow of a base station intelligent lock control method based on the base station intelligent lock control system shown in FIG. 7 a;
fig. 8a is a sixth system schematic diagram of a base station smart lock control system provided in an embodiment of the present application;
FIG. 8b is a schematic diagram of an interaction flow of a base station intelligent lock control method based on the base station intelligent lock control system shown in FIG. 8 a;
fig. 9 is a schematic hardware structure of a computer device provided in an embodiment of the present application.
Reference numerals illustrate:
1-a base station intelligent lock control system; 20-a dynamic ring monitoring platform; 30-FSU; 40-terminal; 50-intelligent locks; 401-unlocking a function control; 60-an access control monitoring terminal; 90-computer device; 91-a processor; 92-memory; 93-communication bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In order to maintain the safety of base station facilities and simplify the flow of base station access control management, the complexity and workload of base station access control management are reduced, and the embodiment provides a scheme for realizing base station access control management based on an intelligent lock: whether the door lock of the civil engineering machine room in the base station or the door lock of the outdoor cabinet of the base station can adopt the intelligent lock 50 to replace the traditional mechanical lock, the system for controlling and managing the intelligent locks 50 is the base station intelligent lock control system 1, and the system architecture of the base station intelligent lock control system 1 is described below with reference to fig. 1: the base station intelligent lock control system 1 comprises a movable ring monitoring platform 20, an FSU30, a terminal 40 and an intelligent lock 50.
The intelligent lock 50 comprises an electronic lock cylinder (Electronic cylinder), wherein the electronic lock cylinder is an independent unlocking mechanism which does not depend on a peripheral control circuit of an intelligent electric control door lock, is internally provided with an intelligent chip, can be independently coded and can store and inquire the latest unlocking record. In some examples, the smart lock 50 also supports an Electronic key (Electronic key), which is a carrier that carries Electronic codes, passwords, or other identifying information that can be communicated to and provide operating power for the Electronic lock cylinder.
The FSU30 and the smart lock 50 are both deployed in a base station, and the FSU30 is communicatively connected to the smart lock 50, in some examples communicating between the FSU30 and the smart lock 50 through an RS485 (Recommended Standard 485) interface; in other examples, other interface protocols may be used for communication between the FSU30 and the smart lock 50. The communication method between the FSU30 and the smart lock 50 is not particularly limited in this embodiment, and may be wired or wireless. On the other hand, the FSU30 is further configured to communicate with the ring monitor platform 20 to report information of the smart lock 50 to the ring monitor platform 20, and to receive instructions from the ring monitor platform 20 and control the smart lock 50 according to the instructions.
The terminal 40 is configured to communicate with the rotating ring monitoring platform 20. In some examples of this embodiment, the terminal 40 may interact with the rotating ring monitoring platform 20 through a client (including at least one of an application APP and an applet) deployed on the device. Typically, the terminal 40 is a portable user terminal, such as a laptop, a cell phone or a tablet computer, for example, for a field maintainer or three major operator personnel. It should be appreciated that a terminal 40 is typically configured for use by a user, and that there is a relationship or temporary relationship between the terminal 40 and its user, based on which a binding relationship may be considered to exist between the terminal 40 and the user: when a terminal 40 sends out an unlocking request, the corresponding unlocking application user can be considered as the user bound with the terminal 40.
It will be appreciated that the ring monitoring platform 20 may manage the smart locks 50 of multiple base stations simultaneously, and thus, the smart lock control system 1 may include multiple smart locks 50 at a base station. In addition, more than one smart lock 50 may be deployed within a base station, and one FSU30 may be communicatively coupled to more than one smart lock 50. Under one ring monitoring platform 20, there are usually a plurality of users who need to apply for unlocking the smart lock 50, and thus, the base station smart lock control system 1 may include a plurality of terminals 40.
The following describes a flow of implementing unlocking control for the base station intelligent lock control system 1 with reference to fig. 2:
s202: and the terminal receives unlocking instructions aiming at the intelligent lock.
The unlock indication received by the terminal 40 is typically issued by its user, for example, the user in fig. 3a may issue the unlock indication to the terminal 40 through the unlock function control 401 in the touch base station intelligent access control APP. It will be appreciated by those skilled in the art that fig. 3a is merely an alternative illustration of a client interactive interface on the terminal 40 and is not intended to be limiting as to the display interface of the terminal 40.
Since a user may need to enter different base stations at different times or may need to unlock different smart locks 50 of the base stations at different times, when the user issues an unlock instruction to the terminal 40, the user designates to the terminal 40 which smart lock 50 the unlock instruction corresponds to. In some examples, the terminal 40 may report its own geographic location information to the ring monitor platform 20, where the ring monitor platform 20 side stores the location information of each smart lock 50 in advance, so after it receives the address location information of the terminal 40, it may match the smart locks 50 in a certain area range with the location of the terminal 40 as the center, and then provide the identification information of these smart locks 50 to the terminal 40, so that the terminal 40 may show the identification information of these smart locks 50 to the user, so that the user may select and issue an unlocking instruction for the selected smart lock 50, for example, see fig. 3 b.
S204: under the condition that communication connection exists between the same-ring monitoring platforms, the terminal sends a first unlocking request to the same-ring monitoring platform according to unlocking instructions.
After receiving the unlock indication, the terminal 40 may generate an unlock request. In this embodiment, if the communication connection is maintained between the terminal 40 and the moving ring monitoring platform 20, the unlocking request generated by the terminal 40 is sent to the moving ring monitoring platform 20, and in this embodiment, in order to distinguish the unlocking request from other unlocking requests related later, the unlocking request generated by the terminal 40 and sent to the moving ring monitoring platform 20 is referred to as a "first unlocking request".
If the terminal 40 is a portable terminal, it communicates with the ring monitor platform 20 generally by wireless communication, however, this embodiment does not exclude the case that the terminal 40 communicates with the ring monitor platform 20 by wired communication.
S206: and the movable ring monitoring platform authenticates the unlocking application user according to the first unlocking request.
The first unlocking request includes information for the ring monitoring platform 20 to authenticate the identity of the unlocking application user, so that after the ring monitoring platform 20 receives the first unlocking request from the terminal 40, the unlocking application user can be authenticated according to the first unlocking request. The unlocking application user is a user bound with the terminal 40, and is a user who issues an unlocking instruction to the terminal 40 and requests unlocking.
In general, in the case where the terminal 40 is first communicatively connected to the ring monitor platform 20, a user needs to register on the ring monitor platform 20 through a client, please refer to another system architecture diagram of the base station smart lock control system 1 shown in fig. 4: the base station intelligent lock control system 1 further comprises an access control monitoring terminal 60, and the access control monitoring terminal 60 is in communication connection with the movable ring monitoring platform 20. When the terminal 40 is connected to the ring monitor platform 20 for the first time, user data can be filled in an interactive interface shown by the client, then the terminal 40 sends the data information filled in by the user as registration information to the ring monitor platform 20, and the ring monitor platform 20 sends the registration information to the gate inhibition monitor terminal 60. The access control monitoring terminal 60 can audit the registration information of the user, after the audit is passed, the user becomes a legal user, and the movable ring monitoring platform 20 stores the registration information of the legal user as authentication basic information, so that after receiving an unlocking request, the movable ring monitoring platform can authenticate the unlocking application user corresponding to the unlocking request according to the authentication basic information.
In some examples of this embodiment, the registration information formed according to the registration information filled in by the user includes at least one of the unique identification information of the user, such as a user name, an identification card number, a real-name authentication handset number, an international mobile equipment identification (International Mobile Equipment Identity, IMEI) of the terminal 40, a media access control address (Media Access Control Address, MAC) of the terminal 40, and the like, and in addition, the registration information may further include work information such as a work number, unit information of the user, and department information of the user.
In some examples of this embodiment, after the access control monitor terminal 60 side passes the registration information audit of the user, the ring monitor platform 20 may be notified to issue the authentication key to the terminal 40. In the subsequent unlocking application process, the terminal 40 may carry the authentication key in the unlocking request generation to provide the ring monitoring platform 20 with authentication for the unlocking application user according to the authentication key. For example, in some examples, the first unlocking request carries an authentication key, and in other examples, the first unlocking request may carry user information of the unlocking application user, such as unique identification information of the user, or unique identification information and working information of the user, in addition to the authentication key. In some examples of this embodiment, to enhance security of authentication key distribution, the ring monitor platform 20 distributes the authentication key to the terminal 40 through the FSU30, which requires that the terminal 40 is simultaneously in communication connection with the FSU30 when registering with the ring monitor platform 20. In some examples, FSU30 does not support remote wireless communication with terminal 40, so to receive an authentication key from FSU30, terminal 40 needs to be in the vicinity of FSU30 when registering with ring monitoring platform 20, and even needs to be in a wired communication connection with FSU30 to receive an authentication key from FSU30 over the wired communication connection. The authentication key issuing mode can basically ensure that the authentication key cannot be intercepted by a malicious third party in the issuing process, and improves the security and reliability of access control of the base station. It should be understood that if the ring monitor platform 20 subsequently needs to authenticate the unlocking application user with the authentication key sent by the unlocking application user, the ring monitor platform 20 needs to save the authentication key of the legal user after issuing the authentication key to the terminal 40. In some examples of this embodiment, the authentication basic information stored in the ring monitoring platform 20 includes not only registration information of the legitimate user but also an authentication key corresponding to the legitimate user.
In some examples of this embodiment, the access control terminal 60 side may review the registration information of the user by means of manual review. In some examples, through user registration and auditing of the access monitoring terminal 60, not only a legal user pool can be formed to manage legal users, but also the legal users can be managed in a refined manner, for example, different authorities can be allocated to different legal users, for example, some legal users have unlocking authorities in any time period, and other legal users have unlocking authorities only in specific time periods, such as a working day (monday to friday) or a working time period (towards nine to six late); for another example, some legal users can unlock all the intelligent locks 50 of all the base stations within a certain range, and other legal users can unlock only part of the intelligent locks 50; for another example, some legitimate users may query or even derive unlocking record information for the smart lock 50 from the slave ring monitoring platform 20; but other legitimate users do not have that right.
S208: and under the condition that authentication is passed and the FSU is in an on-line state, the movable ring monitoring platform sends an unlocking instruction to the FSU so as to instruct the FSU to control the intelligent lock to unlock.
The authentication result of the ring monitoring platform 20 for the unlocking application user is classified into two types, authentication passing and authentication failing. Under the condition that authentication is passed, if communication connection is kept between the movable ring monitoring platform 20 and the FSU30, that is, the FSU30 is in an on-line state, the movable ring monitoring platform 20 may issue an unlocking instruction to the FSU30 to control unlocking of the intelligent lock 50 through the FSU 30.
S210: the FSU sends unlocking notification to the intelligent lock according to the unlocking instruction.
After receiving the unlocking command, the FSU30 may send an unlocking notification to the smart lock 50, so as to control the smart lock 50 to perform the unlocking action by using the unlocking notification.
S212: the intelligent lock is unlocked according to the unlocking notification.
After the intelligent lock 50 receives the unlocking notification from the FSU30, an unlocking action may be performed to unlock the unlocking application user, so that the unlocking application user can enter the door managed by the intelligent lock 50.
In some examples of this embodiment, after the intelligent lock 50 performs the intelligent unlocking operation, unlocking record information may be generated and sent to the moving ring monitoring platform 20, and the moving ring monitoring platform 20 stores and records the unlocking record information. The unlocking record information stored by the movable ring monitoring platform 20 can be inquired and exported by personnel with rights. In some examples of this embodiment, the smart lock 50 may record at least one of the following information to form the unlock record information:
(1) User information of the unlocking application user, such as the name of the unlocking application user and unit information to which the unlocking application user belongs;
(2) The unlocking time information of the intelligent lock 50 is recorded as 2023, 8, 31, 12:43 minutes;
(3) A door unopened event, which is an event triggered by the fact that the door controlled by the intelligent lock 50 is not opened all the time within a preset first time period after the intelligent lock 50 is unlocked;
(4) The door unclosed event is an event triggered by the door controlled by the smart lock 50 not being closed within a preset second time period after the smart lock 50 is unlocked.
In the monitoring period of the door non-closing event, the execution time of the door opening action, the door entering action and the door closing action is required to be reserved for the unlocking application user, and in the monitoring period of the door non-opening event, the execution time of the door opening action is only required to be reserved for the unlocking application user, so that the preset second time length is longer than the preset first time length.
It will be appreciated that, based on the base station intelligent lock control system 1 shown in fig. 1, if an unlocking application user is to smoothly control unlocking of the intelligent lock 50 through the terminal 40, it is necessary to ensure that there is a communication connection between the terminal 40 and the moving ring monitoring platform 20, that there is a communication connection between the moving ring monitoring platform 20 and the FSU30 (i.e. the FSU30 is online), and that there is a communication connection between the FSU30 and the intelligent lock 50. Since the FSU30 and the smart lock 50 belong to the base station, the reliability of the communication connection between the two is high, so that the situation of disconnection generally does not occur, so in the base station smart lock control system 1 shown in fig. 1, the unlocking application user can smoothly control the smart lock 50 to unlock through the terminal 40, and more depending on the situation of the communication connection between the terminal 40 and the movable ring monitoring platform 20 and between the movable ring monitoring platform 20 and the FSU30, once one of the two communication links is disconnected, for example, the mobile phone of the user has no signal, or the communication link between the FSU30 and the movable ring monitoring platform 20 has a fault, the user cannot normally control the smart lock 50 to unlock.
For the purpose of improving the unlocking success rate through the terminal 40 and the purpose of expanding the unlocking scene of the base station intelligent lock control system 1, the embodiment further provides a base station intelligent lock control system 1, please refer to fig. 5: based on fig. 1, the intelligent lock 50 and the terminal 40 in the base station intelligent lock control system 1 also communicate by a short-range communication mode. In the present embodiment, the near field communication mode refers to a communication mode with a communication distance within 1000m, and includes any one of Bluetooth (Bluetooth) communication, near field communication (Near Field Communication, NFC), wireless local area network (Wireless Local Area Network, WLAN) communication, ultra Wideband (UWB) communication, zigbee (Zigbee) communication, infrared communication (Infrared Communication, IRC), and the like. The communication distance of Bluetooth communication, infrared communication and UWB communication is within 10m, and the communication distance of NFC is not more than 10cm; the communication distance between Zigbee and the network is about 100-150 m. In some examples of this embodiment, bluetooth communication modules are disposed in the terminal 40 and the smart lock 50, and communication connection is implemented between the two through bluetooth communication.
Based on the base station intelligent lock control system 1 provided in fig. 5, it is assumed that the terminal 40 and the mobile ring monitoring platform 20 maintain a communication connection, but the FSU30 is offline, as shown in fig. 6a, and in this case, the flow of the base station intelligent lock control method is as shown in fig. 6 b:
s602: and the terminal receives unlocking instructions aiming at the intelligent lock.
For details of the unlocking instruction issued to the terminal 40 by the user, please refer to the description of the foregoing embodiment, and details thereof are omitted herein.
S604: under the condition that communication connection exists between the same-ring monitoring platforms, the terminal sends a first unlocking request to the same-ring monitoring platform according to unlocking instructions.
In the base station intelligent lock control system 1 shown in fig. 6b, the terminal 40 and the movable ring monitoring platform 20 maintain communication connection, so after the terminal 40 generates the first unlocking request according to the unlocking instruction, the first unlocking request can be sent to the movable ring monitoring platform 20.
S606: and the movable ring monitoring platform authenticates the unlocking application user according to the first unlocking request.
After the movable ring monitoring platform 20 receives the first unlocking request, the unlocking application user can be authenticated according to the first unlocking request, and the authentication principle and implementation details refer to the description of the foregoing embodiments, which is not repeated herein.
S608: and under the condition that authentication is passed and the FSU is offline, the movable ring monitoring platform sends an FSU offline notification to the terminal.
In the case that the authentication of the unlocking application user passes, the movable ring monitoring platform 20 may determine the state of the FSU30, and if the FSU30 is currently in the on-line state, the movable ring monitoring platform 20 will send an unlocking instruction to the FSU30 with reference to the flow shown in fig. 2. However, since the FSU30 is offline in the base station smart lock control system 1 shown in fig. 6a, the ring monitoring platform 20 may send an FSU offline notification to the terminal 40, where the FSU offline notification is used to inform the terminal 40 that the FSU30 is currently offline.
In this embodiment, the moving ring monitoring platform 20 authenticates the unlocking application user according to the first unlocking request, and further determines the state of the FSU30 only if the authentication passes, and in other examples of this embodiment, the moving ring monitoring platform 20 may determine the state of the FSU30 first, and then authenticate the unlocking application user according to the first unlocking request.
S610: and the terminal sends a second unlocking request to the intelligent lock.
After receiving the FSU offline notification, the terminal 40 may generate a second unlock request and send the second unlock request to the smart lock 50 through a close range communication link with the smart lock 50.
In some examples of this embodiment, the information contained in the second unlock request sent by the terminal 40 to the smart lock 50 is consistent with the information contained in the first unlock request it sends to the rotating ring monitoring platform 20. In other examples, the second unlocking request is inconsistent with the information contained in the first unlocking request, for example, the first unlocking request may include an authentication key and user information of the unlocking application user, and the second unlocking request is generated and sent after receiving the FSU offline notification, and the FSU offline notification characterizes that the mobile ring monitoring platform 20 passes the authentication of the unlocking application user, so in these examples, the second unlocking request may directly include authentication passing information characterizing that the mobile ring monitoring platform 20 passes the authentication of the unlocking application user, and does not carry the authentication key and the user information of the unlocking application user.
S612: and the intelligent lock authenticates the unlocking application user according to the second unlocking request.
After the smart lock 50 receives the second unlocking request, the unlocking application user may be authenticated according to the second unlocking request, and in some examples, the authentication process of the smart lock 50 for the unlocking application user according to the second unlocking request is substantially the same as the authentication process of the mobile ring monitoring platform 20 for the unlocking application user according to the first unlocking request.
In other examples, the second unlocking request carries authentication passing information, and when the intelligent lock 50 authenticates the unlocking application user, the key point is to confirm the authenticity of the authentication passing information, if the authentication passing information is true, the intelligent lock 50 passes the authentication of the unlocking application user, otherwise, the authentication of the unlocking application user fails, in this case, the authentication process of the intelligent lock 50 for the unlocking application user is inconsistent with the authentication process of the movable ring monitoring platform 20 for the unlocking application user.
S614: and under the condition that authentication is passed, the intelligent lock is unlocked.
After passing the authentication of the unlocking application user according to the second unlocking request, the smart lock 50 may perform an unlocking action.
After the unlocking action is performed, the intelligent lock 50 can also generate unlocking record information, and send the unlocking record information to the FSU30, and after the FSU30 is restored to the on-line state, the unlocking record information is uploaded to the dynamic ring monitoring platform 20.
Based on the base station intelligent lock control system 1 provided in fig. 5, assuming that there is no communication connection between the terminal 40 and the mobile ring monitoring platform 20, the FSU30 is in an on-line state as shown in fig. 7a, in this case, the flow of the base station intelligent lock control method is as shown in fig. 7 b:
S702: and the terminal receives unlocking instructions aiming at the intelligent lock.
S704: under the condition that the same-ring monitoring platform is not connected with each other in a communication mode, the terminal sends a third unlocking request to the intelligent lock in a near-field communication mode according to the unlocking instruction.
The third unlocking request is used for the intelligent lock 50 to authenticate the unlocking application user, and it should be noted that, the authentication of the unlocking application user according to the third unlocking request may be performed by the intelligent lock 50 itself, or may be implemented by the movable ring monitoring platform 20 in cooperation with the intelligent lock 50, as shown in fig. 7 b.
In some examples of this embodiment, the information contained in the third unlock request is consistent with the information contained in the first unlock request, and in other examples, the information contained in the third unlock request is only partially consistent with the information contained in the first unlock request.
S706: and under the condition that the FSU is in an on-line state, the intelligent lock forwards a third unlocking request to the movable ring monitoring platform through the FSU.
Because the FSU30 is currently in an online state, after the smart lock 50 receives the third unlocking request from the terminal 40, the third unlocking request may be forwarded to the FSU30, so that the FSU30 forwards the third unlocking request to the moving ring monitoring platform 20, and then the moving ring monitoring platform 20 implements authentication of the unlocking application user according to the third unlocking request.
S708: and the movable ring monitoring platform authenticates the unlocking application user according to the third unlocking request.
In some examples, the process of authenticating the unlocking application user by the movable ring monitoring platform 20 according to the third unlocking request is substantially identical to the process of authenticating the unlocking application user by the movable ring monitoring platform 20 according to the first unlocking request, and thus will not be described in detail herein.
S710: and under the condition that authentication is passed and the FSU is in an on-line state, the movable ring monitoring platform sends an unlocking instruction to the FSU so as to instruct the FSU to control the intelligent lock to unlock.
Since the FSU30 has recently sent a third unlock request to the ring monitor platform 20, it is assumed here that the FSU30 is in an online state, so after the user authenticates and passes the unlock application according to the third unlock request, the ring monitor platform 20 may issue an unlock instruction to the FSU30 to control the intelligent lock 50 to unlock through the FSU 30. However, this embodiment does not exclude the case that the FSU30 transmits the third unlocking request to the ring monitoring platform 20 and then goes offline, and in this case, the ring monitoring platform 20 cannot send the unlocking command to the FSU30 after authenticating the unlocking application user according to the third unlocking request.
S712: the FSU sends unlocking notification to the intelligent lock according to the unlocking instruction.
After receiving the unlocking command, the FSU30 may send an unlocking notification to the smart lock 50, so as to control the smart lock 50 to perform an unlocking action by using the unlocking notification.
S714: the intelligent lock is unlocked according to the unlocking notification.
The intelligent lock 50 performs an unlocking operation after receiving an unlocking notification from the FSU30, and unlocks the unlocking application user, so that the unlocking application user can enter the door managed by the intelligent lock 50.
For the scenario that the FSU30 is offline after forwarding the third unlocking request to the ring monitoring platform 20 in an online state, in order to prevent the intelligent lock 50 from being unable to respond to the unlocking request of the terminal 40 for a long time because the unlocking notification sent by the FSU30 is not received, in some examples of this embodiment, the intelligent lock 50 starts a timer to count the time while forwarding the third unlocking request to the FSU30, if the count time period reaches the preset time period, the FSU30 still does not feedback the authentication result of the ring monitoring platform 20 for the third unlocking request, the intelligent lock 50 may authenticate the unlocking application user according to the third unlocking request, and determine whether to unlock according to the authentication result.
After performing the unlocking action, the smart lock 50 may still generate unlocking record information and send the unlocking record information to the FSU30. The FSU30 in an online state may upload unlocking record information to the ring monitoring platform 20.
Based on the base station intelligent lock control system 1 provided in fig. 5, assuming that there is no communication connection between the terminal 40 and the mobile ring monitoring platform 20, the FSU30 is in an offline state, as shown in fig. 8a, and in this case, the flow of the base station intelligent lock control method is as shown in fig. 8 b:
s802: and the terminal receives unlocking instructions aiming at the intelligent lock.
S804: under the condition that the same-ring monitoring platform is not connected with each other in a communication mode, the terminal sends a third unlocking request to the intelligent lock in a near-field communication mode according to the unlocking instruction.
S806: under the condition that the FSU is in an offline state, the intelligent lock authenticates an unlocking application user according to a third unlocking request.
After receiving the third unlocking request from the terminal 40, the smart lock 50 can determine whether the FSU30 is currently in an on-line state, and if not, it performs authentication on the unlocking application user according to the third unlocking request. In some examples of this embodiment, in the user registration process, after the audit of the user registration information by the access monitoring terminal 60 side passes, not only the ring monitoring platform 20 stores the corresponding authentication basic information of the legal user for authenticating the unlocking application user, but also the authentication basic information of the legal user is sent to the intelligent lock 50, so that the intelligent lock 50 stores the authentication basic information for authenticating the unlocking application user later.
S808: and under the condition that authentication is passed, the intelligent lock is unlocked.
After the authentication of the unlocking application user by the smart lock 50 according to the third unlocking request is passed, the unlocking action may be performed.
After performing the unlocking action, the smart lock 50 generates unlocking record information and transmits the unlocking record information to the FSU30. The unlock record information may be uploaded to the ring monitor platform 20 after the FSU30 is restored to the on-line state.
In some examples of this embodiment, when FSU30 or smart lock 50 is abnormal, an electronic key is used to open the door. When the FSU30 is working properly and the door is opened using the electronic key, the smart lock 50 should record the unlocking event and report the alarm information to the ring monitoring platform 20 through the FSU30. At the same time, the electronic key can record the unlocking time and report to the terminal 40 through a short-range communication mode such as Bluetooth.
In order to better execute the program of the above method, the embodiment of the present application further provides a computer device 90, as shown in fig. 9, where the computer device 90 includes a processor 91, a memory 92, and a communication bus 93, where the communication bus 93 is used to implement a communication connection between the processor 91 and the memory 92.
Wherein the memory 92 may be used to store instructions, programs, code sets, or instruction sets. The memory 92 may include a stored program area and a stored data area, where the stored program area may store instructions for implementing an operating system, instructions for at least one function, and instructions for implementing the base station smart lock control method provided in the above embodiment (e.g., any one of the first base station smart lock control program, the second base station smart lock control program, and the third base station smart lock control program is stored in the memory 92), and so on; the storage data area may store data and the like involved in the base station intelligent lock control method provided in the above embodiment.
Processor 91 may include one or more processing cores. The processor 91 performs various functions of the present application and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 92, invoking data stored in the memory 92. The processor 91 may be at least one of an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a digital signal processor (Digital Signal Processor, DSP), a digital signal processing device (Digital Signal Processing Device, DSPD), a programmable logic device (Programmable Logic Device, PLD), a field programmable gate array (Field Programmable Gate Array, FPGA), a central processing unit (Central Processing Unit, CPU), a controller, a microcontroller, and a microprocessor. It will be appreciated that the electronic device for implementing the functions of the processor 91 may be other for different apparatuses, and the embodiments of the present application are not specifically limited.
In some examples of this embodiment, any one of the first base station smart lock control program, the second base station smart lock control program, and the third base station smart lock control program is stored in the memory 92. The first base station smart lock control program may be read, compiled and executed by the processor 91 to implement a procedure on the terminal 40 side in the base station smart lock control method in any of the foregoing examples, in which case the computer device 90 is the terminal 40, which may be implemented in various forms, such as a mobile phone, a tablet computer, a palm computer, a notebook computer, and so on. The second base station smart lock control program is readable, compiled and executed by the processor 91 to implement the flow on the side of the ring monitor platform 20 in the base station smart lock control method in any of the foregoing examples, in which case the computer device 90 is embodied as the ring monitor platform 20, which may be implemented by a server. The third base station smart lock control program may be read, compiled and executed by the processor 91 to implement the flow on the smart lock 50 side in the base station smart lock control method in any of the foregoing examples, in which case the computer device 90 is embodied as the smart lock 50.
Embodiments of the present application provide a computer-readable storage medium, for example, comprising: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes. The computer readable storage medium stores at least one of the first base station smart lock control program, the second base station smart lock control program, and the third base station smart lock control program.
The foregoing embodiments are only used for describing the technical solution of the present application in detail, but the descriptions of the foregoing embodiments are only used for helping to understand the method and the core idea of the present application, and should not be construed as limiting the present application. Variations or alternatives that are readily contemplated by those skilled in the art within the scope of the present disclosure are intended to be encompassed within the scope of the present disclosure.

Claims (10)

1. The base station intelligent lock control method is characterized by being applied to a terminal in a base station intelligent lock control system, wherein the base station intelligent lock control system comprises a movable ring monitoring platform, a terminal configured to be in communication connection with the movable ring monitoring platform, an intelligent lock deployed at a base station and a field monitoring unit FSU, and the FSU is configured to be in communication connection with the movable ring monitoring platform and the intelligent lock respectively; the base station intelligent lock control method comprises the following steps:
The terminal receives unlocking instructions aiming at the intelligent lock;
under the condition that communication connection exists between the mobile ring monitoring platform and the mobile ring monitoring platform, the terminal sends a first unlocking request to the mobile ring monitoring platform according to the unlocking instruction, so that the mobile ring monitoring platform authenticates an unlocking application user according to the first unlocking request, and controls the intelligent lock to unlock through the FSU under the condition that authentication is passed, and the unlocking application user is a user bound with the terminal.
2. The base station smart lock control method of claim 1, wherein the terminal is further configured to communicate with the smart lock by means of near field communication;
after the terminal sends a first unlocking request to the movable ring monitoring platform according to the unlocking instruction, the base station intelligent lock control method further comprises the following steps: the terminal receives an FSU off-line notification sent by the movable ring monitoring platform, wherein the FSU off-line notification is used for indicating that the FSU is in an off-line state currently; the terminal sends a second unlocking request to the intelligent lock in the short-range communication mode so that the intelligent lock can authenticate the unlocking application user according to the second unlocking request and unlock the intelligent lock under the condition that authentication is passed;
Or alternatively, the first and second heat exchangers may be,
after the terminal receives the unlocking instruction, the base station intelligent lock control method further comprises the following steps: under the condition that communication connection does not exist between the intelligent lock and the movable ring monitoring platform, the terminal sends a third unlocking request to the intelligent lock in the short-range communication mode according to the unlocking instruction, so that the intelligent lock authenticates the unlocking application user according to the third unlocking request, and the intelligent lock is unlocked under the condition that authentication passes.
3. The base station intelligent lock control method is characterized by being applied to a movable ring monitoring platform in a base station intelligent lock control system, wherein the base station intelligent lock control system comprises the movable ring monitoring platform, a terminal configured to be in communication connection with the movable ring monitoring platform, an intelligent lock and a field monitoring unit FSU deployed at a base station, and the FSU is configured to be in communication connection with the movable ring monitoring platform and the intelligent lock respectively; the base station intelligent lock control method comprises the following steps:
the movable ring monitoring platform receives a first unlocking request which is sent by the terminal and aims at the intelligent lock;
the movable ring monitoring platform authenticates an unlocking application user according to the first unlocking request, wherein the unlocking application user is a user bound with the terminal;
And under the condition that authentication is passed and the FSU is in an on-line state, the movable ring monitoring platform sends an unlocking instruction to the FSU so as to instruct the FSU to control the intelligent lock to be unlocked.
4. The base station smart lock control method of claim 3, wherein the terminal is further configured to communicate with the smart lock by means of near field communication;
after the movable ring monitoring platform receives the first unlocking request for the intelligent lock sent by the terminal, the base station intelligent lock control method further comprises the following steps: under the condition that the FSU is in an offline state, the movable ring monitoring platform sends an FSU offline notification to the terminal so that the terminal can control the intelligent lock to be unlocked through the short-range communication mode;
or alternatively, the first and second heat exchangers may be,
the base station intelligent lock control method further comprises the following steps: under the condition that communication connection is not established between the mobile ring monitoring platform and the terminal, the mobile ring monitoring platform receives a third unlocking request from the FSU, and the third unlocking request is generated by the terminal and sent to the FSU through the intelligent lock; the movable ring monitoring platform authenticates the unlocking application user according to the third unlocking request; and under the condition that authentication is passed, the movable ring monitoring platform sends an unlocking instruction to the FSU so as to instruct the FSU to control the intelligent lock to be unlocked.
5. The base station intelligent lock control method is characterized by being applied to an intelligent lock in a base station intelligent lock control system, wherein the base station intelligent lock control system comprises a movable ring monitoring platform, a terminal configured to be in communication connection with the movable ring monitoring platform, the intelligent lock deployed at a base station and a field monitoring unit FSU, and the FSU is configured to be in communication connection with the movable ring monitoring platform and the intelligent lock respectively; the base station intelligent lock control method comprises the following steps:
the intelligent lock receives an unlocking notification sent by the FSU, the unlocking notification is generated by the FSU according to an unlocking instruction sent by the movable ring monitoring platform, and the unlocking instruction is generated and sent to the FSU by the movable ring monitoring platform after the authentication of an unlocking application user bound with the terminal is passed;
and the intelligent lock is unlocked according to the unlocking notification.
6. The base station smart lock control method of claim 5, wherein the smart lock is further configured to be communicatively connected to the terminal by a short-range communication;
before the intelligent lock receives the unlocking notification sent by the FSU, the base station intelligent lock control method further comprises the following steps: the intelligent lock receives a third unlocking request sent by the terminal; when the FSU is in an on-line state, the intelligent lock forwards the third unlocking request to the movable ring monitoring platform through the FSU so that the movable ring monitoring platform authenticates the unlocking application user according to the third unlocking request;
Or alternatively, the first and second heat exchangers may be,
the base station intelligent lock control method further comprises the following steps: the intelligent lock receives a third unlocking request sent by the terminal; under the condition that the FSU is in an offline state, the intelligent lock authenticates the unlocking application user according to the third unlocking request; and under the condition that authentication is passed, unlocking the intelligent lock.
7. The base station intelligent lock control method according to claim 5 or 6, characterized by further comprising, after unlocking the intelligent lock:
the intelligent lock generates unlocking record information;
and under the condition that the FSU is in an on-line state, the intelligent lock sends the unlocking record information to the movable ring monitoring platform through the FSU, and the movable ring monitoring platform stores and manages the unlocking record information.
8. The base station smart lock control method of claim 7, wherein the unlocking record information generated by the smart lock includes at least one of:
the unlocking application user information;
the unlocking time information of the intelligent lock;
a door unopened event, wherein the door unopened event is an event triggered by the door unopened in a preset first time period after the intelligent lock is unlocked;
And the door non-closing event is an event triggered by the fact that the door is not closed within a preset second time period after the intelligent lock is unlocked, and the second time period is longer than the first time period.
9. A computer device, characterized by comprising a processor, a memory, and a communication bus for implementing a communication connection between the processor and the memory, wherein the memory stores any one of a first base station smart lock control program, a second base station smart lock control program, and a third base station smart lock control program, and the first base station smart lock control program is executable by the processor to implement the base station smart lock control method of any one of claims 1 to 3; the second base station intelligent lock control program is executable by the processor to implement the base station intelligent lock control method according to any one of claims 4 to 6; the third base station smart lock control program is executable by the processor to implement the base station smart lock control method as claimed in any one of claims 7 to 10.
10. The base station intelligent lock control system is characterized by comprising a movable ring monitoring platform, a terminal in communication connection with the movable ring monitoring platform, an intelligent lock arranged in a base station and a field monitoring unit FSU, wherein the FSU is configured to be in communication connection with the movable ring monitoring platform and the intelligent lock respectively, the terminal is a computer device, in which a first base station intelligent lock control program is stored in a memory, according to claim 9, the movable ring monitoring platform is a computer device, in which a second base station intelligent lock control program is stored in the memory, according to claim 9, and the movable ring monitoring platform is a computer device, in which a third base station intelligent lock control program is stored in the memory, according to claim 9.
CN202311270739.XA 2023-09-27 2023-09-27 Base station intelligent lock control method, system and computer equipment Pending CN117253306A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311270739.XA CN117253306A (en) 2023-09-27 2023-09-27 Base station intelligent lock control method, system and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311270739.XA CN117253306A (en) 2023-09-27 2023-09-27 Base station intelligent lock control method, system and computer equipment

Publications (1)

Publication Number Publication Date
CN117253306A true CN117253306A (en) 2023-12-19

Family

ID=89136569

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311270739.XA Pending CN117253306A (en) 2023-09-27 2023-09-27 Base station intelligent lock control method, system and computer equipment

Country Status (1)

Country Link
CN (1) CN117253306A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127885A (en) * 2016-05-30 2016-11-16 长园共创电力安全技术股份有限公司 Intelligent electric controlled lock managing and control system and method
CN106683251A (en) * 2017-01-22 2017-05-17 四川安能能源技术有限公司 Management control system of intelligent electric control lock for machine room
CN206363419U (en) * 2016-12-30 2017-07-28 万马科技股份有限公司 Telecomm base station intelligent access control system
CN107564159A (en) * 2017-09-11 2018-01-09 安徽天俣科技有限公司 A kind of smart bluetooth locks group's management control system
CN110535950A (en) * 2019-08-30 2019-12-03 北京无线体育俱乐部有限公司 Smart lock control method, equipment, system and storage medium
CN110738766A (en) * 2019-11-14 2020-01-31 深圳晒尔科技有限公司 hotel management method based on intelligent lock
CN113034734A (en) * 2019-12-06 2021-06-25 中国石油天然气股份有限公司 Authorization method of electronic key, storage medium and computer device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127885A (en) * 2016-05-30 2016-11-16 长园共创电力安全技术股份有限公司 Intelligent electric controlled lock managing and control system and method
CN206363419U (en) * 2016-12-30 2017-07-28 万马科技股份有限公司 Telecomm base station intelligent access control system
CN106683251A (en) * 2017-01-22 2017-05-17 四川安能能源技术有限公司 Management control system of intelligent electric control lock for machine room
CN107564159A (en) * 2017-09-11 2018-01-09 安徽天俣科技有限公司 A kind of smart bluetooth locks group's management control system
CN110535950A (en) * 2019-08-30 2019-12-03 北京无线体育俱乐部有限公司 Smart lock control method, equipment, system and storage medium
CN110738766A (en) * 2019-11-14 2020-01-31 深圳晒尔科技有限公司 hotel management method based on intelligent lock
CN113034734A (en) * 2019-12-06 2021-06-25 中国石油天然气股份有限公司 Authorization method of electronic key, storage medium and computer device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈建平: "基于手机APP 管控的智能门禁系统技术方案", 《价值工程》, 8 April 2017 (2017-04-08), pages 80 - 81 *

Similar Documents

Publication Publication Date Title
EP2677506B1 (en) Smart lock structure and operating method thereof
CN103793960B (en) Method for mobile key service
CN105915344B (en) A kind of electron key shared service system for house lease
CN102262793B (en) Entrance guard control method and entrance guard control system
JP4130882B2 (en) Out-of-band management and traffic monitoring of wireless access points
CN104680630A (en) Method and system for controlling door locks
US9953145B2 (en) Configuration method, configuration device, computer program product and control system
CN104167029B (en) A kind of intelligent lock and its operating method
US11189117B2 (en) Method and system for controlling a smart lock
CN110535968B (en) Cabinet access control system and method based on dynamic password
EP1607922A1 (en) Home security system
De Luca et al. The use of NFC and Android technologies to enable a KNX-based smart home
JP2011511350A (en) Access control management method and apparatus
WO2010080821A1 (en) Integrated physical and logical security management via a portable device
WO2006136662A1 (en) Communication method of access control system
CN105654580A (en) Access control method and system, electronic lock, and management and visitor terminal
WO2005101727A1 (en) Communication device, communication system, and authentication method
CN107180464A (en) A kind of smart lock method for unlocking and the system using this method
CN204759558U (en) Intelligent entrance guard , equipment and system
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
CN106127888A (en) Smart lock operational approach and smart lock operating system
CN101091378A (en) Method of authentication of a mobile communications terminal in a visited network
CN108447149A (en) A kind of unlocking method and device in shared house
CN117253306A (en) Base station intelligent lock control method, system and computer equipment
CN105022950A (en) Information processing method and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination