CN117275121A - Electronic lock, electronic lock system, display method and storage medium - Google Patents

Electronic lock, electronic lock system, display method and storage medium Download PDF

Info

Publication number
CN117275121A
CN117275121A CN202311244478.4A CN202311244478A CN117275121A CN 117275121 A CN117275121 A CN 117275121A CN 202311244478 A CN202311244478 A CN 202311244478A CN 117275121 A CN117275121 A CN 117275121A
Authority
CN
China
Prior art keywords
electronic lock
user
authorization
information
change information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311244478.4A
Other languages
Chinese (zh)
Other versions
CN117275121B (en
Inventor
孙宗林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Smart Yunlian Information Technology Beijing Co ltd
Original Assignee
Smart Yunlian Information Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Smart Yunlian Information Technology Beijing Co ltd filed Critical Smart Yunlian Information Technology Beijing Co ltd
Priority to CN202311244478.4A priority Critical patent/CN117275121B/en
Publication of CN117275121A publication Critical patent/CN117275121A/en
Application granted granted Critical
Publication of CN117275121B publication Critical patent/CN117275121B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B5/00Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied
    • G08B5/22Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmission; using electromagnetic transmission

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses an electronic lock and a display method thereof. The electronic lock comprises an outer panel, an inner panel and a control module, wherein a first display screen is arranged on the outer panel; the control module is at least used for: outputting a first display instruction when the unlocking certificate input by the current first user passes verification and authorization change information required to be displayed for the first user exists; the authorization change information is used for indicating the permission change condition of the electronic lock in a preset time period; the first display screen is at least used for: and displaying prompt information under the control of the first display instruction, wherein the prompt information is used for guiding a user to view the authorization change information. The electronic lock can solve the specific requirements of some electronic lock depth users, and the authorization change information is clearly and prominently prompted on the screen of the outer panel according to the user identity, so that the users can be accurately and timely reminded to know the information, and the security of the corresponding management and control area of the electronic lock is improved.

Description

Electronic lock, electronic lock system, display method and storage medium
Technical Field
The application relates to the technical field of electronic locks, in particular to an electronic lock with a larger display screen on an outer panel and a display method thereof. The application further relates to an electronic lock system and a computer readable storage medium.
Background
Electronic locks are increasingly used in people's lives, for example in homes and hotels. Currently, common electronic lock products are provided with a numeric keyboard for unlocking or a liquid crystal display screen (0.97 inch is common) with smaller size on an outer panel of the electronic lock products. When the electronic lock is in man-machine interaction, the electronic lock is mainly operated in a mode of matching a voice prompt with a numeric keyboard and/or a small display screen, for example, authorization management is carried out.
Although most electronic locks in life can realize basic requirements of quick unlocking, convenient authorization, unlocking record and the like to a certain extent, some important requirements are not met for users in deep use (such as users in working environments).
Disclosure of Invention
One of the purposes of the present application is to provide an electronic lock, which can solve the specific needs of some users with depth, and includes clearly and prominently prompting the authorized change information on the screen of the outer panel according to the user identity, so that the user can be accurately and timely reminded to know the information, which is beneficial to improving the security of the corresponding management and control area of the electronic lock.
The first aspect of the application provides an electronic lock, which comprises an outer panel, an inner panel and a control module, wherein a first display screen is arranged on the outer panel;
the control module is at least used for: outputting a first display instruction when the unlocking certificate input by the current first user passes verification and authorization change information required to be displayed for the first user exists; the authorization change information is used for indicating the permission change condition of the electronic lock in a preset time period;
the first display screen is at least used for: and displaying prompt information under the control of the first display instruction, wherein the prompt information is used for guiding a user to view the authorization change information.
With reference to the first aspect, in one possible implementation manner, the control module is further configured to: acquiring a read authorization version number of the first user under the condition that the first user has the viewing authority of the authorization change information; and determining whether authorization change information which needs to be displayed for the first user exists or not based on the current authorization version number of the electronic lock and the read authorization version number of the first user.
With reference to the first aspect, in one possible implementation manner, the control module is further configured to: and under the condition that a read confirmation instruction is received, updating the value of the read authorization version number of the first user, wherein the read confirmation instruction is an instruction input on the electronic lock after the first user views corresponding authorization change information based on the prompt information.
With reference to the first aspect, in one possible implementation manner, the control module is further configured to: updating the value of the read authorization version number of the first user based on the first synchronization data uploaded to the server by the terminal device before the step of determining whether there is authorization change information to be presented for the first user; the first synchronization data is used for indicating an authorization version number corresponding to the authorization change information which is already checked by the first user on the terminal equipment.
With reference to the first aspect, in one possible implementation manner, the control module is further configured to: outputting a second display instruction under the condition of receiving a setting instruction from the remote control device; the first display screen is further used for: and displaying state public information corresponding to the setting instruction under the control of the second display instruction, wherein the state public information is used for indicating the state of the control area of the electronic lock.
With reference to the first aspect, in one possible implementation manner, the first display screen is further configured to: and displaying the duration time or the predicted remaining time of the state indicating information under the control of the second display instruction.
With reference to the first aspect, in one possible implementation manner, the control module is further configured to: determining a state presentation mode based on the setting instruction; controlling the electronic lock to enter a continuous display mode or an automatic display mode corresponding to the setting instruction; the first display screen is further used for: continuously displaying the state public information in the continuous display mode; alternatively, the first display screen is further configured to: in the automatic display mode, the status indication information is displayed when a person is detected to be approaching.
With reference to the first aspect, in one possible implementation manner, the control module is further configured to: if the authorization change information required to be displayed for the first user comprises at least one permission change condition of a user with management permission, prohibiting the electronic lock from executing unlocking operation before receiving a read confirmation instruction; the instruction for confirming the read instruction is an instruction input on the electronic lock after the first user views corresponding authorization change information based on the prompt information.
A second aspect of the present application provides an electronic lock system, including any one of the possible electronic locks of the first aspect, further including a server, a terminal device client, and a remote control device; the remote control equipment can be bound with the electronic lock and connected in a communication mode, and the electronic lock and the terminal equipment client can be connected with the server in a communication mode respectively.
A third aspect of the present application provides a display method applied to an electronic lock, where the electronic lock includes an outer panel and an inner panel, and a first display screen is disposed on the outer panel; the method comprises the following steps: outputting a first display instruction to control the first display screen to display prompt information when the unlocking certificate input by the current first user passes verification and authorization change information required to be displayed for the first user exists; the authorization change information is used for indicating the permission change condition of the electronic lock in a preset time period, and the prompt information is used for guiding a user to view the authorization change information.
A fourth aspect of the present application provides a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform any one of the possible methods of the third aspect.
Drawings
Fig. 1 is a schematic architecture diagram of an electronic lock system in an exemplary application scenario of the present application.
Fig. 2 is a flow chart of an exemplary display method according to an embodiment of the present application.
Fig. 3 is a flow chart of another exemplary display method according to an embodiment of the present application.
Detailed Description
For a clear and complete description of the technical solutions of the present application, reference will be made to the following further description in conjunction with the examples and the accompanying drawings.
In addition to the everyday living home scenario, many enterprises and institutions and the like are beginning to install electronic locks for important places, such as a lead office, a financial room, a warehouse, a server room and the like. These sites often require changing authorization information due to relatively frequent personnel changes or security policies. The electronic lock has a flexible authorization management mechanism, can meet the requirement of changing unlocking authorization, has a recording function, and can be used for tracing the recorded unlocking record, thereby being beneficial to post audit. However, as previously mentioned, there remains some unmet need for users for certain depth uses.
For example, for some workplace administrators, during the fresh period when the electronic lock is just installed, the manager may frequently check unlocking records, authorization information and the like on the mobile phone APP associated with the electronic lock, but the operation steps of opening the APP for checking are still somewhat cumbersome, so that the manager may gradually forget the existence of the APP after a period of use. In some cases, the operation of changing the authorization information is sometimes performed not by the manager himself or herself but by an execution layer person. For example, when the unlocking authority of the electronic lock of the office of the company's board owner needs to be changed accordingly due to personnel change of the cleaning person, the operation of changing the unlocking authority may not be performed by the real manager of the office's board owner but by the supervisor of the company's administrative department. For another example, the company manager is not always in the company, so that in order to facilitate the financial staff to take the official seal for processing the transaction, the company manager can enable the company operation and maintenance staff to increase the unlocking authority of the financial staff for the door lock of the office of the company manager or the electronic lock of the safe box for placing the official seal. Under the condition that the authorization information of the electronic lock changes and the manager does not remember to actively check through the APP, the information which should be known by the manager is not known by the manager in real time, which is not beneficial to the safety of the management and control area corresponding to the electronic lock.
The application provides an improvement scheme, on the basis of a common electronic lock, a large screen is introduced into an outer panel of the electronic lock, and functions of the electronic lock are expanded, so that specific requirements of some depth users of the electronic lock can be met, and the problem that potential safety risks exist in an electronic lock management and control area due to the fact that a manager does not actively check authorization information is solved.
Referring to fig. 1, fig. 1 is a schematic diagram of an exemplary system architecture according to an embodiment of the present application. The system at least comprises an electronic lock, and can also comprise one or more electronic devices such as a server, terminal equipment, remote control equipment, an electronic key and the like.
The electronic lock of the embodiment of the application comprises an outer panel for being installed on the outer side of the door, an inner panel for being installed on the inner side of the door, and a control module (not shown in the figure).
At least a first display screen is arranged on the outer panel. The first display screen may employ a screen In the related art, such as an LCD LED panel, e.g., IPS (In-Plane Switching), VA (vertical alignment), TN (Twisted Nematic), TFT (Thin Film Transistor), or an OLED panel. The first display screen should be sized larger than the first preset size, and may illustratively take 3.5 inches or other possible size for ease of viewing and manipulation by the user.
Alternatively, the outer panel may not include a numeric keypad at all, and the first display screen or the component including the first display screen may perform its function together. Of course, in some implementations, the outer panel may also be provided with the first display screen and the numeric keypad at the same time, which is not limited in this application.
The inner panel may be provided with a second display screen. The second display screen may be a screen in the prior art, such as an LCD LED panel, e.g. IPS, VA, TN, TFT, or an OLED panel, etc. The second display screen should be sized larger than the second preset size, and may illustratively take the form of 3.97 inches or other possible size. The second display screen and the first display screen may be the same or different in size, and are not limited in this application.
The control module may be directly or indirectly connected to the first display screen and the second display screen, and may control the one or more display screens when desired. The control module can also be used for cooperatively scheduling each module to complete the management, authentication and other works of the electronic lock.
The control module can adopt a control chip, a singlechip and the like in the prior art, and can also adopt other possible forms, and the application is not limited to the control module. It will be appreciated that in practical applications, the control module may be implemented by one physical component, or may be implemented by a combination of multiple physical components, which is not limited in this application.
Optionally, the electronic lock may further include one or more other functional modules, such as a biometric module, a digital identification module, a touch screen interaction module, a wireless communication module, a human body sensing module, and the like. For example, the control module and other modules may be connected by UART (Universal Asynchronous Receiver/Transmitter), I2C (Inter-Integrated Circuit), SPI (Serial Peripheral Interface), etc.
Biometric modules, including but not limited to modules that enable the collection and identification of one or more human biometric data such as fingerprints, finger veins, faces, irises, sounds, etc.
Digital identification modules, including but not limited to modules capable of enabling the acquisition and identification of one or more digital keys, such as passwords, door cards, cell phones, electronic keys, and the like.
And the touch screen interaction module provides rich information display and strong input capability through the touch screen interaction modules such as a touch display screen and the like, and realizes simple and easy-to-use man-machine interaction. When the first display screen and/or the second display screen adopt a touch screen, the electronic lock can comprise the touch screen interaction module.
The wireless communication module is generally used for establishing wireless communication with a server such as cloud service, a terminal device such as a mobile phone, a door card, an electronic key, a remote control device and the like through a wireless communication protocol such as WiFi, BLE, NFC, zigBee, zig-Wave and the like. The wireless communication module may illustratively employ a WiFi module, an NBIoT module, a 4G/5G module, or the like. Through wireless communication module, electronic lock can with bind terminal interaction such as user's cell-phone, realize functions such as long-range video intercom, long-range unblanking, can also carry out interactive data with server, remote control device, electronic key, door card etc. to realize various functions.
The human body sensing module is generally used for realizing automatic sensing of human body approaching or movement in a certain distance range around the electronic lock through one or a combination of multiple technologies such as radar waves, infrared rays and ultrasonic waves.
The security authentication module can support a symmetric algorithm (such as DES, AES, SM, etc.) and/or an asymmetric algorithm (such as RSA, ECC, SM, etc.), and is generally used for storing key data such as public keys, private keys, symmetric keys, digital certificates, etc. necessary for the algorithm, and for implementing secure authentication and encrypted communication with servers such as electronic keys, cloud services, etc., terminal equipment applications, remote control devices, etc. through the algorithm.
It will be appreciated that the electronic lock of embodiments of the present application may also include other necessary or possible components, such as an electronic lock body, an inside handle, a mechanical key hole, a lock cylinder switch knob, a counter lock knob, a camera, a speaker, a microphone, etc.
The server may establish communication connection with the electronic lock to provide services for the electronic lock, or may establish communication connection and provide services for terminal devices such as a mobile phone of a user, for example, the first terminal and the second terminal in fig. 1. The server can store key data such as public keys, private keys, digital certificates and the like necessary for the algorithm, and can realize secure authentication and encrypted communication with the electronic lock, the electronic key and application software of the terminal equipment through the algorithm.
The server in the embodiment of the application may be an independent physical server, may be a server cluster or a distributed system formed by a plurality of physical servers, may also be a cloud server or a cloud computing service center for providing cloud computing services such as cloud services, cloud databases, cloud computing, cloud storage, network services, cloud communication, middleware services, security services, content distribution services, big data, artificial intelligent platforms and the like, and may also be a combination of a physical server and a cloud server.
The terminal device of the embodiments of the present application may include, but is not limited to, devices such as a mobile phone, tablet computer, notebook computer, wearable device, augmented Reality (AR)/Virtual Reality (VR) device, personal digital assistant (Personal DigitalAssistant, PDA), and the like. The terminal equipment can be intelligent handheld equipment, intelligent wearable equipment and the like, and the specific product form/type of the terminal equipment is not limited.
The terminal device can be provided with a client for data interaction with the server and/or the electronic lock, such as binding with the electronic lock, remotely controlling unlocking and locking of the electronic lock through the server, remotely managing information in the electronic lock, and the like. Clients may be illustratively developed as APPs, applets, web ends, etc., the specific product form of which is not limited by this application.
By way of example, the terminal device may include a wireless communication module, a security authentication module, an electronic lock management module, and the like.
The wireless communication module can generally establish wireless communication with a server such as an electronic lock and a cloud service, and a possible device or interaction end such as an electronic key.
And the safety authentication module generally enables the terminal equipment to complete pairing with the electronic lock and encrypts wireless communication between the terminal equipment and the electronic lock so as to ensure communication safety.
The electronic lock management module is generally used for enabling the terminal equipment to have a management function, so that a user can manage the electronic lock by operating on the terminal equipment.
It will be appreciated that in some cases there may be a plurality of terminal devices, e.g. the first terminal, the second terminal shown in fig. 1, which may be partly or wholly held by different users or partly or wholly held by the same user, as the application is not limited in this regard.
The remote control device in the embodiment of the present application mainly refers to a dedicated remote control device different from the terminal device, and may be, for example, a wireless remote control device. The remote control device can be in communication connection with the electronic lock in a wireless communication mode such as Bluetooth, WIFI, sub-1GHz and ZigBee, and is used for controlling the electronic lock to a certain extent, for example, for controlling the display of state public information of the electronic lock. The terminal device can support the remote control of the electronic lock through the server, and the difference is that the remote control device generally only supports the control of the electronic lock in a short distance range, and when the remote control device exceeds the communication distance with the electronic lock, the remote control device can not control any more.
The electronic key (not shown in the figure) in the embodiment of the application is a matching device of an electronic lock, which is different from a traditional mechanical key, and is mainly used for realizing a digital key unlocking function. By way of example, some electronic keys may include a wireless communication module, a security authentication module, and the like. The wireless communication module can communicate with the electronic lock through a wireless communication protocol such as WIFI, BLE, NFC, zigBee, zig-Wave. The security authentication module can support a symmetric algorithm (such as DES, AES, SM and the like) and an asymmetric algorithm (such as RSA, ECC, SM and the like), can authenticate with the electronic lock through the algorithm, can generate and store data such as public keys, private keys and certificates required by the algorithm, and can further realize unlocking through the algorithm through a digital key.
The working process of the electronic lock in the scheme of the application is described below by taking the interaction process between a certain user and the electronic lock and other possible main bodies as an example. Referring to fig. 2 and fig. 3, fig. 2 and fig. 3 are schematic flow diagrams of a display method of an electronic lock according to an embodiment of the present application.
S101, a first user inputs unlocking credentials in the electronic lock.
The unlocking credentials may be, for example, a password, data in an electronic key or a door card for unlocking authentication, or biometric data of the user, such as data of the user's fingerprint, finger vein, face, iris, sound, etc.
The first user may be any user. The electronic lock can input an unlocking certificate of the electronic lock, so that the electronic lock can be verified. Illustratively, the electronic lock may acquire the unlocking certificate of the first user through the digital identification module or the biological identification module. In some implementations, the first user may actively operate the electronic lock to input the unlocking credentials; in other implementations, the first user may also passively enter the unlocking credentials, which is not limited in this application. For example, when a user stands in front of the electronic lock, the biometric module may actively collect facial feature data of the user, and in this case, the unlocking credentials may have been passively input even if the user does nothing.
S102, the electronic lock verifies whether the unlocking certificate is legal or not.
Different users may have different rights. Some users only have lower level rights, for example only have rights to unlock with their own unlocking credentials; some users have a relatively high level of rights, such as rights to unlock, but also rights to manage (including add, delete, modify, etc.) rights of other users. Typically, only one user has the highest administrative rights, while users with ordinary administrative rights may have one or more. The rights of different users may be described or characterized by corresponding authorization information.
For example, in an office of a company's director, the director may be set to have the highest management authority, which may not only unlock, but also control the authority of other users such as an administrator, a general user, and in some cases may also have other possible authorities to enable other intelligent devices (such as an indoor camera) that are linked with an electronic lock, and the like. The director of the administrative part may be granted ordinary management authority so that it can manage ordinary users. For example, when personnel changes occur in personnel such as a company cleaner or a secretary of a director, and the director is not in the company, the administrative department manager can delete the authorization information of the original personnel and add the authorization information of the new personnel, thereby completing the management operation.
In some implementations, referring to steps S201 and S202 of fig. 3, in this embodiment of the present application, a user with management authority is referred to as a second user, and after the electronic lock receives a management instruction for managing authorization information input by the second user, the electronic lock may change the authorization information in the lock according to the management instruction. It will be appreciated that the second user may input the management instruction by directly operating the electronic lock, or may remotely input the management instruction through a terminal device (e.g., a second terminal held by the second user) bound to the electronic lock, which is not limited in this application.
Prior to execution of step S102, the electronic lock may have stored therein authorization information for one or more users, which may be used for authentication and/or identity authentication. After the electronic lock acquires the unlocking certificate input by a certain user, the electronic lock can verify whether the unlocking certificate input by the current user is legal or not based on the authorization information existing in the current electronic lock. Illustratively, the electronic lock stores authorization information of the user a, including 1 password data and 2 fingerprint data. When the electronic lock obtains an unlocking credential (such as a string of passwords) entered by the first user, if the unlocking credential can be matched with a certain piece of data in the authorization information of the user a based on certain existing or custom calculation rules, the unlocking credential of the first user can be considered legal. It will be appreciated that at the same time the electronic lock may also determine that the identity of the current first user is user a.
S103, the electronic lock determines whether authorization change information needed to be displayed for the first user exists.
The authorization change information is used for indicating the permission change condition of the electronic lock in a preset time period. For example, at a certain point in time, the electronic lock stores authorization information of the user a, including 1 part of password data and 2 parts of fingerprint data of the user a. At the next time point, the user A with the management authority increases the authorization information of the user B by operating the electronic lock, wherein the authorization information comprises 1 finger vein data of the user B, and the user B can add and delete the authorization information of other users except the user A. That is, the rights of the electronic lock have been changed, which can be described by the grant change information. The authorization change information at least needs to represent the users who are clearly added, deleted and modified this time and the parts of the corresponding authorization information, which are changed. Alternatively, the authorization change information may also include a portion of the authorization information that has not changed at the present time. In some implementations, the changed rights instance or authorization information describing the changed rights instance may be directly used as the current authorization change information.
It can be appreciated that, in the preset time period, the electronic lock may have multiple rights change at different time points, so that multiple rights change information may be formed correspondingly. Optionally, the authorization change information may further include a corresponding time point, so as to accurately or relatively implicitly indicate a corresponding occurrence time of each authorization change.
In some implementations, the electronic lock may utilize an authorization version number (Auth Version ofLock, AVL) to distinguish between different rights situations or authorization information describing the rights situations. For example, at a certain time point, the electronic lock stores A, B authorization information of two users, including 1 part of password data and 2 parts of fingerprint data of user a and 1 part of finger vein data of user B, and may record the authorization condition and assign an authorization version number AVL0002 to the authorization condition. At the next time point, the user B with the management authority increases the authorization information of the user C by operating the electronic lock, wherein the authorization information comprises 1 part of face characteristic data (only used for unlocking) of the user C, namely the authority of the electronic lock changes at the moment, the authority condition can be recorded, and an authorization version number AVL0003 is assigned to the authority condition. Similarly, whenever the rights of the electronic lock change, the electronic lock can record the corresponding rights locally and reassign a new authorization version number.
Alternatively, the authorization version number may be changed according to a preset rule, such as increment, decrement, or other possible change, as shown in table 1, for example.
TABLE 1
Therefore, the electronic lock can screen out the authorization version numbers in the preset time period, and the authorization change information is determined according to the authority conditions/authorization information corresponding to different authorization version numbers.
For example, referring to step S202 of fig. 3, the electronic lock may change the authorization information in the lock according to the aforementioned management instruction, and record the corresponding authorization version number AVL. If the authorization version number changes several times in the preset time period, the corresponding presence of several pieces of authorization change information in the time period is indicated.
In some implementations, the electronic lock may compare two versions of authorization information that are adjacent to each other, and take all or part of the content that has changed as authorization change information, for example, AVL0003 and AVL0002 are compared, and the unlocking authority of user C is newly increased. By adopting the mode, the first user can efficiently know the change of the permission condition of the electronic lock.
In other implementations, all or part of the authorization information corresponding to the changed authorization version number (e.g., one or more relatively important information such as an authorized person, a permission range, an authorized person, an authorization change time point, etc.) is directly used as the corresponding authorization change information. By adopting the mode, the first user can comprehensively and quickly know the permission condition and the change of the electronic lock.
Optionally, in some implementations, referring to step S203 of fig. 3, the electronic lock may further carry information such as the authorization version number in the third synchronization data, and report the information to the server, and the information is stored by the server. The server may also maintain an up-to-date authorization version number so that it can be synchronized to the terminal device to which the electronic lock is bound when needed.
It will be appreciated that S201 to S203 in the embodiment of the present application may occur multiple times, may not occur once, may occur before step S101 or the like, and may also occur at other time points, and the number of times that the present application is executed and the sequence of the steps with other steps are not limited.
The electronic lock may, after knowing the identity of the first user, look for whether there is authorization change information that needs to be presented to it. In some implementations, as described above, the electronic lock may determine the identity of the corresponding user during verification of the unlocking credential, so that the step of searching may be performed again if the unlocking credential of the first user is verified to be legal. In other implementations, the electronic lock may not need to verify whether the unlocking certificate is legal, and can also determine the identity of the current user through other information, in which case the searching step may be performed synchronously with the step of verifying the unlocking certificate, or performed according to any sequence, which is not limited in this application.
In general, not all users have a need to view the authorization change information, and often users (such as user a in the foregoing example) who have at least management rights and do not personally operate to change the authorization information need to be reminded or guided to view the authorization change information, so that the timely knowledge of the rights change condition of the electronic lock is improved, and the security risk of the corresponding management and control area of the electronic lock is further reduced in some dimensions. While some users (e.g., user C in the previous example) need not be presented for them. Thus, in some implementations, the step of the electronic lock locating the presence of authorization change information that needs to be presented to the first user may include first determining whether the first user has the viewing authority of the authorization change information. For example, if the first user is a user who needs to be presented with authorization change information set in advance, or is a user having management authority, the first user may be considered to have the viewing authority. If the first user has the checking authority, the electronic lock searches whether the authorization change information which needs to be displayed for the first user exists or not. If the electronic lock does not have the viewing authority, the electronic lock can be free from executing subsequent searching or outputting the first display instruction.
After a period of use, the electronic lock may store a plurality of copies of authorization change information recorded in the past, and some first users may have previously viewed and some have not. If all the authorization change information is already checked by the first user, that is, there is no new authorization change information which needs to be checked by the first user, although the first user is a user with the checking authority, it is considered that there is no authorization change information which needs to be displayed for the first user. If at least one piece of authorization change information is not checked by the first user before, the authorization change information which needs to be displayed for the first user can be considered to exist, so that a first display instruction can be output to guide the first user to check.
In some implementations, referring to steps S1301 to S1302 of fig. 3, the electronic lock may obtain the respective read authorization version numbers (Auth Version User Readed, AVUR) of the users having the viewing rights, and determine whether there is authorization change information that needs to be presented for the user by comparing the read authorization version number of the user with the current authorization version number of the electronic lock. It will be appreciated that the electronic lock may only obtain the read authorization version number of the first user in the event that it has been clarified that the current user is the first user and that the first user has viewing rights.
Illustratively, the case of the read authorization version number and the current authorization version number at a certain time is shown in table 2 below. In this example, the user a's read authorized version number AVUR is 0003, indicating that user a has previously viewed a change in rights for AVL0002 to AVL0003, and that the subsequent changed version has not been viewed, and so on. When the user A is unlocked, the electronic lock searches that the authorization change information required to be displayed for the user A comprises 3 copies, wherein the situation that the AVL0003 is changed to the AVL0004, the AVL0004 is changed to the AVL0005, and the AVL0005 is changed to the AVL00046 is described, and the authorization change information can be respectively indicated by 0004, 0005 and 0006; when the user B unlocks, the electronic lock searches that the authorization change information required to be displayed for the user B is 0 part; when a user E is unlocked, the electronic lock searches 1 part of authorization change information which is required to be displayed for the user E and is denoted by 0006; when the user D unlocks, as the user D does not have the viewing authority, the authorization change information which needs to be displayed for the user D does not exist.
TABLE 2
And S104, outputting a first display instruction by the electronic lock under the condition that the authorization change information required to be displayed for the first user exists, and controlling the first display screen to display prompt information.
The prompt information is used for guiding the user to view the authorization change information which needs to be displayed for the user. The prompt information can be presented in the forms of popup windows, bubbles, interactive guide controls and the like or the combination of a plurality of forms, and the specific presentation form of the prompt information is not limited in the application.
In some implementations, the prompt may be at least some of the authorization change information that needs to be presented to the user, either in whole or in part in direct presentation, to guide the user's view.
In other implementations, the prompt may be, for example, "you have X copies of the authorization change information not viewed, please view in time" information, and a control, for example, "view details" is provided in the display interface of the information, for guiding the user to view the specific authorization change information by operating the control.
Optionally, the first display instruction may be output by a control module in the electronic lock and directly or indirectly transmitted to the first display screen, and the first display screen may display the prompt information under the control of the first display instruction. It will be appreciated that the steps performed by the electronic lock in embodiments of the present application may be performed in part or in whole by the control module of the electronic lock, except as explicitly performed by other modules/components.
The electronic lock may locally record the respective read authorized version numbers AVUR of the different users, the value of which may be updated.
In some implementations, some operations by the user on the electronic lock may cause the value of AVUR to be updated. For example, a control for confirming that the authorization change information has been viewed, such as a "confirm read" expression, may be included in the aforementioned interface for displaying the prompt information or the interface at a subsequent level associated therewith. Referring to step S105 of fig. 3, the electronic lock may update the value of the read authorized version number AVUR of the first user upon receiving the confirm read instruction input by the first user based on the foregoing prompt information. Of course, the value of AVUR of the user acquired by the electronic lock in step S1031 may be updated locally by the electronic lock after the previous operation such as the confirmation of the read instruction input by the first user on the electronic lock.
In some cases, the user may view the authorization change information through other means (e.g., on a terminal device or application that is bound to the electronic lock), and if a piece of authorization change information is already viewed by the user through other means, it need not be presented on the electronic lock. With such a circumstance in mind, in other implementations, a synchronization mechanism may be established between the terminal device, the server, and the electronic lock, and when the user views the authorization change information in other ways, devices corresponding to those ways (e.g., the terminal device such as a mobile phone or the electronic lock) may upload a new value of the read authorization version number to the server, and the server stores and maintains updating the read authorization version numbers of the respective users, and issues to devices of other ways when needed.
The value of AVUR of the user obtained by the electronic lock in step S1031 may be uploaded to the server by the terminal device after the first user checks a certain part or several parts of authorization change information by the terminal device. Referring to steps S301 to S305 of fig. 3, when the first user opens a client such as APP on the first terminal, the first terminal may obtain AVL and AVUR of the first user from the server, and if the values of the AVL and AVUR are different, for example, AVUR < AVL (in the case that AVL increases according to a preset rule), the first terminal may prompt the user to view the authorization change information that has not been viewed yet. After the first user checks, the user can click on a related control on the interface displayed by the first terminal, input a read confirmation instruction, enable the first terminal to update the value of the local AVUR of the first user, carry the updated value of the AVUR of the first user in first synchronous data, report the first synchronous data to the server, and enable the server to issue the first synchronous data to the electronic lock. Therefore, the electronic lock can compare the value of the read authorization version number obtained from the server with the value of the locally stored read authorization version number, and whether to update is determined according to the comparison result. And comparing the read authorization version number with the current authorization version number after updating, so as to determine authorization change information which needs to be displayed for the first user on the electronic lock at the time.
Along the foregoing examples, assuming that the first user is the aforementioned user a, he is guided to view the several versions of the authorization change information of 0004-0006 on the first display screen of the electronic lock, or view the several versions of the authorization change information in the APP of the first terminal, the electronic lock may update the AVUR of the local user a to 0006. Thus, when the unlocking credentials are input again by the first user next time, the electronic lock can take avur=0006 as a judgment basis when determining whether the authorization change information needs to be displayed for the electronic lock. If the current authorization version number of the electronic lock is no longer 0006, for example 0008, the user A can be shown that the current authorization version number is the viewed authorization change information, and the security of the corresponding management and control area of the electronic lock is continuously ensured. If the current authorization version number of the electronic lock is still 0006, the electronic lock judges that the authorization change information required to be displayed for the user A does not exist, so that the repeated display of the authorization change information which the user has already checked is avoided, the safety is ensured, and unnecessary operation steps are avoided for the user.
It will be appreciated that the steps S301 to S305 in the embodiments of the present application may occur multiple times, may not occur at one time, may occur before the steps S101, etc., and may also occur at other time points, and the number of times the steps are performed and the sequence of the steps is not limited in this application.
It is further understood that the electronic lock may periodically and sporadically obtain and update the value of the read authorization version number of one or more users from the server, or may obtain the value of the read authorization version number of the first user from the server if it is determined that the first user has the viewing authority of the authorization change information, which is not limited in this application, so long as the latest read authorization version number is used when determining whether there is authorization change information that needs to be presented for the first user.
Optionally, referring to step S106 of fig. 3, the electronic lock may further carry the updated value of the AVUR of the first user in the second synchronization data, and report the second synchronization data to the server, so that the server can synchronize the information to the terminal device bound to the electronic lock when needed.
By adopting the scheme, when the electronic lock is unlocked by a user, the authorization change information can be clearly and prominently prompted on the first display screen of the outer panel immediately according to the identity of the user, so that the user who should know the information can be accurately and timely reminded to know the information, the risk possibly existing at present can be analyzed, and the safety of the corresponding management and control area of the electronic lock can be improved.
The permission of the electronic lock is changed, and sometimes, only users with unlocking permission are added, deleted and modified, so that the user permission is relatively small, and the safety influence degree on a management and control area is relatively small; sometimes, users with management authorities can add, delete and modify the authorities of other users, and even can modify or delete unlocking records and other information of the electronic lock, so that the security influence degree on the management and control area is relatively large. For such a case, in some implementations, in a case where it is determined that there is authorization change information that needs to be displayed for the first user, the electronic lock does not immediately perform the unlocking operation even if the unlocking certificate input by the first user passes the verification, but determines whether the authorization change information that needs to be displayed for the first user includes one or more rights change conditions of the user having management rights. If not, unlocking operation can be executed, and the first display screen displays prompt information. If the electronic lock is included, the first display screen is controlled to display prompt information, and the electronic lock is not allowed to execute unlocking operation. And after receiving a read confirmation instruction input by the first user, ensuring that the first user is allowed to execute unlocking operation after knowing the authorization change information. By adopting the mode, the convenience of the first user is considered, the normal use of the first user is not excessively disturbed, the first user can be ensured not to miss important authorization change information, and the safety of a management and control area is further improved.
In addition to the foregoing requirements, the deep user of an electronic lock may create some other requirements. For example, in an enterprise, government agency, etc. work scenario, it may be desirable for individuals with independent offices not to be bothered by other individuals during noon break or while an important teleconference is in progress. Such a need, while addressed by hanging a "do not disturb" brand outside the door like a hotel room, is not convenient enough and sometimes not appropriate for a work scenario.
For this reason, the present application also provides an extended function of the electronic lock, which can be used to indicate the state of the control area of the electronic lock, that is, to display state indication information, in addition to the authorization change information for prompting the electronic lock.
The electronic lock can be bound with terminal equipment such as a mobile phone or remote control equipment in advance, so that management staff in management and control areas such as offices and warehouses can utilize the equipment to set and control the display state public information of the electronic lock, such as the current room state of the offices. Accordingly, the electronic lock can also judge whether to allow the display state indication information of the electronic lock to be set and controlled by a certain device. By adopting the implementation mode, the state control of the management and control area corresponding to the electronic lock is safer and more convenient for the management personnel. For example, when a manager receives important clients, plays important calls, holds a remote conference or needs to rest for a short time in an office, a conference room and other spaces, the manager can complete the setting without rising, so that the convenience of user operation is improved, and the user experience is optimized. For example, when the warehouse is in inventory, inventory personnel can control the electronic lock to display inventory states, so that the inventory personnel and the like can take the inventory without knowledge to influence inventory results.
The scheme of controlling the display state indicating information will be further described below using a remote control device as an example.
Illustratively, the remote control device may include an input module, a wireless communication module, a security authentication module, and the like.
The wireless communication module can be used for establishing wireless communication with the electronic lock, and the wireless communication mode can be BLE, sub-1GHz, zigbee and the like.
And the safety authentication module is used for binding and pairing the remote control equipment and the electronic lock and encrypting wireless communication between the remote control equipment and the electronic lock so as to ensure the communication safety.
And the input module enables the remote control equipment to have a control input function, and further can control the electronic lock through the wireless communication module. For example, at least one key may be provided on the remote control device, and operating different keys may correspond to inputting different setting instructions.
In the binding stage, after the remote control device establishes wireless communication with the electronic lock, the remote control device can send the unique serial number of the remote control device to the electronic lock; the electronic lock can generate a pair of control keys aiming at the unique serial number of the equipment, and then one of the unique serial number of the equipment of the electronic lock and the pair of control keys is sent to the remote control equipment; and the remote control equipment stores the two in association after receiving the information.
In the control stage, the user inputs a setting instruction, such as an instruction indicating meaning of "do not disturb" or "in meeting", etc., by operating the remote control device; the input module receives a corresponding first setting instruction and sends the first setting instruction to the security authentication module, and the security authentication module encrypts the first setting instruction by using a control key corresponding to the equipment serial number of the electronic lock which is bound before; and then the remote control equipment sends the encrypted instruction to the electronic lock through the wireless communication module. After the electronic lock receives the encrypted instruction, the control module of the electronic lock can search the serial number of the bound corresponding remote control device, decrypt the serial number by using the corresponding control key, and further confirm whether the first setting instruction obtained by decryption is reliable; and then outputting a second display instruction according to the first setting instruction obtained by decryption, and indicating the first display screen to output state public information corresponding to the first setting instruction, so that other external people can clearly reach the state of the corresponding control area of the electronic lock at a glance. When the status indication information is not required to be displayed or the status indication information is required to be switched, the user can input another setting instruction, such as an instruction indicating "cancel do not disturb" or "idle" or the like, by operating the remote control device. For convenience of distinction, an instruction for indicating a meaning of "do not disturb" or "in meeting" or the like that is not desired to be disturbed will be referred to as a first setting instruction, a setting instruction for switching the status publication information to other possible meanings (for example, "cancel do not disturb" or "in idle" as described above) will be referred to as a second setting instruction, and a setting instruction for canceling the display of the status publication information will be referred to as a third setting instruction. The remote control device can correspondingly control the electronic lock through the second setting instruction or the third control instruction, wherein the steps of encrypting and sending all modules, receiving the electronic lock, searching the control key, decrypting, indicating and outputting the electronic lock are similar to the previous steps, and are not repeated here.
In some implementations, different setting instructions may correspond to different status indication information, and may also correspond to one or more different display modes, where the electronic lock may enter a corresponding display mode, such as a continuous display mode, an automatic display mode, a closed mode, and so on, according to the setting instructions.
For example, if the setting instruction corresponds to the continuous display mode, the electronic lock may control the first display screen to be always in a lit state, and display the state public information in a striking manner.
If the setting instruction corresponds to an automatic display mode, the electronic lock can lighten the first display screen and display state public information in a striking mode under the condition that one or more modules based on the human body sensing module and the like comprehensively detect that a person approaches. And under the condition that the approach of a person is not detected, the electronic lock can control the first display screen to be extinguished, so that the power consumption of the electronic lock is saved.
If the setting instruction corresponds to the closing mode, the electronic lock closes the function of displaying the state public information of the first display screen. Of course, it is understood that in the off mode, the first display is only not used for displaying status public information, and the implementation of other functions is not affected.
Optionally, in some implementations, when the first display screen displays some status disclosure information, the first display screen may also display corresponding duration information or predicted remaining time information, so that other users can learn more information, which is beneficial to planning subsequent transaction arrangement, and is more friendly to users. The implementation method is very suitable for scenes such as meeting rooms, and the embarrassment that the business meeting is disturbed by the mistaken entering of other people who want to use the meeting rooms can be effectively avoided.
For example, the electronic lock may begin to time after receiving certain specific setting instructions (e.g., the first setting instructions described above) as duration information, and the duration information may be displayed by the first display screen along with status indication information.
For example, the setting instruction sent by the terminal information such as the remote control device or the mobile phone further carries corresponding preset time information, and after receiving some specific setting instructions (for example, the first setting instruction), the electronic lock can determine the remaining time information according to the preset time information (other time information such as the current time information may also be included when needed) and the like, and the remaining time information and the state indication information are displayed together by the first display screen.
Optionally, in addition to the foregoing authorization change information and status indication information, the electronic lock of the present application may also be used to prompt other information, such as recent unlocking records, recent equipment risk information, and the like.
For example, a recent unlock record may be used to describe an unlock event that occurred during a recent time period, display content including unlock user name, unlock time, unlock mode, etc., and allow the user to click to view more unlock records.
Also by way of example, the near-term device risk information may include one or more of the following: the low-electricity indicating information of the door lock battery is used for describing the recently-tried-open or theft prying alarming information.
Such information may be displayed by a first display on the outer panel of the electronic lock, by a second display on the inner panel, or simultaneously. The attention degree can be further improved by adopting striking characters or colors and the like during display. In addition, the loudspeaker and the like of the electronic lock can also carry out voice reminding on the information.
The conventional common electronic lock outer panel is only provided with a small screen (0.97 inch in common), and the design aims at unlocking for inputting a password and performing simple authorization management operation occasionally, only very small menu characters can be displayed, the brightness is darker, only dot matrix Chinese characters with fixed size can be displayed, the display of various specific information under specific scenes cannot be met due to small limitations, and for example, reminding of risks such as authorization change information of a door lock and state indication of a management area are difficult to clearly and effectively realize. Because of the limitation of hardware capability, the common electronic lock usually prompts alarming information such as low electric quantity in a mode of voice broadcasting, color changing of an indicator light and the like.
Compared with such electronic lock, the scheme in this application embodiment introduces the large screen (i.e. first display screen) in the outer panel, and this large screen can be similar to the size of cell-phone screen, and this makes the information that it shows, no matter be authorization change information, state public information, or other danger information such as electric quantity is too low, try out the warning, steal and sled warning, can all be more striking, as long as the user walks to the door in front, basically all can notice above information, can be reminded better to look over authorization change information or other risk information to the manager, can be reminded better to state public information to other users, avoid the embarrassment of going into the door in the state of not disturbing in the room.
Although some of the traditional door control systems also have large screens, the door control systems with large screens usually need to be systematically designed and constructed in the whole place in the decoration stage, and are not suitable for the transformation and upgrading of stock wooden doors, burglarproof doors and the like. Compared with the method, the electronic lock can be conveniently applied to application scenes transformed in the later period, and meanwhile, the prompting requirement of specific information in diversified scenes can be met.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a computer readable storage medium or computer program product in addition to the product form and display method of an electronic lock and electronic lock system. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects.
The present application may also take the form of a computer program product embodied on one or more computer-readable storage media having computer-usable program code embodied therein. That is, in an embodiment of the present application, there is also provided a computer-readable storage medium storing a computer program that, when executed by a processor, causes the processor to perform some or all of the steps in any one implementation of the foregoing display method.
When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should be understood that, in various embodiments of the present application, the execution sequence of each step should be determined by the function and the internal logic, and the size of the sequence number of each step does not mean that the execution sequence is sequential, and does not limit the implementation process of the embodiments.
It should be further understood that, for the sake of clarity in describing the embodiments of the present application, in the embodiments of the present application, the words "first," "second," etc. are used to distinguish between identical or similar items having substantially the same function and effect, or concepts that differ somewhat. It will be appreciated by those of skill in the art that the words "first," "second," and the like do not limit the amount and order of execution, and that the words "first," "second," and the like do not necessarily differ.
It should be understood that in the structural description of the present application, the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", and the like indicate orientation or positional relationship generally based on the orientation or positional relationship shown in the drawings. These orientations or positional relationships are for convenience of description, and are not intended to indicate or imply that the device or component being referred to must have a particular orientation or positional relationship, or must be constructed and operated in a particular orientation or positional relationship, and are not to be construed as limiting the application.
The same or similar parts of the various embodiments in this specification may be referred to each other. Different embodiments may be combined with each other as long as there is no logical conflict.

Claims (10)

1. The electronic lock comprises an outer panel, an inner panel and a control module, and is characterized in that a first display screen is arranged on the outer panel;
the control module is at least used for: outputting a first display instruction when the unlocking certificate input by the current first user passes verification and authorization change information required to be displayed for the first user exists; the authorization change information is used for indicating the permission change condition of the electronic lock in a preset time period;
the first display screen is at least used for: and displaying prompt information under the control of the first display instruction, wherein the prompt information is used for guiding a user to view the authorization change information.
2. The electronic lock of claim 1, wherein the electronic lock is configured to be locked,
the control module is further configured to: acquiring a read authorization version number of the first user under the condition that the first user has the viewing authority of the authorization change information; and determining whether authorization change information which needs to be displayed for the first user exists or not based on the current authorization version number of the electronic lock and the read authorization version number of the first user.
3. The electronic lock of claim 2, wherein the electronic lock is configured to be locked,
the control module is further configured to: updating the value of the read authorization version number of the first user under the condition that a read confirmation instruction is received, wherein the read confirmation instruction is an instruction input on the electronic lock after the first user views corresponding authorization change information based on the prompt information; and/or the number of the groups of groups,
the control module is further configured to: updating the value of the read authorization version number of the first user based on the first synchronization data uploaded to the server by the terminal device before the step of determining whether there is authorization change information to be presented for the first user; the first synchronization data is used for indicating an authorization version number corresponding to the authorization change information which is already checked by the first user on the terminal equipment.
4. An electronic lock according to any one of the claims 1-3, characterized in that,
the control module is further configured to: outputting a second display instruction under the condition of receiving a setting instruction from the remote control device;
the first display screen is further used for: and displaying state public information corresponding to the setting instruction under the control of the second display instruction, wherein the state public information is used for indicating the state of the control area of the electronic lock.
5. The electronic lock of claim 4, wherein the first display screen is further configured to: and displaying the duration time or the predicted remaining time of the state indicating information under the control of the second display instruction.
6. The electronic lock of claim 4, wherein the electronic lock is configured to be locked,
the control module is further configured to: based on the setting instruction, controlling the electronic lock to enter a corresponding continuous display mode or an automatic display mode;
the first display screen is further used for: continuously displaying the state public information in the continuous display mode; or in the automatic display mode, the state indication information is displayed when a person is detected to be close.
7. The electronic lock of any one of claims 1-6, wherein the control module is further configured to: if the authorization change information required to be displayed for the first user comprises at least one permission change condition of a user with management permission, prohibiting the electronic lock from executing unlocking operation before receiving a read confirmation instruction; the instruction for confirming the read instruction is an instruction input on the electronic lock after the first user views corresponding authorization change information based on the prompt information.
8. An electronic lock system, comprising the electronic lock of any one of claims 1-7, a server, a terminal device client, and a remote control device; the remote control equipment can be bound with the electronic lock and connected in a communication mode, and the electronic lock and the terminal equipment client can be connected with the server in a communication mode respectively.
9. The display method applied to the electronic lock is characterized by comprising an outer panel and an inner panel, wherein a first display screen is arranged on the outer panel; the method comprises the following steps:
outputting a first display instruction to control the first display screen to display prompt information when the unlocking certificate input by the current first user passes verification and authorization change information required to be displayed for the first user exists; the authorization change information is used for indicating the permission change condition of the electronic lock in a preset time period, and the prompt information is used for guiding a user to view the authorization change information.
10. A computer readable storage medium storing a computer program, which when executed by a processor causes the processor to perform the method of claim 9.
CN202311244478.4A 2023-09-26 2023-09-26 Electronic lock, electronic lock system, display method and storage medium Active CN117275121B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311244478.4A CN117275121B (en) 2023-09-26 2023-09-26 Electronic lock, electronic lock system, display method and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311244478.4A CN117275121B (en) 2023-09-26 2023-09-26 Electronic lock, electronic lock system, display method and storage medium

Publications (2)

Publication Number Publication Date
CN117275121A true CN117275121A (en) 2023-12-22
CN117275121B CN117275121B (en) 2024-07-09

Family

ID=89204062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311244478.4A Active CN117275121B (en) 2023-09-26 2023-09-26 Electronic lock, electronic lock system, display method and storage medium

Country Status (1)

Country Link
CN (1) CN117275121B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751555A (en) * 2015-04-13 2015-07-01 郭萌 Information display lock
CN105447940A (en) * 2015-12-11 2016-03-30 炬众钛合(天津)科技发展有限公司 Intelligent lock based on remote control of internet of things
WO2017162064A1 (en) * 2016-03-23 2017-09-28 阿里巴巴集团控股有限公司 Equipment control method, user equipment, server, internet of things equipment and system
CN208184434U (en) * 2018-03-20 2018-12-04 杭州萤石软件有限公司 Intelligent lock and equipment with same
CN109544760A (en) * 2018-12-03 2019-03-29 广州中石科技有限公司 A kind of smart lock managing and control system
CN115348021A (en) * 2021-04-27 2022-11-15 重庆清研理工智慧工厂设计研究院有限公司 Identity authentication and authorization management module of IoT Hub system
US20230177125A1 (en) * 2020-12-08 2023-06-08 Platformbase Co., Ltd Electronic key interlocked with smart device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751555A (en) * 2015-04-13 2015-07-01 郭萌 Information display lock
CN105447940A (en) * 2015-12-11 2016-03-30 炬众钛合(天津)科技发展有限公司 Intelligent lock based on remote control of internet of things
WO2017162064A1 (en) * 2016-03-23 2017-09-28 阿里巴巴集团控股有限公司 Equipment control method, user equipment, server, internet of things equipment and system
CN208184434U (en) * 2018-03-20 2018-12-04 杭州萤石软件有限公司 Intelligent lock and equipment with same
CN109544760A (en) * 2018-12-03 2019-03-29 广州中石科技有限公司 A kind of smart lock managing and control system
US20230177125A1 (en) * 2020-12-08 2023-06-08 Platformbase Co., Ltd Electronic key interlocked with smart device
CN115348021A (en) * 2021-04-27 2022-11-15 重庆清研理工智慧工厂设计研究院有限公司 Identity authentication and authorization management module of IoT Hub system

Also Published As

Publication number Publication date
CN117275121B (en) 2024-07-09

Similar Documents

Publication Publication Date Title
US11830306B2 (en) Systems and methods for controlling access to physical space
AU2017276840B2 (en) Padlock device, systems including a padlock device, and methods of operating therefor
US10257179B1 (en) Credential management system and peer detection
CN106887064B (en) Access controller based on dynamic password and access control system
KR102008945B1 (en) System and method for public terminal security
US9438597B1 (en) Regulating credential information dissemination
KR20130042802A (en) System and method for authentication security using of user terminal
JP7489658B2 (en) Access control device, access control system and access control method using the same
CN117275121B (en) Electronic lock, electronic lock system, display method and storage medium
KR102211272B1 (en) Access control system and access control method using the same
Edwan et al. Assets and keys management system using NFC technology
KR20160109899A (en) Mobile, doorlock management method using the mobile and recording media storing program performing the said method
KR20150039955A (en) A Remote Lock System using Wireless Communications
KR20220065734A (en) Entrance management system and method thereof
TWM449312U (en) Cloud door-security management system
KR20140002578A (en) Digital door lock device with communication module and digital door lock security service method
KR20190101917A (en) Digital door lock with text display display liquid crystal
KR101645125B1 (en) Entrance Certification Method Using NFC of Smartphone
US20240214208A1 (en) Techniques for providing a digital keychain for physical objects
KR20200001413A (en) Server for managing door-lock device by inaudible sound wave, door-lock device, and method for controling door-lock device
KR20210053254A (en) system and server for Managing Electronic Keys
TR201615396A2 (en) Display of keypad and display of NFC-enabled input terminals on smart devices
US20130106570A1 (en) Security system and method
KR20130050314A (en) Security reinforced door lock device with added communication module and security reinforced method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant