WO2016184195A1 - Door lock control method, apparatus and terminal - Google Patents

Door lock control method, apparatus and terminal Download PDF

Info

Publication number
WO2016184195A1
WO2016184195A1 PCT/CN2016/073959 CN2016073959W WO2016184195A1 WO 2016184195 A1 WO2016184195 A1 WO 2016184195A1 CN 2016073959 W CN2016073959 W CN 2016073959W WO 2016184195 A1 WO2016184195 A1 WO 2016184195A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
authentication information
door lock
terminal
verification information
Prior art date
Application number
PCT/CN2016/073959
Other languages
French (fr)
Chinese (zh)
Inventor
王勇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016184195A1 publication Critical patent/WO2016184195A1/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means

Definitions

  • the present invention relates to the field of communications, and in particular to a method, an apparatus, and a terminal for controlling a door lock.
  • a related art solution is to use a fingerprint authentication door opening system, and it is necessary to collect a user fingerprint in advance, and then the visiting person needs to input a fingerprint, and then the system determines whether the person can enter the door.
  • the disadvantage of such a system is that it requires a process of entering a fingerprint, which is troublesome. When the family installs this kind of door lock, if there is no one in the house, the first visitor will not be able to enter the door.
  • the preservation of fingerprints in such a system does not guarantee absolute security, which may result in the leakage of the fingerprint information of the visitor, resulting in personal privacy leakage.
  • the embodiment of the invention provides a method, a device and a terminal for controlling a door lock, so as to at least solve the problem that the related technology is likely to cause personal privacy leakage during the process of unlocking.
  • a method for controlling a door lock includes: receiving request information for requesting a wireless local area network connection sent by a terminal, and connecting to the terminal according to the request information; receiving the terminal The sent authentication information for requesting unlocking; determining whether the authentication information is valid according to the preset unlocking verification information; and opening the door lock when the authentication information is valid.
  • determining whether the authentication information is valid according to the preset unlocking verification information includes: determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information; When the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, it is determined that the authentication information is valid.
  • the method before determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information, the method further includes: determining whether the long-term effective address included in the unlocking verification information is And including the terminal address in the authentication information. When the long-term effective address includes the terminal address, determining whether the preset unlocking key in the unlocking verification information includes an unlocking key in the authentication information.
  • the method further includes: determining whether the temporary effective address included in the unlocking verification information is The terminal address in the authentication information is included; when the temporary effective address includes the terminal address, determining whether the current time is within the valid time of the unlocking key; and the unlocking key is located in the current time And determining, in the valid time, whether the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information.
  • the method before the opening the door lock, the method further includes: collecting a distance detection signal according to a preset period, wherein the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock; After the duration of the distance detection signal indicating the presence of the object reaches a preset threshold, the notification message is sent to the management device of the door lock.
  • the method before receiving the authentication information sent by the terminal for requesting unlocking, the method further includes: receiving the predetermined unlocking verification information; and storing the received unlocking verification information.
  • a control apparatus for a door lock including: a connection module, configured to receive request information for requesting a wireless local area network connection sent by a terminal, and perform the request with the terminal according to the request information.
  • the first receiving module is configured to receive the authentication information sent by the terminal for requesting unlocking;
  • the determining module is configured to determine whether the authentication information is valid according to the preset unlocking verification information; and the unlocking module is set to When the authentication information is valid, the door lock is opened.
  • the determining module further includes: a first determining unit, configured to determine whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information; and the first determining unit is configured to And determining, when the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, that the authentication information is valid.
  • the determining module further includes: a second determining unit, configured to determine the unlocking verification before determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information Whether the long-term effective address included in the information includes the terminal address in the authentication information; and the second determining unit is configured to determine, when the long-term effective address includes the terminal address, determine a preset in the unlocking verification information Whether the unlocking key includes an unlocking key in the authentication information.
  • the determining module further includes: a third determining unit, configured to determine the unlocking verification before determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information Whether the temporary effective address included in the information includes the terminal address in the authentication information; and the fourth determining unit is configured to determine, when the temporary effective address includes the terminal address, whether the current time is located in the unlocking key a third determining unit, configured to determine, when the current time is within the valid time of the unlocking key, determining whether the unlocking key preset in the unlocking verification information includes the authentication information The unlocking key.
  • the device further includes: an acquisition module, configured to follow the preset before the unlocking module opens the door lock Collecting a distance detection signal, wherein the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock; and the notification module is configured to reach a preset threshold when the duration of the distance detection signal indicating the presence of the object reaches Thereafter, a notification message is sent to the management device of the door lock.
  • an acquisition module configured to follow the preset before the unlocking module opens the door lock Collecting a distance detection signal, wherein the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock
  • the notification module is configured to reach a preset threshold when the duration of the distance detection signal indicating the presence of the object reaches Thereafter, a notification message is sent to the management device of the door lock.
  • the device further includes: a second receiving module, configured to receive the predetermined unlocking verification information before receiving the authentication information sent by the terminal for requesting unlocking; and the storage module is configured to receive and receive The unlocking verification information obtained.
  • a second receiving module configured to receive the predetermined unlocking verification information before receiving the authentication information sent by the terminal for requesting unlocking
  • the storage module is configured to receive and receive The unlocking verification information obtained.
  • another method of controlling a door lock comprising: transmitting request information requesting a wireless local area network connection, and connecting with a door lock control device; transmitting to the door lock control device The authentication information for requesting unlocking, wherein the authentication information corresponds to unlocking verification information for unlocking verification held by the door lock control device.
  • the method further includes: sending the terminal address of the terminal to the door lock control device, where the terminal address is used by Generating the unlocking verification information; receiving the verification information sent by the door lock control device, and generating, by using a preset algorithm, the authentication information for unlocking according to the verification information, wherein the verification information and the unlocking The verification information is related; the authentication information is saved.
  • a control terminal for another door lock including: a first sending module, configured to send request information requesting a wireless local area network connection, and connect with a door lock control device;
  • the sending module is configured to send, to the door lock control device, authentication information for requesting unlocking, wherein the authentication information corresponds to unlocking verification information for verifying unlocking saved by the door lock control device.
  • the terminal further includes: a third sending module, configured to send the terminal address of the terminal to the door lock control device before sending the authentication information for requesting unlocking to the door lock control device, The terminal address is used to generate unlocking verification information.
  • a processing module configured to receive verification information sent by the door lock control device, and generate authentication information for unlocking according to the verification information by using a preset algorithm, where the verification information and the unlock verification Information related;
  • a storage module configured to save the authentication information.
  • the request information transmitted by the receiving terminal and connected to the terminal is used, and after the communication connection is established with the terminal by using the wireless local area network, the unlocking request message sent by the terminal through the specified application is received.
  • the unlock request message includes the authentication information, and then determines whether the authentication information is valid according to the preset unlocking verification information.
  • the door lock is opened, and the related technology is unlocked. In the process, it is easy to cause personal privacy leakage, and the unlocking process is also simple and easy, and the effect of improving the user's unlocking experience is achieved.
  • FIG. 1 is a flow chart of a method of controlling a door lock according to an embodiment of the present invention
  • FIG. 2 is a block diagram showing the structure of a control device for a door lock according to an embodiment of the present invention
  • FIG. 3 is a block diagram showing an optional structure of a control device for a door lock according to an embodiment of the present invention
  • FIG. 4 is a block diagram 2 of an optional structure of a control device for a door lock according to an embodiment of the present invention
  • FIG. 5 is a block diagram 3 of an optional structure of a control device for a door lock according to an embodiment of the present invention.
  • FIG. 6 is a block diagram 4 of an optional structure of a control device for a door lock according to an embodiment of the present invention
  • FIG. 7 is a block diagram 5 of an optional structure of a control device for a door lock according to an embodiment of the present invention.
  • FIG. 8 is a flow chart of another method of controlling a door lock according to an embodiment of the present invention.
  • FIG. 9 is a structural block diagram of a control terminal of a door lock according to an embodiment of the present invention.
  • FIG. 10 is a block diagram 1 of an optional structure of a control terminal of a door lock according to an embodiment of the present invention
  • Figure 11 is a structural view of an unlocking system in accordance with an alternative embodiment of the present invention.
  • 13 is a flow chart of an administrator user unlocking according to an alternative embodiment of the present invention.
  • FIG. 14 is a flow chart of a visitor user unlocking in accordance with an alternative embodiment of the present invention.
  • 15 is an anti-theft flow diagram of an unlocking system in accordance with an alternate embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for controlling a door lock according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
  • Step S102 receiving request information for requesting wireless local area network connection sent by the terminal, and connecting with the terminal according to the request information;
  • the WLAN can be, but is not limited to, a WIFI network, a Bluetooth network, a near-field NFC communication network, and the like.
  • the WIFI network is used as an example
  • the terminal can be, but is not limited to, a smart phone, a tablet, and a mobile phone.
  • a smart phone is used as an example.
  • Step S104 Receive authentication information sent by the terminal for requesting unlocking.
  • the terminal can also install the specified application, and directly connect with the unlocking system through the application, such as unlocking the application APP, and the application saves the authentication information used by the terminal for unlocking, and when the user opens the application, The unlocking request information is directly started, and the authentication information for unlocking is carried, so that only the specified application can be opened to unlock the operation, and the application can be used to send the authentication information for requesting unlocking.
  • the application such as unlocking the application APP
  • the application saves the authentication information used by the terminal for unlocking, and when the user opens the application, The unlocking request information is directly started, and the authentication information for unlocking is carried, so that only the specified application can be opened to unlock the operation, and the application can be used to send the authentication information for requesting unlocking.
  • Step S106 determining whether the authentication information is valid according to the preset unlocking verification information
  • the unlocking verification information is preset in the unlocking system, and is used for authenticating and matching the authentication information carried in the unlocking request message, and confirming whether the terminal sends the correct “key”.
  • Step S108 when the authentication information is valid, the door lock is opened.
  • the authentication information When the authentication information is valid, that is, when the terminal sends the authentication information as the correct "key", the mechanical device or the electronic device that controls the door lock opens the door lock.
  • the authentication information when the authentication information is invalid, That is, when the terminal sends that the authentication information is not the correct "key”, the door lock is not opened, and the alarm information can also be sent.
  • the request information transmitted through the wireless local area network sent by the receiving terminal is used and connected with the terminal, and after the wireless local area network establishes a communication connection with the terminal, the receiving terminal sends an unlock request message through the specified application, wherein the unlock request is sent.
  • the message includes the authentication information, and then judges whether the authentication information is valid according to the preset unlocking verification information.
  • the door lock is opened, which solves the problem that the related technology is likely to cause personal privacy leakage during the process of unlocking, and at the same time,
  • the unlocking process is also simple and easy, and the effect of improving the user's unlocking experience is achieved.
  • determining whether the authentication information is valid according to the preset unlocking verification information includes: determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information; When the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, it is determined that the authentication information is valid.
  • the specific process of determining whether the authentication information is valid according to the predetermined unlocking verification information may include two different unlocking scenarios, an administrator scenario and a visitor scenario, and determining the current by identifying the address of the terminal.
  • the administrator scenario including:
  • the terminal address may be, but is not limited to, the mobile phone number of the terminal, the MAC address of the terminal, the fixed IP address of the terminal, the tag number of the terminal, etc., and all the administrators are preset in the unlock verification information.
  • the terminal address and the terminal address of all visitors, the terminal address of the administrator is a long-term effective address, and the terminal address of the visitor is not a long-term effective address.
  • the long-term effective address includes the terminal address, that is, when the terminal is determined to be the identity of the administrator, it is further determined whether the unlocking key carried by the terminal is correct or matched, and all correct unlocking keys are preset in the lock verification information, optionally,
  • the unlocking key can be generated by algorithm calculation, verification, and encryption according to the terminal address.
  • unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, it is determined that the authentication information is valid.
  • the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, that is, when the unlocking key of the terminal is correct or matched, the terminal is allowed to open the door lock, and the door lock is opened.
  • the terminal address is a temporary effective address
  • the identity of the terminal user is a visitor, in the visitor scenario, the method includes:
  • the unlocking key of the visitor terminal further includes an effective time, that is, the unlocking key of the visitor terminal is only temporarily valid, and if it is not within the valid time, the unlocking is not allowed, and optionally,
  • the system time of the unlocking system can only be modified by the terminal of the administrator identity. For example, the babysitter in the user's home is only allowed to unlock the room every morning from 8:00 to 9:00. , 8:00 ⁇ 9:00 is the effective time to unlock the key.
  • the unlocking key is correct, that is, whether the unlocking key preset in the unlocking verification information includes the unlocking key carried by the terminal.
  • unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, determining that the authentication information is valid.
  • the administrator can also pass the data network at the remote end. Temporarily set the visitor's unlock permission without requiring the administrator to unlock the lock.
  • the method before the door lock is opened, the method further includes:
  • S31 Collect a distance detection signal according to a preset period, where the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock;
  • the distance sensor and the infrared sensor can collect the environment around the door lock to monitor the situation outside the door lock.
  • the door lock is within a predetermined distance, that is, when the sensor can sense the physical range, the door can be sensed.
  • the situation around the lock plays a role in monitoring theft.
  • a person may enter or exit, and the distance detection signal may be suspended.
  • the gate is The management device of the lock sends a notification message, and the preset threshold may be determined according to the time required for unlocking. For example, if the normal unlocking requires 30S, the preset threshold may be set to 1 min. When the user has not unlocked within 1 min, the stranger may be a stranger. At this time, the notification message can be sent to the management device of the door lock.
  • the management device can be a terminal with an administrator identity, or a cell property phone or a public security bureau phone. At the same time, the video and voice functions can be enabled, and the administrator can pass the The terminal communicates with a stranger. If it is a guest, it can choose the authority to authorize the visitor. If it is a thief, it can choose to promptly report the police and collect the video of the thief's intention to steal.
  • the infrared distance sensor installed on the door will collect a signal and notify the door.
  • the controller of the lock control system when the controller receives the signal from the infrared distance sensor, turns on the camera, and sends a message to the service platform, and the service platform sends a message to the user's mobile phone through the communication module according to the configured mobile phone number, when the user After receiving the message, knowing that someone is visiting, will log in to the APP, and then communicate with the control platform, and the control platform will send the video data to the mobile phone APP, so that the mobile terminal can video and can talk with the person outside the door to determine whether it is safe.
  • the door opening command and key can be sent to remotely control the opening of the door lock, which makes it very convenient for the visiting person to enter the door, convenient for the elderly and children to enter the door, and when the theft occurs, the user's property can be well protected. Safety.
  • the authentication information carried in the terminal sending the unlock request message may be, but is not limited to, a terminal address, an unlocking key, and an effective time of the unlocking key.
  • the method before the receiving terminal sends the unlock request message by using the specified application, the method further includes:
  • the unlocking verification information used for verifying the unlocking may be set by the terminal of the administrator identity, including the terminal address, the unlocking key, and the effective time of the unlocking key, and the terminal address includes the long-term effective address and the temporary effective address.
  • the unlocking key of the terminal carrying the temporary effective address further includes the effective time of the unlocking key, and after setting the unlocking verification information, it can be saved in the local memory.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods of various embodiments of the present invention.
  • a control device for the door lock is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 2 is a structural block diagram of a control device for a door lock according to an embodiment of the present invention. As shown in FIG. 2, the device may be disposed in an unlocking system and connected to a door lock.
  • the device includes: a connection module 20, and a first receiving module. 22.
  • the connection module 20 is configured to receive request information for requesting a wireless local area network connection sent by the terminal, and connect with the terminal according to the request information;
  • the WLAN can be, but is not limited to, a WIFI network, a Bluetooth network, a near-field NFC communication network, and the like.
  • the WIFI network is used as an example
  • the terminal can be, but is not limited to, a smart phone, a tablet, and a mobile phone.
  • a smart phone is used as an example.
  • the first receiving module 22 is configured to receive, by the terminal, authentication information for requesting unlocking;
  • the specified application can be installed on the terminal, and the application is directly connected to the unlocking system, such as the unlocking APP, and the application saves the authentication information used by the terminal for unlocking, and when the user opens the application, the direct Departing the unlock request information and carrying the authentication information for unlocking, so that only the specified application can be opened to unlock the operation, and the unlocking request message can be sent through the application, and the authentication information for unlocking is carried. .
  • the unlocking system such as the unlocking APP
  • the determining module 24 is configured to determine whether the authentication information is valid according to the preset unlocking verification information
  • the unlocking verification information is preset in the unlocking system, and is set to authenticate and match the authentication information carried in the unlocking request message, and confirm whether the terminal sends the correct “key”.
  • the unlocking module 26 is arranged to open the door lock when the authentication information is valid.
  • the authentication information When the authentication information is valid, that is, when the terminal sends the authentication information as the correct "key", the mechanical device or the electronic device that controls the door lock opens the door lock.
  • the authentication information when the authentication information is invalid, That is, when the terminal sends that the authentication information is not the correct "key”, the door lock is not opened, and the alarm information can also be sent.
  • the device further includes: a first determining unit, in addition to all the modules shown in FIG. 30.
  • a first determining unit Set to determine whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information.
  • the first determining unit 32 is coupled to the first determining unit 30 and configured to pre-define in the unlocking verification information. When the unlocking key is set to include the unlocking key in the authentication information, it is determined that the authentication information is valid.
  • the specific process of determining whether the authentication information is valid according to the preset unlocking verification information includes two different unlocking scenarios, an administrator scenario and a visitor scenario, and the type of the current scene can be determined by identifying the address of the terminal.
  • 4 is a block diagram 2 of an optional structure of a control device for a door lock according to an embodiment of the present invention. As shown in FIG. 4, in an administrator scenario, the device includes a module other than the module shown in FIG. 24 further includes: a second determining unit 40, a second determining unit 42, wherein
  • the second determining unit 40 is configured to determine whether the long-term effective address included in the unlocking verification information includes the authentication information before determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information. Terminal address
  • the second determining unit 42 is configured to determine, when the long-term effective address includes the terminal address, whether the preset unlocking key in the unlocking verification information includes the unlocking key in the authentication information;
  • FIG. 5 is an optional structural block diagram of the control device for the door lock according to the embodiment of the present invention, such as As shown in FIG. 5, in the visitor scenario, the determining module 24 further includes: a third determining unit 50, a fourth determining unit 52, and a third determining unit 54, in addition to all the modules shown in FIG. among them,
  • the third determining unit 50 is configured to determine whether the temporary effective address included in the unlocking verification information includes the authentication information before determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information. Terminal address
  • the fourth determining unit 52 is configured to determine, when the temporary effective address includes the terminal address, whether the current time is within the valid time of the unlocking key;
  • the third determining unit 54 is configured to determine, when the current time is within the valid time of the unlocking key, whether the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information;
  • FIG. 6 is a block diagram showing an optional structure of a control device for a door lock according to an embodiment of the present invention.
  • the device includes: an acquisition module 60 and a notification module, in addition to all the modules shown in FIG. 2 . 62, of which
  • the acquiring module 60 is configured to collect a distance detecting signal according to a preset period before the unlocking module opens the door lock, wherein the distance detecting signal is used to indicate whether an object exists within a predetermined distance of the door lock;
  • the distance sensor and the infrared sensor can collect the environment around the door lock to monitor the situation outside the door lock.
  • the door lock is within a predetermined distance, that is, when the sensor can sense the physical range, the door can be sensed.
  • the situation around the lock plays a role in monitoring theft.
  • a person may enter or exit, and the distance detection signal may be suspended.
  • the notification module 62 is configured to send a notification message to the management device of the door lock after the duration of the distance detection signal indicating the presence of the object reaches a preset threshold.
  • the notification message is sent to the management device of the door lock, and the preset threshold may be determined according to the time required for unlocking, such as a normal unlocking requirement.
  • 30S you can set the preset threshold to 1min. When the user has not unlocked within 1min, it may be a stranger. At this time, you can send a notification message to the management device of the door lock.
  • the management device can be an administrator. Terminal, you can also call the community property phone or the public security bureau. At the same time, you can also enable video and voice functions. The administrator can communicate with strangers through the terminal. If it is a guest, you can choose the authority to authorize the visitor. If it is a thief. You can choose to promptly report the police and collect evidence of the thief’s intention to steal.
  • the infrared distance sensor installed on the door will collect a signal and notify the door.
  • the controller of the lock control system when the controller receives the signal from the infrared distance sensor, turns on the camera, and sends a message to the service platform, and the service platform sends a message to the user's mobile phone through the communication module according to the configured mobile phone number, when the user After receiving the message, knowing that someone is visiting, will log in to the APP, and then communicate with the control platform, and the control platform will send the video data to the mobile phone APP, so that the mobile terminal can video and can talk with the person outside the door to determine whether it is safe.
  • the door opening command and key can be sent to remotely control the opening of the door lock, which makes it very convenient for the visiting person to enter the door, convenient for the elderly and children to enter the door, and when the theft occurs, the user's property can be well protected. Safety.
  • the authentication information carried in the terminal sending the unlock request message may be, but is not limited to, a terminal address, an unlocking key, and an effective time of the unlocking key.
  • FIG. 7 is a block diagram of an optional structure of a control device for a door lock according to an embodiment of the present invention. As shown in FIG. 7, the device includes: a second receiving module 70, in addition to all the modules shown in FIG. a storage module 72, wherein
  • the second receiving module 70 is configured to receive the predetermined unlocking verification information before the first receiving module receives the unlocking request message sent by the terminal by using the specified application;
  • the storage module 72 is configured to store the received unlock verification information.
  • the unlocking verification information used for verifying the unlocking may be set by the terminal of the administrator identity, including the terminal address, the unlocking key, and the effective time of the unlocking key, and the terminal address includes the long-term effective address and the temporary effective address.
  • the unlocking key of the terminal carrying the temporary effective address further includes the effective time of the unlocking key, and after setting the unlocking verification information, it can be saved in the local memory.
  • FIG. 8 is a flowchart of another method for controlling the door lock according to the embodiment of the present invention. As shown in FIG. The process includes the following steps:
  • S802 Send request information requesting a wireless local area network connection, and connect with the door lock control device;
  • the method before sending the authentication information for requesting the unlocking to the door lock control device, the method further includes:
  • S52 Receive verification information sent by the door lock control device, and generate authentication information for unlocking according to the verification information by using a preset algorithm, where the verification information is related to the unlock verification information;
  • a control terminal for a door lock is provided, and the terminal is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein.
  • FIG. 9 is a structural block diagram of a control terminal of a door lock according to an embodiment of the present invention. As shown in FIG. 9, the method includes: a first sending module 90 and a second sending module 92, where
  • the first sending module 90 is configured to send request information requesting a wireless local area network connection, and is connected to the door lock control device;
  • the second sending module 92 is configured to send the authentication information for requesting unlocking to the door lock control device.
  • the device further includes: a third sending module 102, in addition to all the modules shown in FIG. a processing module 104, a storage module 106, wherein
  • the third sending module 102 is configured to send the terminal address of the terminal to the door lock control device before sending the authentication information for requesting the unlocking to the door lock control device, where the terminal address is used to generate the unlocking verification information;
  • the processing module 104 is configured to receive the verification information sent by the door lock control device, and generate the authentication information for unlocking according to the verification information by using a preset algorithm, where the verification information is related to the unlocking verification information;
  • the storage module 106 is configured to save the authentication information.
  • the present invention further provides a system for controlling the door lock, comprising: the control device and the figure of the door lock according to any one of FIG. 2 to FIG. 9- The control terminal of the door lock of any of FIG.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
  • the solution of the optional embodiment includes a smart phone with a fingerprint recognition function or a voiceprint recognition function, an app system for unlocking on the smart phone, and a visitor mobile phone for entering the door, and the visitor mobile phone may not have fingerprint recognition.
  • the function is just a normal smartphone, and there is a control system for controlling the door switch.
  • the control system has a camera, a microphone and an infrared distance sensor.
  • FIG. 11 is a structural diagram of an unlocking system according to an alternative embodiment of the present invention.
  • the method includes: a plurality of mobile phones 100, wherein the administrator mobile phone can be provided with a fingerprint identification device, and other mobile phones can be ordinary smart phones.
  • Control platform 200 door lock control system 300; door lock 400; camera 500; microphone 600; infrared distance sensor 700;
  • an APP for unlocking is installed on the smartphone so that the smartphone can communicate with the control platform.
  • the control platform is the control center of the entire device, including the interactive interface module 201, the database 202, the communication module (1) 203, the processor 204, the Wifi transmitting module 205, and the communication module (2) 206.
  • the control platform is located at home and can be authenticated.
  • the interactive interface of the computer or the administrator's mobile phone login control platform is set to the control center, and the ordinary mobile phone cannot log in to the control platform.
  • the door lock control system is placed in the door, and the communication module 301 is arranged to communicate with the control platform communication module (1) 203; the processor 302 is connected with the camera 500, the microphone 600, the infrared distance sensor 700; the door lock control module 303 and the door
  • the lock mechanism is connected and is arranged to control the opening action of the door lock.
  • the door lock control When the system meets certain conditions (the infrared distance sensor detects that someone has stayed within a certain distance outside the door for a certain period of time), the camera and microphone will be turned on and the data will be uploaded to the control platform.
  • the backup power supply is used to temporarily power the entire system during a power outage.
  • FIG. 12 is a flowchart of a method for setting an unlocking key according to an optional embodiment of the present invention. As shown in FIG. 12, the steps of the method include:
  • the control platform generates a secret key, saves the secret key in a database, and sends the verification code to the administrator mobile phone;
  • the administrator mobile phone logs in the unlocking APP, enters the verification code, and obtains the same key as the control platform and stores it.
  • the login control platform interactive interface performs the necessary settings. To ensure the security of the entire system, the login password must be set, and other devices cannot log in to the control center. Then set up one or several mobile numbers that can be remotely connected to the Control Center. These mobile users are administrators. The administrator phone should install the app. This app is used to unlock, remotely log in to the control center interactive interface, and make related settings. After the administrator's mobile phone number is set successfully, the control platform will generate a secret key, store the secret key and the corresponding mobile phone number in the database, and send the verification code to the administrator mobile phone.
  • the administrator's mobile phone After receiving the verification code sent by the control center, the administrator's mobile phone enters into the APP, and the APP will generate a key according to the input verification code according to the same calculation method as the control center.
  • This key is stored in the control center database. The keys are the same or match. This key will be sent to the control center when the administrator makes the opening request and login interface to set the relevant settings. When the key is matched with the control center key, the related operations are allowed.
  • FIG. 13 is a flowchart of a method for an administrator user to unlock according to an alternative embodiment of the present invention. As shown in FIG. 13, the steps of the method include:
  • S1305 The control platform compares the mobile phone authentication information and the secret key with the stored information in the database to see if the database exists; otherwise, S1306 is executed.
  • the control platform compares the key sent by the mobile phone with the key stored in the database. If the key is included in the database, the control platform will send a door open command to the door lock control system, and the door will open. It is very convenient to not require the operator to perform other input operations throughout the process.
  • FIG. 14 is a flowchart of a method for unlocking a visitor user according to an alternative embodiment of the present invention. As shown in FIG. 14, the steps of the method include:
  • the administrator can log in to the APP, and the APP contacts the control platform, and then sets the mobile phone number that can be accessed and the length of time that the number has the permission to open the door. This information will be stored in the control platform. In the database. After the setup is successful, as long as the visitor installs the mobile phone to open the door APP, when the visitor approaches the door and detects the home Wifi, it will communicate with the control platform through the Wifi, and the control platform verifies whether the database is open to the mobile phone. Permissions, if yes, the door will open, otherwise, refuse to open the door, the entire process visitors do not need to operate the phone, just run the unlock APP.
  • FIG. 15 is a flow chart of a method for theft prevention of an unlocking system according to an alternative embodiment of the present invention. As shown in FIG. 15, the steps of the method include:
  • the infrared distance sensor sends a signal to the door lock control system processor
  • the door lock control system turns on the camera and sends a signal to the control platform;
  • the control platform sends a message to the designated mobile phone through the communication module.
  • the mobile phone login unlocks the APP, communicates with the control platform, and can talk to the person outside the door through the camera and the microphone;
  • the installed infrared distance sensor will collect the signal and notify the controller of the door lock control system.
  • the controller receives the signal from the infrared distance sensor, the camera is turned on and the message is sent to the service platform.
  • the service platform is configured according to the configuration.
  • the mobile phone number sends a message to the user's mobile phone through the communication module.
  • the control platform sends the video data to the mobile phone APP, so that the mobile terminal can video.
  • the administrator manages the mobile phone with the fingerprint recognition function to perform authentication management on the open door.
  • the administrator's mobile phone only needs to press the finger on the fingerprint sensor for a certain period of time, and then the request operation for opening the door can be completed.
  • the administrator mobile phone can set the opening permission of the ordinary visitor mobile phone for the duration of T, and the visitor only needs to run the unlocking APP, and does not need to It is very convenient to carry out other operations on the mobile phone.
  • the information when there is a visitor of the mobile phone, the information can be conveniently transmitted to the administrator's mobile phone to open the door for the visitor.
  • This embodiment can be very burglar-proof and has good intelligence.
  • This embodiment controls The platform or the APP generates a key by the verification code, and has its own unique algorithm, so it can securely authenticate the mobile phone and has good security.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the receiving terminal sends an unlock request message by using an application, where the unlock request message includes authentication information.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. Perform the steps shown or described Alternatively, each of them may be fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof may be fabricated into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
  • the request information transmitted by the receiving terminal and connected to the terminal is used, and after the communication connection is established with the terminal by using the wireless local area network, the unlocking request message sent by the terminal through the specified application is received.
  • the unlock request message includes the authentication information, and then determines whether the authentication information is valid according to the preset unlocking verification information.
  • the door lock is opened, and the related technology is unlocked. In the process, it is easy to cause personal privacy leakage, and the unlocking process is also simple and easy, and the effect of improving the user's unlocking experience is achieved.

Abstract

A door lock control method, apparatus (200, 300) and terminal (100). The method comprises: receiving request information sent by the terminal (100) for requesting a wireless local area network connection, and establishing a connection with the terminal (100) according to the request information; receiving authentication information sent by the terminal (100) for requesting unlocking; determining whether the authentication information is valid according to preset unlocking verification information; and unlocking a door lock (400) when the authentication information is valid. The problem in related technologies that leakage of personal privacy tends to occur during the unlocking process is solved. Also, unlocking is simple and practicable, and the effect of improving the unlocking experience of users is achieved.

Description

门锁的控制方法、装置及终端Door lock control method, device and terminal 技术领域Technical field
本发明涉及通信领域,具体而言,涉及一种门锁的控制方法、装置及终端。The present invention relates to the field of communications, and in particular to a method, an apparatus, and a terminal for controlling a door lock.
背景技术Background technique
目前,大多数家用门锁都是机械式的结构,这种机械式结构在日常生活中,并不是非常方便,当忘记带钥匙时将会非常麻烦。尤其是老人和儿童,经常发生忘记带钥匙的事情。此外,传统的门锁在有人进行破坏、盗窃的时候,不能及时的将情况通知有关人员,造成经济损失。At present, most household door locks are mechanical structures. This mechanical structure is not very convenient in daily life, and it will be very troublesome when forgetting to bring the keys. Especially for the elderly and children, things that forget to bring keys often occur. In addition, when a traditional door lock is destroyed or stolen, the relevant personnel cannot be notified in a timely manner, resulting in economic losses.
现在,智能手机已经成为了人们生活的必需品,而且,随着指纹解锁的运用,手机已经越来越安全。所以,考虑将手机增加开门锁功能以及与门外来访人员进行远程视频会话功能,让我们的房门更加智能、安全。Nowadays, smart phones have become a necessity for people's lives, and with the use of fingerprint unlocking, mobile phones have become more and more secure. Therefore, consider adding a door lock function to the mobile phone and remote video session with visitors from outside the door to make our door smarter and safer.
相关技术的方案是使用指纹鉴别开门系统,需要提前采集用户指纹,然后,来访的人员需要录入指纹,然后系统判别这个人是否可以进门。这种系统的缺点为需要有录入指纹的过程,比较麻烦。当家庭安装这种门锁后,如果家中没人,那么第一次到来的拜访者将无法进门。此外,将指纹保存在这样的系统中并不能保证绝对安全,有可能造成拜访者指纹信息的泄露,造成个人隐私泄露。A related art solution is to use a fingerprint authentication door opening system, and it is necessary to collect a user fingerprint in advance, and then the visiting person needs to input a fingerprint, and then the system determines whether the person can enter the door. The disadvantage of such a system is that it requires a process of entering a fingerprint, which is troublesome. When the family installs this kind of door lock, if there is no one in the house, the first visitor will not be able to enter the door. In addition, the preservation of fingerprints in such a system does not guarantee absolute security, which may result in the leakage of the fingerprint information of the visitor, resulting in personal privacy leakage.
还有的相关技术的方案,仅仅具有开锁功能,如果有人忘记带手机,就无法进门,当发生盗贼想要破门入室的时候,某些技术方案没有应对措施。There are also related technical solutions, which only have the function of unlocking. If someone forgets to bring a mobile phone, they cannot enter the door. When a thief wants to break into the room, some technical solutions have no countermeasures.
针对相关技术在开锁的过程中开锁操作繁琐,容易造成个人隐私泄露的问题,目前尚未找到有效的解决方案。In view of the cumbersome unlocking operation of the related technology in the process of unlocking, it is easy to cause personal privacy leakage, and no effective solution has been found yet.
发明内容Summary of the invention
本发明实施例提供了一种门锁的控制方法、装置及终端,以至少解决相关技术在开锁的过程中容易造成个人隐私泄露的问题。The embodiment of the invention provides a method, a device and a terminal for controlling a door lock, so as to at least solve the problem that the related technology is likely to cause personal privacy leakage during the process of unlocking.
根据本发明实施例的一个方面,提供了一种门锁的控制方法,包括:接收终端发送的请求无线局域网连接的请求信息,并根据所述请求信息与所述终端进行连接;接收所述终端发送的用于请求开锁的鉴权信息;根据预设的开锁验证信息判断所述鉴权信息是否有效;在所述鉴权信息有效时,打开门锁。According to an aspect of the embodiments of the present invention, a method for controlling a door lock includes: receiving request information for requesting a wireless local area network connection sent by a terminal, and connecting to the terminal according to the request information; receiving the terminal The sent authentication information for requesting unlocking; determining whether the authentication information is valid according to the preset unlocking verification information; and opening the door lock when the authentication information is valid.
可选地,所述根据预设的开锁验证信息判断所述鉴权信息是否有效包括:判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥;在所述开锁验证信息中预设的开锁密钥包括所述鉴权信息中的所述开锁密钥时,确定出所述鉴权信息有效。 Optionally, determining whether the authentication information is valid according to the preset unlocking verification information includes: determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information; When the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, it is determined that the authentication information is valid.
可选地,在判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥之前,所述方法还包括:判断所述开锁验证信息中包括的长期有效地址是否包括所述鉴权信息中的终端地址;在所述长期有效地址包括所述终端地址时,判断所述开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥。Optionally, before determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information, the method further includes: determining whether the long-term effective address included in the unlocking verification information is And including the terminal address in the authentication information. When the long-term effective address includes the terminal address, determining whether the preset unlocking key in the unlocking verification information includes an unlocking key in the authentication information.
可选地,在判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥之前,所述方法还包括:判断所述开锁验证信息中包括的临时有效地址是否包括所述鉴权信息中的终端地址;在所述临时有效地址包括所述终端地址时,判断当前时间是否位于所述开锁密钥的有效时间内;在所述当前时间位于所述开锁密钥的有效时间内时,判断所述开锁验证信息中预设的开锁密钥是否包括所述鉴权信息中的所述开锁密钥。Optionally, before determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information, the method further includes: determining whether the temporary effective address included in the unlocking verification information is The terminal address in the authentication information is included; when the temporary effective address includes the terminal address, determining whether the current time is within the valid time of the unlocking key; and the unlocking key is located in the current time And determining, in the valid time, whether the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information.
可选地,在所述打开门锁之前,所述方法还包括:按照预设周期采集距离检测信号,其中,所述距离检测信号用于指示所述门锁的预定距离内是否存在物体;在所述指示存在物体的距离检测信号的持续时间达到预设阈值之后,向所述门锁的管理设备发送通知消息。Optionally, before the opening the door lock, the method further includes: collecting a distance detection signal according to a preset period, wherein the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock; After the duration of the distance detection signal indicating the presence of the object reaches a preset threshold, the notification message is sent to the management device of the door lock.
可选地,在接收所述终端发送的用于请求开锁的鉴权信息之前,所述方法还包括:接收预定的所述开锁验证信息;存储接收到的所述开锁验证信息。Optionally, before receiving the authentication information sent by the terminal for requesting unlocking, the method further includes: receiving the predetermined unlocking verification information; and storing the received unlocking verification information.
根据本发明实施例的另一方面,提供了一种门锁的控制装置,包括:连接模块,设置为接收终端发送的请求无线局域网连接的请求信息,并根据所述请求信息与所述终端进行连接;第一接收模块,设置为接收所述终端发送的用于请求开锁的鉴权信息;判断模块,设置为根据预设的开锁验证信息判断所述鉴权信息是否有效;开锁模块,设置为在所述鉴权信息有效时,打开门锁。According to another aspect of the present invention, a control apparatus for a door lock is provided, including: a connection module, configured to receive request information for requesting a wireless local area network connection sent by a terminal, and perform the request with the terminal according to the request information. The first receiving module is configured to receive the authentication information sent by the terminal for requesting unlocking; the determining module is configured to determine whether the authentication information is valid according to the preset unlocking verification information; and the unlocking module is set to When the authentication information is valid, the door lock is opened.
可选地,所述判断模块还包括:第一判断单元,设置为判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥;第一确定单元,设置为在所述开锁验证信息中预设的开锁密钥包括所述鉴权信息中的所述开锁密钥时,确定出所述鉴权信息有效。Optionally, the determining module further includes: a first determining unit, configured to determine whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information; and the first determining unit is configured to And determining, when the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, that the authentication information is valid.
可选地,所述判断模块还包括:第二判断单元,设置为在判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥之前,判断所述开锁验证信息中包括的长期有效地址是否包括所述鉴权信息中的终端地址;第二确定单元,设置为在所述长期有效地址包括所述终端地址时,确定判断所述开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥。Optionally, the determining module further includes: a second determining unit, configured to determine the unlocking verification before determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information Whether the long-term effective address included in the information includes the terminal address in the authentication information; and the second determining unit is configured to determine, when the long-term effective address includes the terminal address, determine a preset in the unlocking verification information Whether the unlocking key includes an unlocking key in the authentication information.
可选地,所述判断模块还包括:第三判断单元,设置为在判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥之前,判断所述开锁验证信息中包括的临时有效地址是否包括所述鉴权信息中的终端地址;第四判断单元,设置为在所述临时有效地址包括所述终端地址时,判断当前时间是否位于所述开锁密钥的有效时间内;第三确定单元,设置为在所述当前时间位于所述开锁密钥的有效时间内时,确定判断所述开锁验证信息中预设的开锁密钥是否包括所述鉴权信息中的所述开锁密钥。Optionally, the determining module further includes: a third determining unit, configured to determine the unlocking verification before determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information Whether the temporary effective address included in the information includes the terminal address in the authentication information; and the fourth determining unit is configured to determine, when the temporary effective address includes the terminal address, whether the current time is located in the unlocking key a third determining unit, configured to determine, when the current time is within the valid time of the unlocking key, determining whether the unlocking key preset in the unlocking verification information includes the authentication information The unlocking key.
可选地,所述装置还包括:采集模块,设置为在所述开锁模块打开门锁之前,按照预设 周期采集距离检测信号,其中,所述距离检测信号用于指示所述门锁的预定距离内是否存在物体;通知模块,设置为在所述指示存在物体的距离检测信号的持续时间达到预设阈值之后,向所述门锁的管理设备发送通知消息。Optionally, the device further includes: an acquisition module, configured to follow the preset before the unlocking module opens the door lock Collecting a distance detection signal, wherein the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock; and the notification module is configured to reach a preset threshold when the duration of the distance detection signal indicating the presence of the object reaches Thereafter, a notification message is sent to the management device of the door lock.
可选地,所述装置还包括:第二接收模块,设置为在接收所述终端发送的用于请求开锁的鉴权信息之前,接收预定的所述开锁验证信息;存储模块,设置为存储接收到的所述开锁验证信息。Optionally, the device further includes: a second receiving module, configured to receive the predetermined unlocking verification information before receiving the authentication information sent by the terminal for requesting unlocking; and the storage module is configured to receive and receive The unlocking verification information obtained.
根据本发明实施例的一个方面,提供了另一种门锁的控制方法,包括:发送请求无线局域网连接的请求信息,并与门锁控制装置进行连接;向所述门锁控制装置发送用于请求开锁的鉴权信息,其中,所述鉴权信息与所述门锁控制装置保存的用于开锁验证的开锁验证信息对应。According to an aspect of an embodiment of the present invention, there is provided another method of controlling a door lock, comprising: transmitting request information requesting a wireless local area network connection, and connecting with a door lock control device; transmitting to the door lock control device The authentication information for requesting unlocking, wherein the authentication information corresponds to unlocking verification information for unlocking verification held by the door lock control device.
可选地,在向所述门锁控制装置发送用于请求开锁的鉴权信息之前,所述方法还包括:将终端的终端地址发送给所述门锁控制装置,其中,所述终端地址用于生成开锁验证信息;接收所述门锁控制装置发送的校验信息,并通过预设算法依据所述校验信息生成用于开锁的鉴权信息,其中,所述校验信息与所述开锁验证信息相关;保存所述鉴权信息。Optionally, before the sending the authentication information for requesting the unlocking to the door lock control device, the method further includes: sending the terminal address of the terminal to the door lock control device, where the terminal address is used by Generating the unlocking verification information; receiving the verification information sent by the door lock control device, and generating, by using a preset algorithm, the authentication information for unlocking according to the verification information, wherein the verification information and the unlocking The verification information is related; the authentication information is saved.
根据本发明实施例的另一个方面,提供了另一种门锁的控制终端,包括:第一发送模块,设置为发送请求无线局域网连接的请求信息,并与门锁控制装置进行连接;第二发送模块,设置为向所述门锁控制装置发送用于请求开锁的鉴权信息,其中,所述鉴权信息与所述门锁控制装置保存的用于验证开锁的开锁验证信息对应。According to another aspect of the present invention, a control terminal for another door lock is provided, including: a first sending module, configured to send request information requesting a wireless local area network connection, and connect with a door lock control device; The sending module is configured to send, to the door lock control device, authentication information for requesting unlocking, wherein the authentication information corresponds to unlocking verification information for verifying unlocking saved by the door lock control device.
可选地,所述终端还包括:第三发送模块,设置为在向所述门锁控制装置发送用于请求开锁的鉴权信息之前,将终端的终端地址发送给所述门锁控制装置,其中,所述终端地址用于生成开锁验证信息。处理模块,设置为接收所述门锁控制装置发送的校验信息,并通过预设算法依据所述校验信息生成用于开锁的鉴权信息,其中,所述校验信息与所述开锁验证信息相关;存储模块,设置为保存所述鉴权信息。Optionally, the terminal further includes: a third sending module, configured to send the terminal address of the terminal to the door lock control device before sending the authentication information for requesting unlocking to the door lock control device, The terminal address is used to generate unlocking verification information. a processing module, configured to receive verification information sent by the door lock control device, and generate authentication information for unlocking according to the verification information by using a preset algorithm, where the verification information and the unlock verification Information related; a storage module configured to save the authentication information.
通过本发明实施例,采用接收终端发送的通过无线局域网连接的请求信息并与所述终端进行连接,在采用无线局域网与终端建立通信连接之后,接收所述终端通过指定应用程序发送的开锁请求消息,其中,所述开锁请求消息包括鉴权信息,然后根据预设的开锁验证信息判断所述鉴权信息是否有效,在所述鉴权信息有效时,打开门锁,解决了相关技术在开锁的过程中容易造成个人隐私泄露的问题,同时开锁过程也简单易行,实现了提升用户开锁体验的效果。According to the embodiment of the present invention, the request information transmitted by the receiving terminal and connected to the terminal is used, and after the communication connection is established with the terminal by using the wireless local area network, the unlocking request message sent by the terminal through the specified application is received. The unlock request message includes the authentication information, and then determines whether the authentication information is valid according to the preset unlocking verification information. When the authentication information is valid, the door lock is opened, and the related technology is unlocked. In the process, it is easy to cause personal privacy leakage, and the unlocking process is also simple and easy, and the effect of improving the user's unlocking experience is achieved.
附图说明DRAWINGS
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are intended to provide a further understanding of the invention, and are intended to be a part of the invention. In the drawing:
图1是根据本发明实施例的门锁的控制方法的流程图; 1 is a flow chart of a method of controlling a door lock according to an embodiment of the present invention;
图2是根据本发明实施例的门锁的控制装置的结构框图;2 is a block diagram showing the structure of a control device for a door lock according to an embodiment of the present invention;
图3是根据本发明实施例的门锁的控制装置的可选结构框图一;3 is a block diagram showing an optional structure of a control device for a door lock according to an embodiment of the present invention;
图4是根据本发明实施例的门锁的控制装置的可选结构框图二;4 is a block diagram 2 of an optional structure of a control device for a door lock according to an embodiment of the present invention;
图5是根据本发明实施例的门锁的控制装置的可选结构框图三;5 is a block diagram 3 of an optional structure of a control device for a door lock according to an embodiment of the present invention;
图6是根据本发明实施例的门锁的控制装置的可选结构框图四;6 is a block diagram 4 of an optional structure of a control device for a door lock according to an embodiment of the present invention;
图7是根据本发明实施例的门锁的控制装置的可选结构框图五;7 is a block diagram 5 of an optional structure of a control device for a door lock according to an embodiment of the present invention;
图8是根据本发明实施例的另一种门锁的控制方法的流程图;8 is a flow chart of another method of controlling a door lock according to an embodiment of the present invention;
图9是根据本发明实施例的门锁的控制终端的结构框图;9 is a structural block diagram of a control terminal of a door lock according to an embodiment of the present invention;
图10是根据本发明实施例的门锁的控制终端的可选结构框图一;10 is a block diagram 1 of an optional structure of a control terminal of a door lock according to an embodiment of the present invention;
图11是根据本发明可选实施例的开锁系统结构图;Figure 11 is a structural view of an unlocking system in accordance with an alternative embodiment of the present invention;
图12是根据本发明可选实施例的设置开锁密钥的流程图;12 is a flow chart of setting an unlocking key in accordance with an alternative embodiment of the present invention;
图13是根据本发明可选实施例的管理员用户开锁的流程图;13 is a flow chart of an administrator user unlocking according to an alternative embodiment of the present invention;
图14是根据本发明可选实施例的拜访者用户开锁的流程图;14 is a flow chart of a visitor user unlocking in accordance with an alternative embodiment of the present invention;
图15是根据本发明可选实施例的开锁系统的防盗流程图。15 is an anti-theft flow diagram of an unlocking system in accordance with an alternate embodiment of the present invention.
具体实施方式detailed description
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。The invention will be described in detail below with reference to the drawings in conjunction with the embodiments. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It is to be understood that the terms "first", "second" and the like in the specification and claims of the present invention are used to distinguish similar objects, and are not necessarily used to describe a particular order or order.
在本实施例中提供了一种门锁的控制方法,图1是根据本发明实施例的门锁的控制方法的流程图,如图1所示,该流程包括如下步骤:In this embodiment, a control method of a door lock is provided. FIG. 1 is a flowchart of a method for controlling a door lock according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
步骤S102,接收终端发送的请求无线局域网连接的请求信息,并根据请求信息与终端进行连接;Step S102, receiving request information for requesting wireless local area network connection sent by the terminal, and connecting with the terminal according to the request information;
可选的,无线局域网可以但不限于为WIFI网络、蓝牙网络、近磁场NFC通信网络等,在本实施例中,以WIFI网络进行举例说明,终端可以但不限于为智能手机,平板电脑,手提电脑等,在本实施例中,以智能手机进行举例说明,当常用的终端在靠近门锁附近时,通过无线局域网与开锁系统连接,而在陌生的终端靠近门锁时,由于不能通过无线局域网与开锁系统连接,也就不会触发后续的操作,以屏蔽陌生终端,既减少了开锁系统的连接鉴权操作,还保证了开锁系统的安全性。 Optionally, the WLAN can be, but is not limited to, a WIFI network, a Bluetooth network, a near-field NFC communication network, and the like. In this embodiment, the WIFI network is used as an example, and the terminal can be, but is not limited to, a smart phone, a tablet, and a mobile phone. In this embodiment, a smart phone is used as an example. When a commonly used terminal is near the door lock, it is connected to the unlocking system through the wireless local area network, and when the strange terminal is close to the door lock, it cannot pass the wireless local area network. When connected with the unlocking system, it will not trigger subsequent operations to shield the strange terminal, which not only reduces the connection authentication operation of the unlocking system, but also ensures the security of the unlocking system.
步骤S104,接收终端发送的用于请求开锁的鉴权信息;Step S104: Receive authentication information sent by the terminal for requesting unlocking.
可选的,终端还可以安装指定的应用程序,通过应用程序直接与开锁系统连接,如开锁应用程序APP,应用程序内保存了终端用于开锁的鉴权信息,当用户打开应用程序时,可以直接出发开锁请求信息,并携带用于开锁的鉴权信息,这样只需要打开指定的应用程序就能实现开锁的操作,也可以通过应用程序发送用于请求开锁的鉴权信息。Optionally, the terminal can also install the specified application, and directly connect with the unlocking system through the application, such as unlocking the application APP, and the application saves the authentication information used by the terminal for unlocking, and when the user opens the application, The unlocking request information is directly started, and the authentication information for unlocking is carried, so that only the specified application can be opened to unlock the operation, and the application can be used to send the authentication information for requesting unlocking.
步骤S106,根据预设的开锁验证信息判断鉴权信息是否有效;Step S106, determining whether the authentication information is valid according to the preset unlocking verification information;
在本实施例中,开锁系统内预设了开锁验证信息,用于对开锁请求消息携带的鉴权信息进行鉴权和匹配,确认终端发送的是否为正确的“钥匙”。In this embodiment, the unlocking verification information is preset in the unlocking system, and is used for authenticating and matching the authentication information carried in the unlocking request message, and confirming whether the terminal sends the correct “key”.
步骤S108,在鉴权信息有效时,打开门锁。Step S108, when the authentication information is valid, the door lock is opened.
在鉴权信息有效时,即终端发送的是鉴权信息是正确的“钥匙”时,则控制门锁的机械装置或者电子装置,打开门锁,可选的,在在鉴权信息无效时,即终端发送的是鉴权信息不是正确的“钥匙”时,不打开门锁,还可以通过发送告警信息。When the authentication information is valid, that is, when the terminal sends the authentication information as the correct "key", the mechanical device or the electronic device that controls the door lock opens the door lock. Optionally, when the authentication information is invalid, That is, when the terminal sends that the authentication information is not the correct "key", the door lock is not opened, and the alarm information can also be sent.
通过本实施例,采用接收终端发送的通过无线局域网连接的请求信息并与终端进行连接,在采用无线局域网与终端建立通信连接之后,接收终端通过指定应用程序发送的开锁请求消息,其中,开锁请求消息包括鉴权信息,然后根据预设的开锁验证信息判断鉴权信息是否有效,在鉴权信息有效时,打开门锁,解决了相关技术在开锁的过程中容易造成个人隐私泄露的问题,同时开锁过程也简单易行,实现了提升用户开锁体验的效果。In this embodiment, the request information transmitted through the wireless local area network sent by the receiving terminal is used and connected with the terminal, and after the wireless local area network establishes a communication connection with the terminal, the receiving terminal sends an unlock request message through the specified application, wherein the unlock request is sent. The message includes the authentication information, and then judges whether the authentication information is valid according to the preset unlocking verification information. When the authentication information is valid, the door lock is opened, which solves the problem that the related technology is likely to cause personal privacy leakage during the process of unlocking, and at the same time, The unlocking process is also simple and easy, and the effect of improving the user's unlocking experience is achieved.
在根据本实施例的可选实施方式中,根据预设的开锁验证信息判断鉴权信息是否有效包括:判断预定开锁验证信息中的预设开锁密钥是否包括鉴权信息中的开锁密钥;在开锁验证信息中预设的开锁密钥包括鉴权信息中的开锁密钥时,确定出鉴权信息有效。In an optional implementation manner of the present embodiment, determining whether the authentication information is valid according to the preset unlocking verification information includes: determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information; When the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, it is determined that the authentication information is valid.
可选的,根据上述实施方式,根据预定的开锁验证信息判断鉴权信息是否有效的具体过程可以包括两种不同的开锁场景,管理员场景和拜访者场景,可以通过识别终端的地址来确定当前所处的场景的类型。其中,在管理员场景下,包括:Optionally, according to the foregoing implementation manner, the specific process of determining whether the authentication information is valid according to the predetermined unlocking verification information may include two different unlocking scenarios, an administrator scenario and a visitor scenario, and determining the current by identifying the address of the terminal. The type of scene in which it is located. Among them, in the administrator scenario, including:
S11,判断开锁验证信息中包括的长期有效地址是否包括鉴权信息中的终端地址;S11. Determine whether the long-term effective address included in the unlock verification information includes a terminal address in the authentication information.
在本可选的实施方式中,终端地址可以但不限于为:终端的手机号、终端的MAC地址、终端的固定IP地址、终端的标签号等,开锁验证信息中预设了所有管理员的终端地址和所有拜访者的终端地址,管理员的终端地址为长期有效地址,拜访者的终端地址不是长期有效地址。In this optional embodiment, the terminal address may be, but is not limited to, the mobile phone number of the terminal, the MAC address of the terminal, the fixed IP address of the terminal, the tag number of the terminal, etc., and all the administrators are preset in the unlock verification information. The terminal address and the terminal address of all visitors, the terminal address of the administrator is a long-term effective address, and the terminal address of the visitor is not a long-term effective address.
S12,在长期有效地址包括终端地址时,判断预定开锁验证信息中的预设开锁密钥是否包括鉴权信息中的开锁密钥;S12. When the long-term effective address includes the terminal address, determine whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information.
在长期有效地址包括终端地址时,即判断终端为管理员的身份时,进一步判断终端携带的开锁密钥是否正确或匹配,锁验证信息中预设了所有正确的开锁密钥,可选的,开锁密钥可以根据终端地址通过算法计算、校验、加密后生成。 When the long-term effective address includes the terminal address, that is, when the terminal is determined to be the identity of the administrator, it is further determined whether the unlocking key carried by the terminal is correct or matched, and all correct unlocking keys are preset in the lock verification information, optionally, The unlocking key can be generated by algorithm calculation, verification, and encryption according to the terminal address.
S13,在开锁验证信息中预设的开锁密钥包括鉴权信息中的开锁密钥时,确定出鉴权信息有效。S13. When the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, it is determined that the authentication information is valid.
在开锁验证信息中预设的开锁密钥包括鉴权信息中的开锁密钥时,即终端的开锁密钥正确或匹配时,允许终端打开门锁,门锁打开。When the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, that is, when the unlocking key of the terminal is correct or matched, the terminal is allowed to open the door lock, and the door lock is opened.
根据本发明实施例的另一种可选的实施方式中,在长期有效地址不包括终端地址时,终端地址为临时有效地址,终端用户的身份为拜访者时,在拜访者场景下,包括:According to another optional implementation manner of the embodiment of the present invention, when the long-term effective address does not include the terminal address, the terminal address is a temporary effective address, and when the identity of the terminal user is a visitor, in the visitor scenario, the method includes:
S21,判断开锁验证信息中包括的临时有效地址是否包括鉴权信息中的终端地址;S21. Determine whether the temporary effective address included in the unlock verification information includes a terminal address in the authentication information.
S22,在临时有效地址包括终端地址时,判断当前时间是否位于开锁密钥的有效时间内;S22. When the temporary effective address includes the terminal address, determine whether the current time is within a valid time of the unlocking key.
在本可选的实施方式中,拜访者终端的开锁密钥还包括有效时间,即拜访者终端的开锁密钥只是临时有效,如果不是在有效时间内,则不允许开锁,可选的,可以通过获取开锁系统的系统时间来得到当前时间,开锁系统的系统时间只允许管理员身份的终端进行修改,例如,用户家里面的保姆只被允许在每天早上8:00~9:00开锁进行房间,则8:00~9:00则为开锁密钥的有效时间。In this optional implementation manner, the unlocking key of the visitor terminal further includes an effective time, that is, the unlocking key of the visitor terminal is only temporarily valid, and if it is not within the valid time, the unlocking is not allowed, and optionally, By obtaining the system time of the unlocking system to obtain the current time, the system time of the unlocking system can only be modified by the terminal of the administrator identity. For example, the babysitter in the user's home is only allowed to unlock the room every morning from 8:00 to 9:00. , 8:00 ~ 9:00 is the effective time to unlock the key.
S22,在当前时间位于开锁密钥的有效时间内时,判断开锁验证信息中预设的开锁密钥是否包括鉴权信息中的开锁密钥;S22: When the current time is within the valid time of the unlocking key, determine whether the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information;
在当前时间再开锁密钥的有效时间内时,还需进一步判断开锁密钥是否正确,即判断开锁验证信息中预设的开锁密钥是否包括终端携带的开锁密钥。When the current time re-locks the valid time of the key, it is further determined whether the unlocking key is correct, that is, whether the unlocking key preset in the unlocking verification information includes the unlocking key carried by the terminal.
S23,在开锁验证信息中预设的开锁密钥包括鉴权信息中的开锁密钥时,确定出鉴权信息有效。S23. When the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, determining that the authentication information is valid.
通过设置管理员和拜访者两种不同的场景,通过区分不同场景下的安全级别和开锁操作的差异化设置,即保证的管理员开锁的便利性,也实现了管理员在远端通过数据网临时设置拜访者的开锁权限,而不需要管理员亲自开锁。By setting the administrator and the visitor in different scenarios, by distinguishing the security level in different scenarios and the differentiated setting of the unlocking operation, that is, the convenience of the administrator to unlock the lock, the administrator can also pass the data network at the remote end. Temporarily set the visitor's unlock permission without requiring the administrator to unlock the lock.
在根据本实施例的可选实施方式中,在打开门锁之前,方法还包括:In an optional implementation of the present embodiment, before the door lock is opened, the method further includes:
S31,按照预设周期采集距离检测信号,其中,距离检测信号用于指示门锁的预定距离内是否存在物体;S31. Collect a distance detection signal according to a preset period, where the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock;
可选的,还可以通过距离传感器,红外传感器采集门锁周边的环境,监控门锁外的情况,在门锁的预定距离内,即传感器的可感应范围内存在物理时,就可以感应到门锁周边的情况,起到监控防盗的作用。可选的,在门锁打开之后,可能有人进出,可以暂停采集距离检测信号。Optionally, the distance sensor and the infrared sensor can collect the environment around the door lock to monitor the situation outside the door lock. When the door lock is within a predetermined distance, that is, when the sensor can sense the physical range, the door can be sensed. The situation around the lock plays a role in monitoring theft. Optionally, after the door lock is opened, a person may enter or exit, and the distance detection signal may be suspended.
S32,在指示存在物体的距离检测信号的持续时间达到预设阈值之后,向门锁的管理设备发送通知消息。S32. After the duration of the distance detection signal indicating the presence of the object reaches a preset threshold, send a notification message to the management device of the door lock.
在本实施例中,还可以在持续检测到距离检测信号或者红外检测信号后,如1min,向门 锁的管理设备发送通知消息,预设阈值可以根据开锁需要的时间来确定,如正常开锁需要30S,则可以设置预设阈值为1min,当用户1min之内还没有开锁时,则可能是陌生人,此时可以向门锁的管理设备发送通知消息,该管理设备可以是具有管理员身份的终端,也可以小区物业电话或者公安局电话,同时,还可以开启视频和语音功能,管理员可以通过终端与陌生人进行通信,如果是客人,则可以选择授权拜访者身份的权限,如果是小偷,则可以选择及时报警并取证小偷意图入室偷窃的视频。In this embodiment, after continuously detecting the distance detection signal or the infrared detection signal, such as 1 min, the gate is The management device of the lock sends a notification message, and the preset threshold may be determined according to the time required for unlocking. For example, if the normal unlocking requires 30S, the preset threshold may be set to 1 min. When the user has not unlocked within 1 min, the stranger may be a stranger. At this time, the notification message can be sent to the management device of the door lock. The management device can be a terminal with an administrator identity, or a cell property phone or a public security bureau phone. At the same time, the video and voice functions can be enabled, and the administrator can pass the The terminal communicates with a stranger. If it is a guest, it can choose the authority to authorize the visitor. If it is a thief, it can choose to promptly report the police and collect the video of the thief's intention to steal.
根据本实施例的可选实施方式,当拜访者没有手机,或者有人想要盗窃时,当有人距离门一定距离,一定时间后,门上安装的红外距离传感器将会采集到信号,并通知门锁控制系统的控制器,当控制器收到红外距离传感器传来的信号后,打开摄像头,并向服务平台发送消息,服务平台按照配置的手机号码,通过通信模块向用户手机发送消息,当用户收到消息后,知道有人来访,将登录APP,然后与控制平台进行通信,控制平台将视频数据发送给手机APP,这样手机端可以视频,并可以与门外的人进行对话,以确定是否安全,当确定安全后,就可以发送开门命令和密钥,远程控制门锁的开启,这样就能非常方便来访人员进门、方便老人和儿童进门,当发生盗窃时,可以很好的保护用户的财产安全。According to an optional implementation manner of this embodiment, when the visitor does not have a mobile phone, or someone wants to steal, when a certain person is at a certain distance from the door, after a certain time, the infrared distance sensor installed on the door will collect a signal and notify the door. The controller of the lock control system, when the controller receives the signal from the infrared distance sensor, turns on the camera, and sends a message to the service platform, and the service platform sends a message to the user's mobile phone through the communication module according to the configured mobile phone number, when the user After receiving the message, knowing that someone is visiting, will log in to the APP, and then communicate with the control platform, and the control platform will send the video data to the mobile phone APP, so that the mobile terminal can video and can talk with the person outside the door to determine whether it is safe. When the security is determined, the door opening command and key can be sent to remotely control the opening of the door lock, which makes it very convenient for the visiting person to enter the door, convenient for the elderly and children to enter the door, and when the theft occurs, the user's property can be well protected. Safety.
在根据本实施例的可选实施方式中,终端发送开锁请求消息中携带的鉴权信息可以但不限于为:终端地址、开锁密钥、开锁密钥的有效时间。In an optional implementation manner of the present embodiment, the authentication information carried in the terminal sending the unlock request message may be, but is not limited to, a terminal address, an unlocking key, and an effective time of the unlocking key.
在根据本实施例的可选实施方式中,在接收终端通过指定应用程序发送的开锁请求消息之前,方法还包括:In an optional implementation manner of this embodiment, before the receiving terminal sends the unlock request message by using the specified application, the method further includes:
S41,接收预定的开锁验证信息;S41. Receive predetermined unlocking verification information.
S42,存储接收到的开锁验证信息。S42. Store the received unlock verification information.
在本实施例中,用于验证开锁的开锁验证信息可以通过管理员身份的终端进行设置,包括终端地址、开锁密钥、开锁密钥的有效时间,终端地址又包括长期有效地址和临时有效地址,携带临时有效地址的终端的开锁密钥还包括开锁密钥的有效时间,在设置完成开锁验证信息之后,可以将其保存在本地的存储器中。In this embodiment, the unlocking verification information used for verifying the unlocking may be set by the terminal of the administrator identity, including the terminal address, the unlocking key, and the effective time of the unlocking key, and the terminal address includes the long-term effective address and the temporary effective address. The unlocking key of the terminal carrying the temporary effective address further includes the effective time of the unlocking key, and after setting the unlocking verification information, it can be saved in the local memory.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, The optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods of various embodiments of the present invention.
在本实施例中还提供了一种门锁的控制装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。 In the embodiment, a control device for the door lock is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again. As used below, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
图2是根据本发明实施例的门锁的控制装置的结构框图,如图2所示,该装置可以设置在开锁系统中,和门锁连接,该装置包括:连接模块20、第一接收模块22、判断模块24、开锁模块26,其中,2 is a structural block diagram of a control device for a door lock according to an embodiment of the present invention. As shown in FIG. 2, the device may be disposed in an unlocking system and connected to a door lock. The device includes: a connection module 20, and a first receiving module. 22. The determining module 24 and the unlocking module 26, wherein
连接模块20,设置为接收终端发送的请求无线局域网连接的请求信息,并根据请求信息与终端进行连接;The connection module 20 is configured to receive request information for requesting a wireless local area network connection sent by the terminal, and connect with the terminal according to the request information;
可选的,无线局域网可以但不限于为WIFI网络、蓝牙网络、近磁场NFC通信网络等,在本实施例中,以WIFI网络进行举例说明,终端可以但不限于为智能手机,平板电脑,手提电脑等,在本实施例中,以智能手机进行举例说明,当常用的终端在靠近门锁附近时,通过无线局域网与开锁系统连接,而在陌生的终端靠近门锁时,由于不能通过无线局域网与开锁系统连接,也就不会触发后续的操作,以屏蔽陌生终端,既减少了开锁系统的连接鉴权操作,还保证了开锁系统的安全性。Optionally, the WLAN can be, but is not limited to, a WIFI network, a Bluetooth network, a near-field NFC communication network, and the like. In this embodiment, the WIFI network is used as an example, and the terminal can be, but is not limited to, a smart phone, a tablet, and a mobile phone. In this embodiment, a smart phone is used as an example. When a commonly used terminal is near the door lock, it is connected to the unlocking system through the wireless local area network, and when the strange terminal is close to the door lock, it cannot pass the wireless local area network. When connected with the unlocking system, it will not trigger subsequent operations to shield the strange terminal, which not only reduces the connection authentication operation of the unlocking system, but also ensures the security of the unlocking system.
第一接收模块22,设置为接收终端发送的用于请求开锁的鉴权信息;The first receiving module 22 is configured to receive, by the terminal, authentication information for requesting unlocking;
可选的,终端上还可以安装指定的应用程序,通过应用程序直接与开锁系统连接,如开锁APP,应用程序内保存了终端用于开锁的鉴权信息,当用户打开应用程序时,可以直接出发开锁请求信息,并携带用于开锁的鉴权信息,这样只需要打开指定的应用程序就能实现开锁的操作,也可以通过应用程序发送开锁的请求消息,并携带用于开锁的鉴权信息。Optionally, the specified application can be installed on the terminal, and the application is directly connected to the unlocking system, such as the unlocking APP, and the application saves the authentication information used by the terminal for unlocking, and when the user opens the application, the direct Departing the unlock request information and carrying the authentication information for unlocking, so that only the specified application can be opened to unlock the operation, and the unlocking request message can be sent through the application, and the authentication information for unlocking is carried. .
判断模块24,设置为根据预设的开锁验证信息判断鉴权信息是否有效;The determining module 24 is configured to determine whether the authentication information is valid according to the preset unlocking verification information;
在本实施例中,开锁系统内预设了开锁验证信息,设置为对开锁请求消息携带的鉴权信息进行鉴权和匹配,确认终端发送的是否为正确的“钥匙”。In this embodiment, the unlocking verification information is preset in the unlocking system, and is set to authenticate and match the authentication information carried in the unlocking request message, and confirm whether the terminal sends the correct “key”.
开锁模块26,设置为在鉴权信息有效时,打开门锁。The unlocking module 26 is arranged to open the door lock when the authentication information is valid.
在鉴权信息有效时,即终端发送的是鉴权信息是正确的“钥匙”时,则控制门锁的机械装置或者电子装置,打开门锁,可选的,在在鉴权信息无效时,即终端发送的是鉴权信息不是正确的“钥匙”时,不打开门锁,还可以通过发送告警信息。When the authentication information is valid, that is, when the terminal sends the authentication information as the correct "key", the mechanical device or the electronic device that controls the door lock opens the door lock. Optionally, when the authentication information is invalid, That is, when the terminal sends that the authentication information is not the correct "key", the door lock is not opened, and the alarm information can also be sent.
图3是根据本发明实施例的门锁的控制装置的可选结构框图一,如图3所示,该装置除包括图2所示的所有模块外,判断模块24还包括:第一判断单元30,设置为判断预定开锁验证信息中的预设开锁密钥是否包括鉴权信息中的开锁密钥;第一确定单元32,与第一判断单元30耦合连接,设置为在开锁验证信息中预设的开锁密钥包括鉴权信息中的开锁密钥时,确定出鉴权信息有效。3 is a block diagram of an optional structure of a control device for a door lock according to an embodiment of the present invention. As shown in FIG. 3, the device further includes: a first determining unit, in addition to all the modules shown in FIG. 30. Set to determine whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information. The first determining unit 32 is coupled to the first determining unit 30 and configured to pre-define in the unlocking verification information. When the unlocking key is set to include the unlocking key in the authentication information, it is determined that the authentication information is valid.
根据预设的开锁验证信息判断鉴权信息是否有效的具体过程包括两种不同的开锁场景,管理员场景和拜访者场景,可以通过识别终端的地址来确定当前所处的场景的类型。图4是根据本发明实施例的门锁的控制装置的可选结构框图二,如图4所示,用于在管理员场景下,该装置除包括图3所示的所有模块外,判断模块24还包括:第二判断单元40、第二确定单元42,其中, The specific process of determining whether the authentication information is valid according to the preset unlocking verification information includes two different unlocking scenarios, an administrator scenario and a visitor scenario, and the type of the current scene can be determined by identifying the address of the terminal. 4 is a block diagram 2 of an optional structure of a control device for a door lock according to an embodiment of the present invention. As shown in FIG. 4, in an administrator scenario, the device includes a module other than the module shown in FIG. 24 further includes: a second determining unit 40, a second determining unit 42, wherein
第二判断单元40,设置为在判断预定开锁验证信息中的预设开锁密钥是否包括鉴权信息中的开锁密钥之前,判断开锁验证信息中包括的长期有效地址是否包括鉴权信息中的终端地址;The second determining unit 40 is configured to determine whether the long-term effective address included in the unlocking verification information includes the authentication information before determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information. Terminal address
第二确定单元42,设置为在长期有效地址包括终端地址时,确定判断开锁验证信息中的预设开锁密钥是否包括鉴权信息中的开锁密钥;The second determining unit 42 is configured to determine, when the long-term effective address includes the terminal address, whether the preset unlocking key in the unlocking verification information includes the unlocking key in the authentication information;
在长期有效地址不包括终端地址时,而终端地址为临时有效地址时,终端用户的身份为拜访者时,图5是根据本发明实施例的门锁的控制装置的可选结构框图三,如图5所示,用于在拜访者场景下,该装置除包括图3所示的所有模块外,判断模块24还包括:第三判断单元50、第四判断单元52、第三确定单元54,其中,When the long-term effective address does not include the terminal address, and the terminal address is the temporary effective address, when the identity of the terminal user is the visitor, FIG. 5 is an optional structural block diagram of the control device for the door lock according to the embodiment of the present invention, such as As shown in FIG. 5, in the visitor scenario, the determining module 24 further includes: a third determining unit 50, a fourth determining unit 52, and a third determining unit 54, in addition to all the modules shown in FIG. among them,
第三判断单元50,设置为在判断预定开锁验证信息中的预设开锁密钥是否包括鉴权信息中的开锁密钥之前,判断开锁验证信息中包括的临时有效地址是否包括鉴权信息中的终端地址;The third determining unit 50 is configured to determine whether the temporary effective address included in the unlocking verification information includes the authentication information before determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information. Terminal address
第四判断单元52,设置为在临时有效地址包括终端地址时,判断当前时间是否位于开锁密钥的有效时间内;The fourth determining unit 52 is configured to determine, when the temporary effective address includes the terminal address, whether the current time is within the valid time of the unlocking key;
第三确定单元54,设置为在当前时间位于开锁密钥的有效时间内时,确定判断开锁验证信息中预设的开锁密钥是否包括鉴权信息中的开锁密钥;The third determining unit 54 is configured to determine, when the current time is within the valid time of the unlocking key, whether the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information;
图6是根据本发明实施例的门锁的控制装置的可选结构框图四,如图6所示,该装置除包括图2所示的所有模块外,装置还包括:采集模块60、通知模块62,其中,FIG. 6 is a block diagram showing an optional structure of a control device for a door lock according to an embodiment of the present invention. As shown in FIG. 6 , the device includes: an acquisition module 60 and a notification module, in addition to all the modules shown in FIG. 2 . 62, of which
采集模块60,设置为在开锁模块打开门锁之前,按照预设周期采集距离检测信号,其中,距离检测信号用于指示门锁的预定距离内是否存在物体;The acquiring module 60 is configured to collect a distance detecting signal according to a preset period before the unlocking module opens the door lock, wherein the distance detecting signal is used to indicate whether an object exists within a predetermined distance of the door lock;
可选的,还可以通过距离传感器,红外传感器采集门锁周边的环境,监控门锁外的情况,在门锁的预定距离内,即传感器的可感应范围内存在物理时,就可以感应到门锁周边的情况,起到监控防盗的作用。可选的,在门锁打开之后,可能有人进出,可以暂停采集距离检测信号。Optionally, the distance sensor and the infrared sensor can collect the environment around the door lock to monitor the situation outside the door lock. When the door lock is within a predetermined distance, that is, when the sensor can sense the physical range, the door can be sensed. The situation around the lock plays a role in monitoring theft. Optionally, after the door lock is opened, a person may enter or exit, and the distance detection signal may be suspended.
通知模块62,设置为在指示存在物体的距离检测信号的持续时间达到预设阈值之后,向门锁的管理设备发送通知消息。The notification module 62 is configured to send a notification message to the management device of the door lock after the duration of the distance detection signal indicating the presence of the object reaches a preset threshold.
在本实施例中,还可以在持续检测到距离检测信号或者红外检测信号后,如1min,向门锁的管理设备发送通知消息,预设阈值可以根据开锁需要的时间来确定,如正常开锁需要30S,则可以设置预设阈值为1min,当用户1min之内还没有开锁时,则可能是陌生人,此时可以向门锁的管理设备发送通知消息,该管理设备可以是具有管理员身份的终端,也可以小区物业电话或者公安局电话,同时,还可以开启视频和语音功能,管理员可以通过终端与陌生人进行通信,如果是客人,则可以选择授权拜访者身份的权限,如果是小偷,则可以选择及时报警并取证小偷意图入室偷窃的视频。 In this embodiment, after the distance detection signal or the infrared detection signal is continuously detected, for example, 1 minute, the notification message is sent to the management device of the door lock, and the preset threshold may be determined according to the time required for unlocking, such as a normal unlocking requirement. 30S, you can set the preset threshold to 1min. When the user has not unlocked within 1min, it may be a stranger. At this time, you can send a notification message to the management device of the door lock. The management device can be an administrator. Terminal, you can also call the community property phone or the public security bureau. At the same time, you can also enable video and voice functions. The administrator can communicate with strangers through the terminal. If it is a guest, you can choose the authority to authorize the visitor. If it is a thief. You can choose to promptly report the police and collect evidence of the thief’s intention to steal.
根据本实施例的可选实施方式,当拜访者没有手机,或者有人想要盗窃时,当有人距离门一定距离,一定时间后,门上安装的红外距离传感器将会采集到信号,并通知门锁控制系统的控制器,当控制器收到红外距离传感器传来的信号后,打开摄像头,并向服务平台发送消息,服务平台按照配置的手机号码,通过通信模块向用户手机发送消息,当用户收到消息后,知道有人来访,将登录APP,然后与控制平台进行通信,控制平台将视频数据发送给手机APP,这样手机端可以视频,并可以与门外的人进行对话,以确定是否安全,当确定安全后,就可以发送开门命令和密钥,远程控制门锁的开启,这样就能非常方便来访人员进门、方便老人和儿童进门,当发生盗窃时,可以很好的保护用户的财产安全。According to an optional implementation manner of this embodiment, when the visitor does not have a mobile phone, or someone wants to steal, when a certain person is at a certain distance from the door, after a certain time, the infrared distance sensor installed on the door will collect a signal and notify the door. The controller of the lock control system, when the controller receives the signal from the infrared distance sensor, turns on the camera, and sends a message to the service platform, and the service platform sends a message to the user's mobile phone through the communication module according to the configured mobile phone number, when the user After receiving the message, knowing that someone is visiting, will log in to the APP, and then communicate with the control platform, and the control platform will send the video data to the mobile phone APP, so that the mobile terminal can video and can talk with the person outside the door to determine whether it is safe. When the security is determined, the door opening command and key can be sent to remotely control the opening of the door lock, which makes it very convenient for the visiting person to enter the door, convenient for the elderly and children to enter the door, and when the theft occurs, the user's property can be well protected. Safety.
在根据本实施例的可选实施方式中,终端发送开锁请求消息中携带的鉴权信息可以但不限于为:终端地址、开锁密钥、开锁密钥的有效时间。In an optional implementation manner of the present embodiment, the authentication information carried in the terminal sending the unlock request message may be, but is not limited to, a terminal address, an unlocking key, and an effective time of the unlocking key.
图7是根据本发明实施例的门锁的控制装置的可选结构框图五,如图7所示,该装置除包括图2所示的所有模块外,装置还包括:第二接收模块70、存储模块72,其中,7 is a block diagram of an optional structure of a control device for a door lock according to an embodiment of the present invention. As shown in FIG. 7, the device includes: a second receiving module 70, in addition to all the modules shown in FIG. a storage module 72, wherein
第二接收模块70,设置为在第一接收模块接收终端通过指定应用程序发送的开锁请求消息之前,接收预定的开锁验证信息;The second receiving module 70 is configured to receive the predetermined unlocking verification information before the first receiving module receives the unlocking request message sent by the terminal by using the specified application;
存储模块72,设置为存储接收到的开锁验证信息。The storage module 72 is configured to store the received unlock verification information.
在本实施例中,用于验证开锁的开锁验证信息可以通过管理员身份的终端进行设置,包括终端地址、开锁密钥、开锁密钥的有效时间,终端地址又包括长期有效地址和临时有效地址,携带临时有效地址的终端的开锁密钥还包括开锁密钥的有效时间,在设置完成开锁验证信息之后,可以将其保存在本地的存储器中。In this embodiment, the unlocking verification information used for verifying the unlocking may be set by the terminal of the administrator identity, including the terminal address, the unlocking key, and the effective time of the unlocking key, and the terminal address includes the long-term effective address and the temporary effective address. The unlocking key of the terminal carrying the temporary effective address further includes the effective time of the unlocking key, and after setting the unlocking verification information, it can be saved in the local memory.
在本实施例中提供了另一种门锁的控制方法,可以应用在终端侧,图8是根据本发明实施例的另一种门锁的控制方法的流程图,如图8所示,该流程包括如下步骤:Another control method of the door lock is provided in the embodiment, which can be applied to the terminal side. FIG. 8 is a flowchart of another method for controlling the door lock according to the embodiment of the present invention. As shown in FIG. The process includes the following steps:
S802,发送请求无线局域网连接的请求信息,并与门锁控制装置进行连接;S802: Send request information requesting a wireless local area network connection, and connect with the door lock control device;
S804,向门锁控制装置发送用于请求开锁的鉴权信息。S804. Send authentication information for requesting unlocking to the door lock control device.
可选的,在向门锁控制装置发送用于请求开锁的鉴权信息之前,还包括:Optionally, before sending the authentication information for requesting the unlocking to the door lock control device, the method further includes:
S51,将终端的终端地址发送给门锁控制装置,其中,终端地址用于生成开锁验证信息。S51. Send the terminal address of the terminal to the door lock control device, where the terminal address is used to generate the unlock verification information.
S52,接收门锁控制装置发送的校验信息,并通过预设算法依据校验信息生成用于开锁的鉴权信息,其中,校验信息与开锁验证信息相关;S52: Receive verification information sent by the door lock control device, and generate authentication information for unlocking according to the verification information by using a preset algorithm, where the verification information is related to the unlock verification information;
S53,保存鉴权信息。S53, saving the authentication information.
在本实施例中还提供了一种门锁的控制终端,该终端用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。In the embodiment, a control terminal for a door lock is provided, and the terminal is used to implement the foregoing embodiments and preferred embodiments, and details are not described herein.
图9是根据本发明实施例的门锁的控制终端的结构框图,如图9所示,包括:第一发送模块90、第二发送模块92,其中, FIG. 9 is a structural block diagram of a control terminal of a door lock according to an embodiment of the present invention. As shown in FIG. 9, the method includes: a first sending module 90 and a second sending module 92, where
第一发送模块90,设置为发送请求无线局域网连接的请求信息,并与门锁控制装置进行连接;The first sending module 90 is configured to send request information requesting a wireless local area network connection, and is connected to the door lock control device;
第二发送模块92,设置为向门锁控制装置发送用于请求开锁的鉴权信息。The second sending module 92 is configured to send the authentication information for requesting unlocking to the door lock control device.
图10是根据本发明实施例的门锁的控制终端的可选结构框图一,如图10所示,该装置除包括图9所示的所有模块外,终端还包括:第三发送模块102、处理模块104、存储模块106,其中,10 is a block diagram of an optional structure of a control terminal of a door lock according to an embodiment of the present invention. As shown in FIG. 10, the device further includes: a third sending module 102, in addition to all the modules shown in FIG. a processing module 104, a storage module 106, wherein
第三发送模块102,设置为在向门锁控制装置发送用于请求开锁的鉴权信息之前,将终端的终端地址发送给门锁控制装置,其中,终端地址用于生成开锁验证信息;The third sending module 102 is configured to send the terminal address of the terminal to the door lock control device before sending the authentication information for requesting the unlocking to the door lock control device, where the terminal address is used to generate the unlocking verification information;
处理模块104,设置为接收门锁控制装置发送的校验信息,并通过预设算法依据校验信息生成用于开锁的鉴权信息,其中,校验信息与开锁验证信息相关;The processing module 104 is configured to receive the verification information sent by the door lock control device, and generate the authentication information for unlocking according to the verification information by using a preset algorithm, where the verification information is related to the unlocking verification information;
存储模块106,设置为保存鉴权信息。The storage module 106 is configured to save the authentication information.
根据所述实施例中记载的门锁控制装置和门锁控制终端,本发明还提供一种门锁控制的系统,包括:图2-图7中任一所述的门锁的控制装置、图9-图10任一所述的门锁的控制终端。According to the door lock control device and the door lock control terminal described in the embodiment, the present invention further provides a system for controlling the door lock, comprising: the control device and the figure of the door lock according to any one of FIG. 2 to FIG. 9- The control terminal of the door lock of any of FIG.
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述模块分别位于多个处理器中。It should be noted that each of the above modules may be implemented by software or hardware. For the latter, the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
下面通过根据本发明的可选实施例对本发明进行详细说明:The invention is described in detail below by means of an alternative embodiment according to the invention:
本可选实施例的方案包括带有指纹识别功能,或声纹识别功能的智能手机,智能手机上有用于开锁的App系统,还有用于进门的拜访者手机,拜访者手机可以不具备指纹识别功能,只需为普通智能手机即可,还有用于控制门开关的控制系统,此控制系统具有摄像装置、麦克风以及红外距离传感器。还有用于设置门锁开启方案,保存用户设定数据,处理开门请求的一个控制平台。The solution of the optional embodiment includes a smart phone with a fingerprint recognition function or a voiceprint recognition function, an app system for unlocking on the smart phone, and a visitor mobile phone for entering the door, and the visitor mobile phone may not have fingerprint recognition. The function is just a normal smartphone, and there is a control system for controlling the door switch. The control system has a camera, a microphone and an infrared distance sensor. There is also a control platform for setting the door lock opening scheme, saving the user setting data, and processing the door opening request.
将智能手机运用于门锁的开启,可以极大的提高我们生活的便利性。图11是根据本发明可选实施例的开锁系统结构图,如图11所示,包括:多部手机100,其中管理员手机可以带有指纹识别装置,而其他手机则可以为普通的智能手机;控制平台200;门锁控制系统300;门锁400;摄像头500;麦克风600;红外距离传感器700;备用电源800。Applying a smartphone to the opening of a door lock can greatly enhance the convenience of our lives. 11 is a structural diagram of an unlocking system according to an alternative embodiment of the present invention. As shown in FIG. 11, the method includes: a plurality of mobile phones 100, wherein the administrator mobile phone can be provided with a fingerprint identification device, and other mobile phones can be ordinary smart phones. Control platform 200; door lock control system 300; door lock 400; camera 500; microphone 600; infrared distance sensor 700;
在本可选的实施例中,智能手机上安装一款用于开锁的APP,这样,智能手机就可以与控制平台进行通信。控制平台是整个装置的控制中心包括交互界面模块201、数据库202、通信模块(一)203、处理器204、Wifi发射模块205、通信模块(二)206,控制平台位于家中,可以通过认证过的计算机或者管理员手机登录控制平台的交互界面,对控制中心进行设置,普通手机无法登陆到控制平台。门锁控制系统放置在门中,包括通信模块301设置为与控制平台通信模块(一)203进行通信;处理器302连接有摄像头500、麦克风600、红外距离传感器700;门锁控制模块303与门锁机构相连,设置为控制门锁的打开动作。另外,门锁控制 系统在满足一定条件的时候(红外距离传感器检测到门外一定距离内有人停留了一定时间后),将打开摄像头和麦克风,并将数据上传到控制平台。备用电源用于在停电的时候,临时对整个系统进行供电。In this alternative embodiment, an APP for unlocking is installed on the smartphone so that the smartphone can communicate with the control platform. The control platform is the control center of the entire device, including the interactive interface module 201, the database 202, the communication module (1) 203, the processor 204, the Wifi transmitting module 205, and the communication module (2) 206. The control platform is located at home and can be authenticated. The interactive interface of the computer or the administrator's mobile phone login control platform is set to the control center, and the ordinary mobile phone cannot log in to the control platform. The door lock control system is placed in the door, and the communication module 301 is arranged to communicate with the control platform communication module (1) 203; the processor 302 is connected with the camera 500, the microphone 600, the infrared distance sensor 700; the door lock control module 303 and the door The lock mechanism is connected and is arranged to control the opening action of the door lock. In addition, the door lock control When the system meets certain conditions (the infrared distance sensor detects that someone has stayed within a certain distance outside the door for a certain period of time), the camera and microphone will be turned on and the data will be uploaded to the control platform. The backup power supply is used to temporarily power the entire system during a power outage.
图12是根据本发明可选实施例的设置开锁密钥的方法流程图,如图12所示,该方法的步骤包括:FIG. 12 is a flowchart of a method for setting an unlocking key according to an optional embodiment of the present invention. As shown in FIG. 12, the steps of the method include:
S1201,登陆控制平台交互界面;S1201, landing control platform interaction interface;
S1202,设置交互界面登录密码;S1202, setting an interaction interface login password;
S1203,设置一部或几部管理员手机号码;S1203, setting one or several administrator mobile phone numbers;
S1204,控制平台生成秘钥,将秘钥保存在数据库,并将验证码发送给管理员手机;S1204: The control platform generates a secret key, saves the secret key in a database, and sends the verification code to the administrator mobile phone;
S1205,管理员手机登陆开锁APP,输入验证码,得到与控制平台相同的秘钥并存储。In S1205, the administrator mobile phone logs in the unlocking APP, enters the verification code, and obtains the same key as the control platform and stores it.
在装置运行的最初,登录控制平台交互界面进行必要的设置,为保证整个系统安全性,要设置登录密码,其他的设备无法登录控制中心。然后设置可以与控制中心进行远程连接的一部或几部手机号码,这些手机用户即为管理员。管理员手机要安装APP。这个APP用于开锁,远程登陆控制中心交互界面,进行相关设置。当管理员手机号码设置成功后,控制平台将生成一个秘钥,并将秘钥和对应的手机号码存储在数据库中,并发送给管理员手机一个验证码。管理员手机收到控制中心发来的验证码后,输入到APP中,APP将按照与控制中心相同的计算方式,根据输入的验证码产生密钥,这个密钥与存储在控制中心数据库中的密钥是相同的或者匹配的,这个密钥将在管理员进行开门请求、登陆交互界面进行相关设置的时候,发送给控制中心,当与控制中心密钥匹配后,允许进行相关的操作。At the beginning of the device operation, the login control platform interactive interface performs the necessary settings. To ensure the security of the entire system, the login password must be set, and other devices cannot log in to the control center. Then set up one or several mobile numbers that can be remotely connected to the Control Center. These mobile users are administrators. The administrator phone should install the app. This app is used to unlock, remotely log in to the control center interactive interface, and make related settings. After the administrator's mobile phone number is set successfully, the control platform will generate a secret key, store the secret key and the corresponding mobile phone number in the database, and send the verification code to the administrator mobile phone. After receiving the verification code sent by the control center, the administrator's mobile phone enters into the APP, and the APP will generate a key according to the input verification code according to the same calculation method as the control center. This key is stored in the control center database. The keys are the same or match. This key will be sent to the control center when the administrator makes the opening request and login interface to set the relevant settings. When the key is matched with the control center key, the related operations are allowed.
图13是根据本发明可选实施例的管理员用户开锁的方法流程图,如图13所示,该方法的步骤包括:FIG. 13 is a flowchart of a method for an administrator user to unlock according to an alternative embodiment of the present invention. As shown in FIG. 13, the steps of the method include:
S1301,长按指纹采集器一段时间;S1301, long press the fingerprint collector for a period of time;
S1302,手机启动开门锁APP;S1302, the mobile phone starts to open the door lock APP;
S1303,搜索周围无线保真Wifi并进行判断是否有家中Wifi;S1303, search for the surrounding wireless fidelity Wifi and determine whether there is a home Wifi;
S1304,与Wifi建立链接,并将开门请求以及手机身份验证信息和秘钥通过Wifi发送给控制平台;S1304, establishing a link with the Wifi, and sending the door opening request and the mobile phone authentication information and the secret key to the control platform through the Wifi;
S1305,控制平台将手机身份验证信息和秘钥与数据库中存储信息进行对比,看数据库中是否存在;否则执行S1306。S1305: The control platform compares the mobile phone authentication information and the secret key with the stored information in the database to see if the database exists; otherwise, S1306 is executed.
S1306,拒绝开门;S1306, refused to open the door;
S1307,控制平台向门锁控制系统发送开门命令;S1307: The control platform sends a door opening command to the door lock control system;
S1308,门打开。 S1308, the door opens.
当管理员用户想要进门时,只要长按手机指纹传感器一段时间,手机将打开开锁APP,然后搜索周围Wifi,如果搜索到家中Wifi,则进行连接,连接成功后,将开门请求以及密钥发送给控制平台,控制平台将手机发送来的密钥与数据库中保存的密钥进行对比,如果数据库中包含此密钥,控制平台将向门锁控制系统发送开门命令,门将打开。在整个过程中,不需要操作者进行其他输入操作,因此非常方便。When the administrator user wants to enter the door, as long as the phone fingerprint sensor is pressed for a while, the phone will open the unlocking app and then search for the surrounding Wifi. If the home Wifi is searched, the connection will be made. After the connection is successful, the door opening request and key transmission will be sent. To the control platform, the control platform compares the key sent by the mobile phone with the key stored in the database. If the key is included in the database, the control platform will send a door open command to the door lock control system, and the door will open. It is very convenient to not require the operator to perform other input operations throughout the process.
图14是根据本发明可选实施例的拜访者用户开锁的方法流程图,如图14所示,该方法的步骤包括:FIG. 14 is a flowchart of a method for unlocking a visitor user according to an alternative embodiment of the present invention. As shown in FIG. 14, the steps of the method include:
S1401,来访者请求开门权限;S1401, the visitor requests permission to open the door;
S1402,管理员手机登陆APP,设置可以开锁的手机,以及可以开锁的时长T;S1402, the administrator mobile phone login APP, set the mobile phone that can be unlocked, and the length of time T can be unlocked;
S1403,来访者手机安装开锁APP;S1403, the visitor mobile phone installs an unlocking APP;
S1404,来访者靠近门,检测家中Wifi;S1404, the visitor is close to the door and detects the Wifi in the home;
S1405,与控制平台通信,控制平台验证手机号码以及是否超过时长T;S1405, communicating with the control platform, the control platform verifies the mobile phone number and whether the time length T is exceeded;
S1406,拒绝开门;S1406, refused to open the door;
S1407,门打开。S1407, the door opens.
当有拜访者请求管理员开放进门权限时,管理员可以登陆APP,APP与控制平台取得联系,然后设置可以进门的手机号码以及这个号码拥有开门权限的时长T,这些信息将存储在控制平台的数据库中。设置成功后,只要拜访者将手机安装上开门APP后,当拜访者靠近门,并检测到家中Wifi后,将通过Wifi与控制平台进行通信,控制平台验证数据库中是否给这款手机开放了开门权限,如果是,门将打开,否则,拒绝开门,整个过程拜访者不需要进行手机操作,只要运行开锁APP即可。When a visitor requests the administrator to open the access permission, the administrator can log in to the APP, and the APP contacts the control platform, and then sets the mobile phone number that can be accessed and the length of time that the number has the permission to open the door. This information will be stored in the control platform. In the database. After the setup is successful, as long as the visitor installs the mobile phone to open the door APP, when the visitor approaches the door and detects the home Wifi, it will communicate with the control platform through the Wifi, and the control platform verifies whether the database is open to the mobile phone. Permissions, if yes, the door will open, otherwise, refuse to open the door, the entire process visitors do not need to operate the phone, just run the unlock APP.
图15是根据本发明可选实施例的开锁系统的防盗的方法流程图,如图15所示,该方法的步骤包括:15 is a flow chart of a method for theft prevention of an unlocking system according to an alternative embodiment of the present invention. As shown in FIG. 15, the steps of the method include:
S1501,有人靠近门一定距离一定时间;S1501, someone is close to the door for a certain distance;
S1502,红外距离传感器向门锁控制系统处理器发送信号;S1502, the infrared distance sensor sends a signal to the door lock control system processor;
S1503,门锁控制系统打开摄像机,向控制平台发送信号;S1503, the door lock control system turns on the camera and sends a signal to the control platform;
S1504,控制平台通过通信模块向指定手机发送消息;S1504. The control platform sends a message to the designated mobile phone through the communication module.
S1505,手机登录开锁APP,与控制平台通信并可通过摄像机和麦克风与门外的人进行通话;S1505, the mobile phone login unlocks the APP, communicates with the control platform, and can talk to the person outside the door through the camera and the microphone;
S1506,确定门外情况后,远程操作开门或报警。S1506, after determining the situation outside the door, remote operation to open the door or alarm.
当拜访者没有手机,或者有人想要盗窃时,当有人距离门一定距离,一定时间后,门上 安装的红外距离传感器将会采集到信号,并通知门锁控制系统的控制器,当控制器收到红外距离传感器传来的信号后,打开摄像头,并向服务平台发送消息,服务平台按照配置的手机号码,通过通信模块向用户手机发送消息,当用户收到消息后,知道有人来访,将登录APP,然后与控制平台进行通信,控制平台将视频数据发送给手机APP,这样手机端可以视频,并可以与门外的人进行对话,以确定是否安全,当确定安全后,就可以发送开门命令和密钥,远程控制门锁的开启,这样就能非常方便来访人员进门、方便老人和儿童进门。当发生盗窃时,这套系统可以很好的保护用户的财产安全。When the visitor does not have a mobile phone, or someone wants to steal, when someone is at a certain distance from the door, after a certain time, on the door The installed infrared distance sensor will collect the signal and notify the controller of the door lock control system. When the controller receives the signal from the infrared distance sensor, the camera is turned on and the message is sent to the service platform. The service platform is configured according to the configuration. The mobile phone number sends a message to the user's mobile phone through the communication module. When the user receives the message, he knows that someone is visiting, will log in to the APP, and then communicate with the control platform, and the control platform sends the video data to the mobile phone APP, so that the mobile terminal can video. And can talk with people outside the door to determine whether it is safe. When it is determined to be safe, you can send the door opening command and key, and remotely control the opening of the door lock, which is very convenient for visitors to enter the door, convenient for the elderly and children to enter the door. . When a theft occurs, the system can protect the security of the user's property.
当管理员手机发生丢失时,为了保证安全,可以通过其他的通过管理员手机远程登录控制中心,暂时关闭丢失手机的管理员权限,来保证安全。When the administrator's mobile phone is lost, in order to ensure security, you can remotely log in to the control center through the administrator's mobile phone to temporarily turn off the administrator rights of the lost mobile phone to ensure security.
本实施例通过带指纹识别功能的管理员手机,对开门进行鉴权管理。管理员手机只需要将手指按压在指纹传感器上一段时间,就可以完成开门的请求操作,管理员手机可以给普通拜访者手机设置时长为T的开门权限,拜访者只需运行开锁APP,不需要对手机进行其他的操作,非常方便。In this embodiment, the administrator manages the mobile phone with the fingerprint recognition function to perform authentication management on the open door. The administrator's mobile phone only needs to press the finger on the fingerprint sensor for a certain period of time, and then the request operation for opening the door can be completed. The administrator mobile phone can set the opening permission of the ordinary visitor mobile phone for the duration of T, and the visitor only needs to run the unlocking APP, and does not need to It is very convenient to carry out other operations on the mobile phone.
本实施例当有没有手机的访客来访时,可以方便的将信息传递到管理员手机上,为访客远程开门,本实施例可以很好的防盗,具有很好的智能性,本实施例在控制平台或APP由验证码进行生成密钥的过程中,有自己独特的算法,因此能够安全的对手机进行身份认证,具有很好的安全性。In this embodiment, when there is a visitor of the mobile phone, the information can be conveniently transmitted to the administrator's mobile phone to open the door for the visitor. This embodiment can be very burglar-proof and has good intelligence. This embodiment controls The platform or the APP generates a key by the verification code, and has its own unique algorithm, so it can securely authenticate the mobile phone and has good security.
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:Embodiments of the present invention also provide a storage medium. Optionally, in the embodiment, the foregoing storage medium may be configured to store program code for performing the following steps:
S1,接收终端发送的通过无线局域网连接的请求信息并与终端进行连接;S1, receiving request information sent by the terminal through the wireless local area network and connecting with the terminal;
S2,接收终端通过指定应用程序发送的开锁请求消息,其中,开锁请求消息包括鉴权信息;S2. The receiving terminal sends an unlock request message by using an application, where the unlock request message includes authentication information.
S3,根据预设的开锁验证信息判断鉴权信息是否有效;S3, determining, according to the preset unlocking verification information, whether the authentication information is valid;
S4,在鉴权信息有效时,打开门锁。S4, when the authentication information is valid, the door lock is opened.
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory. A variety of media that can store program code, such as a disc or a disc.
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。For example, the specific examples in this embodiment may refer to the examples described in the foregoing embodiments and the optional embodiments, and details are not described herein again.
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步 骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。It will be apparent to those skilled in the art that the various modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. Perform the steps shown or described Alternatively, each of them may be fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof may be fabricated into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
工业实用性Industrial applicability
通过本发明实施例,采用接收终端发送的通过无线局域网连接的请求信息并与所述终端进行连接,在采用无线局域网与终端建立通信连接之后,接收所述终端通过指定应用程序发送的开锁请求消息,其中,所述开锁请求消息包括鉴权信息,然后根据预设的开锁验证信息判断所述鉴权信息是否有效,在所述鉴权信息有效时,打开门锁,解决了相关技术在开锁的过程中容易造成个人隐私泄露的问题,同时开锁过程也简单易行,实现了提升用户开锁体验的效果。 According to the embodiment of the present invention, the request information transmitted by the receiving terminal and connected to the terminal is used, and after the communication connection is established with the terminal by using the wireless local area network, the unlocking request message sent by the terminal through the specified application is received. The unlock request message includes the authentication information, and then determines whether the authentication information is valid according to the preset unlocking verification information. When the authentication information is valid, the door lock is opened, and the related technology is unlocked. In the process, it is easy to cause personal privacy leakage, and the unlocking process is also simple and easy, and the effect of improving the user's unlocking experience is achieved.

Claims (16)

  1. 一种门锁的控制方法,包括:A method for controlling a door lock, comprising:
    接收终端发送的请求无线局域网连接的请求信息,并根据所述请求信息与所述终端进行连接;Receiving, by the terminal, request information for requesting a wireless local area network connection, and connecting to the terminal according to the request information;
    接收所述终端发送的用于请求开锁的鉴权信息;Receiving, by the terminal, authentication information for requesting unlocking;
    根据预设的开锁验证信息判断所述鉴权信息是否有效;Determining whether the authentication information is valid according to preset unlocking verification information;
    在所述鉴权信息有效时,打开门锁。When the authentication information is valid, the door lock is opened.
  2. 根据权利要求1所述的方法,其中,所述根据预设的开锁验证信息判断所述鉴权信息是否有效包括:The method according to claim 1, wherein the determining whether the authentication information is valid according to the preset unlocking verification information comprises:
    判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥;Determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information;
    在所述开锁验证信息中预设的开锁密钥包括所述鉴权信息中的所述开锁密钥时,确定出所述鉴权信息有效。And determining, when the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information, that the authentication information is valid.
  3. 根据权利要求2所述的方法,其中,在判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥之前,所述方法还包括:The method according to claim 2, wherein before the determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information, the method further comprises:
    判断所述开锁验证信息中包括的长期有效地址是否包括所述鉴权信息中的终端地址;Determining whether the long-term effective address included in the unlock verification information includes a terminal address in the authentication information;
    在所述长期有效地址包括所述终端地址时,判断所述开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥。When the long-term effective address includes the terminal address, determining whether the preset unlocking key in the unlocking verification information includes an unlocking key in the authentication information.
  4. 根据权利要求2所述的方法,其中,在判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥之前,所述方法还包括:The method according to claim 2, wherein before the determining whether the preset unlocking key in the predetermined unlocking verification information includes the unlocking key in the authentication information, the method further comprises:
    判断所述开锁验证信息中包括的临时有效地址是否包括所述鉴权信息中的终端地址;Determining whether the temporary effective address included in the unlock verification information includes a terminal address in the authentication information;
    在所述临时有效地址包括所述终端地址时,判断当前时间是否位于所述开锁密钥的有效时间内;When the temporary effective address includes the terminal address, determining whether the current time is within the valid time of the unlocking key;
    在所述当前时间位于所述开锁密钥的有效时间内时,判断所述开锁验证信息中预设的开锁密钥是否包括所述鉴权信息中的所述开锁密钥。When the current time is within the valid time of the unlocking key, determining whether the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information.
  5. 根据权利要求1至4中任一项所述的方法,其中,在所述打开门锁之前,所述方法还包括:The method according to any one of claims 1 to 4, wherein before the opening of the door lock, the method further comprises:
    按照预设周期采集距离检测信号,其中,所述距离检测信号用于指示所述门锁的预定距离内是否存在物体;Collecting a distance detection signal according to a preset period, wherein the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock;
    在所述指示存在物体的距离检测信号的持续时间达到预设阈值之后,向所述门锁的 管理设备发送通知消息。After the duration of the distance detection signal indicating the presence of the object reaches a preset threshold, the door lock is The management device sends a notification message.
  6. 根据权利要求1至4其中之一所述的方法,其中,在接收所述终端发送的用于请求开锁的鉴权信息之前,所述方法还包括:The method according to any one of claims 1 to 4, wherein, before receiving the authentication information sent by the terminal for requesting unlocking, the method further comprises:
    接收预定的所述开锁验证信息;Receiving the predetermined unlocking verification information;
    存储接收到的所述开锁验证信息。The received unlock verification information is stored.
  7. 一种门锁的控制装置,包括:A door lock control device includes:
    连接模块,设置为接收终端发送的请求无线局域网连接的请求信息,并根据所述请求信息与所述终端进行连接;a connection module, configured to receive request information for requesting a wireless local area network connection sent by the terminal, and connect to the terminal according to the request information;
    第一接收模块,设置为接收所述终端发送的用于请求开锁的鉴权信息;a first receiving module, configured to receive authentication information sent by the terminal for requesting unlocking;
    判断模块,设置为根据预设的开锁验证信息判断所述鉴权信息是否有效;The determining module is configured to determine, according to the preset unlocking verification information, whether the authentication information is valid;
    开锁模块,设置为在所述鉴权信息有效时,打开门锁。The unlocking module is configured to open the door lock when the authentication information is valid.
  8. 根据权利要求7所述的装置,其中,所述判断模块还包括:The device of claim 7, wherein the determining module further comprises:
    第一判断单元,设置为判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥;The first determining unit is configured to determine whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information;
    第一确定单元,设置为在所述开锁验证信息中预设的开锁密钥包括所述鉴权信息中的所述开锁密钥时,确定出所述鉴权信息有效。The first determining unit is configured to determine that the authentication information is valid when the unlocking key preset in the unlocking verification information includes the unlocking key in the authentication information.
  9. 根据权利要求8所述的装置,其中,所述判断模块还包括:The device of claim 8, wherein the determining module further comprises:
    第二判断单元,设置为在判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥之前,判断所述开锁验证信息中包括的长期有效地址是否包括所述鉴权信息中的终端地址;a second determining unit, configured to determine whether the long-term effective address included in the unlocking verification information includes the foregoing, before determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information The terminal address in the authentication information;
    第二确定单元,设置为在所述长期有效地址包括所述终端地址时,确定判断所述开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥。The second determining unit is configured to determine, when the long-term effective address includes the terminal address, whether the preset unlocking key in the unlocking verification information includes an unlocking key in the authentication information.
  10. 根据权利要求8所述的装置,其中,所述判断模块还包括:The device of claim 8, wherein the determining module further comprises:
    第三判断单元,设置为在判断预定开锁验证信息中的预设开锁密钥是否包括所述鉴权信息中的开锁密钥之前,判断所述开锁验证信息中包括的临时有效地址是否包括所述鉴权信息中的终端地址;a third determining unit, configured to determine, before determining whether the preset unlocking key in the predetermined unlocking verification information includes an unlocking key in the authentication information, whether the temporary effective address included in the unlocking verification information includes the The terminal address in the authentication information;
    第四判断单元,设置为在所述临时有效地址包括所述终端地址时,判断当前时间是否位于所述开锁密钥的有效时间内;a fourth determining unit, configured to determine, when the temporary effective address includes the terminal address, whether the current time is within a valid time of the unlocking key;
    第三确定单元,设置为在所述当前时间位于所述开锁密钥的有效时间内时,确定判断所述开锁验证信息中预设的开锁密钥是否包括所述鉴权信息中的所述开锁密钥。 a third determining unit, configured to determine, when the current time is within the valid time of the unlocking key, determining whether the unlocking key preset in the unlocking verification information includes the unlocking in the authentication information Key.
  11. 根据权利要求7至10其中之一所述的装置,其中,所述装置还包括:The apparatus according to any one of claims 7 to 10, wherein the apparatus further comprises:
    采集模块,设置为在所述开锁模块打开门锁之前,按照预设周期采集距离检测信号,其中,所述距离检测信号用于指示所述门锁的预定距离内是否存在物体;The acquisition module is configured to collect a distance detection signal according to a preset period before the unlocking module opens the door lock, wherein the distance detection signal is used to indicate whether an object exists within a predetermined distance of the door lock;
    通知模块,设置为在所述指示存在物体的距离检测信号的持续时间达到预设阈值之后,向所述门锁的管理设备发送通知消息。The notification module is configured to send a notification message to the management device of the door lock after the duration of the distance detection signal indicating the presence of the object reaches a preset threshold.
  12. 根据权利要求7至10其中之一所述的装置,其中,所述装置还包括:The apparatus according to any one of claims 7 to 10, wherein the apparatus further comprises:
    第二接收模块,设置为在接收所述终端发送的用于请求开锁的鉴权信息之前,接收预定的所述开锁验证信息;The second receiving module is configured to receive the predetermined unlocking verification information before receiving the authentication information sent by the terminal for requesting unlocking;
    存储模块,设置为存储接收到的所述开锁验证信息。And a storage module, configured to store the received unlock verification information.
  13. 一种门锁的控制方法,包括:A method for controlling a door lock, comprising:
    发送请求无线局域网连接的请求信息,并与门锁控制装置进行连接;Sending request information requesting a wireless local area network connection, and connecting with the door lock control device;
    向所述门锁控制装置发送用于请求开锁的鉴权信息,其中,所述鉴权信息与所述门锁控制装置保存的用于验证开锁的开锁验证信息对应。The authentication information for requesting unlocking is transmitted to the door lock control device, wherein the authentication information corresponds to unlocking verification information for verifying unlocking held by the door lock control device.
  14. 根据权利要求13所述的方法,其中,在向所述门锁控制装置发送用于请求开锁的鉴权信息之前,所述方法还包括:The method of claim 13, wherein the method further comprises: before transmitting the authentication information for requesting the unlocking to the door lock control device, the method further comprising:
    将终端的终端地址发送给所述门锁控制装置,其中,所述终端地址用于生成开锁验证信息;Transmitting a terminal address of the terminal to the door lock control device, wherein the terminal address is used to generate unlocking verification information;
    接收所述门锁控制装置发送的校验信息,并通过预设算法依据所述校验信息生成用于开锁的鉴权信息,其中,所述校验信息与所述开锁验证信息相关;Receiving verification information sent by the door lock control device, and generating, by using a preset algorithm, authentication information for unlocking according to the verification information, where the verification information is related to the unlocking verification information;
    保存所述鉴权信息。The authentication information is saved.
  15. 一种门锁的控制终端,包括:A control terminal for a door lock, comprising:
    第一发送模块,设置为发送请求无线局域网连接的请求信息,并与门锁控制装置进行连接;a first sending module, configured to send request information requesting a wireless local area network connection, and connect with the door lock control device;
    第二发送模块,设置为向所述门锁控制装置发送用于请求开锁的鉴权信息,其中,所述鉴权信息与所述门锁控制装置保存的用于验证开锁的开锁验证信息对应。The second sending module is configured to send, to the door lock control device, authentication information for requesting unlocking, wherein the authentication information corresponds to unlocking verification information for verifying unlocking saved by the door lock control device.
  16. 根据权利要求15所述的装置,其中,所述终端还包括:The device of claim 15, wherein the terminal further comprises:
    第三发送模块,设置为在向所述门锁控制装置发送用于请求开锁的鉴权信息之前,将终端的终端地址发送给所述门锁控制装置,其中,所述终端地址用于生成开锁验证信息;a third sending module, configured to send a terminal address of the terminal to the door lock control device before transmitting the authentication information for requesting unlocking to the door lock control device, wherein the terminal address is used to generate an unlock verify message;
    处理模块,设置为接收所述门锁控制装置发送的校验信息,并通过预设算法依据所 述校验信息生成用于开锁的鉴权信息,其中,所述校验信息与所述开锁验证信息相关;a processing module, configured to receive verification information sent by the door lock control device, and according to a preset algorithm The verification information generates authentication information for unlocking, wherein the verification information is related to the unlock verification information;
    存储模块,设置为保存所述鉴权信息。 a storage module configured to save the authentication information.
PCT/CN2016/073959 2015-10-29 2016-02-17 Door lock control method, apparatus and terminal WO2016184195A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510718378.X 2015-10-29
CN201510718378.XA CN106652106A (en) 2015-10-29 2015-10-29 Door lock control method, device and terminal

Publications (1)

Publication Number Publication Date
WO2016184195A1 true WO2016184195A1 (en) 2016-11-24

Family

ID=57319280

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/073959 WO2016184195A1 (en) 2015-10-29 2016-02-17 Door lock control method, apparatus and terminal

Country Status (2)

Country Link
CN (1) CN106652106A (en)
WO (1) WO2016184195A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106837003A (en) * 2017-04-10 2017-06-13 梁盛海 A kind of electronic password lock
CN113920619A (en) * 2021-09-29 2022-01-11 南京金盾公共安全技术研究院有限公司 Rental house management system

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107301700A (en) * 2017-06-16 2017-10-27 成都智慧家信息技术有限公司 The gate control system of Intelligent Recognition alarm can be carried out
CN107369231B (en) * 2017-06-29 2023-09-12 山东千沐云物联科技股份有限公司 Intelligent lock control method and device
CN107700962A (en) * 2017-09-27 2018-02-16 湖南文理学院 A kind of safe and intelligent door-locking system and its control method
CN108090798B (en) * 2017-11-20 2023-01-31 创新先进技术有限公司 Article use control method, server, article, device and system
CN108198296B (en) * 2017-12-27 2020-12-15 广东林盟科技有限公司 WIFI positioning-based access control method and system
CN108266062A (en) * 2018-03-20 2018-07-10 广东好太太科技集团股份有限公司 A kind of Initiative Defense alarm intelligent door lock and its Initiative Defense alarm method
CN108550208B (en) * 2018-04-09 2021-04-23 深圳市靓工创新应用科技有限公司 User authority management method of intelligent door lock, server and readable medium
CN108551455B (en) * 2018-04-24 2021-02-26 北京小米移动软件有限公司 Configuration method and device of smart card
CN108921997A (en) * 2018-07-10 2018-11-30 淮北师范大学 A kind of door-locking system based on mobile phone control
CN110969727A (en) * 2018-09-30 2020-04-07 奇酷互联网络科技(深圳)有限公司 Method for controlling intelligent door lock, mobile terminal and computer readable storage medium
CN110570553A (en) * 2019-08-09 2019-12-13 深圳市天彦通信股份有限公司 Personnel management method and related device
CN110503757A (en) * 2019-08-23 2019-11-26 国网天津市电力公司 A kind of wireless WIFI fingerprint entrance guard system
CN110503755A (en) * 2019-08-23 2019-11-26 国网天津市电力公司 A kind of wireless WIFI fingerprint access control control method and system
CN110942537B (en) * 2019-11-26 2021-10-15 珠海格力电器股份有限公司 Intelligent door lock unlocking system, method, device and medium
CN111681342A (en) * 2020-05-26 2020-09-18 深圳桔子智能科技发展有限公司 Remote control method and system
CN113298991A (en) * 2020-10-21 2021-08-24 广州盛建科技产业园有限公司 Visitor authentication system
TWI807238B (en) * 2020-12-25 2023-07-01 中興保全科技股份有限公司 Access control system
CN112819999A (en) * 2020-12-31 2021-05-18 重庆房慧科技有限公司 Intelligent security system
CN113298981A (en) * 2021-05-14 2021-08-24 北京千丁互联科技有限公司 Near field communication unlocking method and request unlocking method for door lock equipment
CN113793439B (en) * 2021-11-17 2022-04-12 深圳市森尼物联科技有限公司 Intelligent lock control method and system, intelligent lock and storage medium
CN114333118B (en) * 2021-12-31 2024-03-22 广州保仕盾智能科技有限公司 Control method of normally open mode of intelligent door lock

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200958308Y (en) * 2006-09-14 2007-10-10 黄潮辉 Multifunctional intelligent gate lock
US20090066476A1 (en) * 2007-04-17 2009-03-12 Fonekey, Inc. Method of self-service access control for frequent guests of a housing facility
CN101661639A (en) * 2009-09-11 2010-03-03 王远洲 Method and system for controlling intelligent door lock
CN203376792U (en) * 2013-07-04 2014-01-01 纳米新能源(唐山)有限责任公司 Mobile terminal-based access control system and access control terminal
CN103559747A (en) * 2013-10-25 2014-02-05 江苏科大汇峰科技有限公司 Keyless type door opening method based on wireless mobile terminal
CN104050742A (en) * 2014-06-27 2014-09-17 青岛歌尔声学科技有限公司 Intelligent door and control method and system thereof

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2750003Y (en) * 2004-11-01 2006-01-04 华为技术有限公司 Electronic lock terminal
CN101593401A (en) * 2008-05-26 2009-12-02 北京上行逶式信息公司 A kind of remote communication devices of visitor alarming
CN102088522A (en) * 2009-12-04 2011-06-08 中国移动通信集团公司 System and method for modifying state of mobile terminal, and relevant equipment
CN103021045A (en) * 2011-09-25 2013-04-03 边高伟 Intelligent entrance guard system for mobile terminal user verification
CN102426715A (en) * 2011-09-30 2012-04-25 华为技术有限公司 Unlocking method for electronic door lock, electronic door lock and electronic door lock system
CN103541605B (en) * 2012-07-10 2016-12-21 刘冶辉 A kind of cellphone information is utilized to carry out the electronic lock switched
CN103955975A (en) * 2014-04-22 2014-07-30 广州闪购软件服务有限公司 Cellphone-based dynamic two-dimension code access control system
CN204375038U (en) * 2015-01-30 2015-06-03 程炽坤 A kind of intelligent electronic lock control device
CN104778773A (en) * 2015-04-16 2015-07-15 绿锌网络科技(上海)有限公司 System and method for controlling entrance guard by mobile phone

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN200958308Y (en) * 2006-09-14 2007-10-10 黄潮辉 Multifunctional intelligent gate lock
US20090066476A1 (en) * 2007-04-17 2009-03-12 Fonekey, Inc. Method of self-service access control for frequent guests of a housing facility
CN101661639A (en) * 2009-09-11 2010-03-03 王远洲 Method and system for controlling intelligent door lock
CN203376792U (en) * 2013-07-04 2014-01-01 纳米新能源(唐山)有限责任公司 Mobile terminal-based access control system and access control terminal
CN103559747A (en) * 2013-10-25 2014-02-05 江苏科大汇峰科技有限公司 Keyless type door opening method based on wireless mobile terminal
CN104050742A (en) * 2014-06-27 2014-09-17 青岛歌尔声学科技有限公司 Intelligent door and control method and system thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106837003A (en) * 2017-04-10 2017-06-13 梁盛海 A kind of electronic password lock
CN113920619A (en) * 2021-09-29 2022-01-11 南京金盾公共安全技术研究院有限公司 Rental house management system
CN113920619B (en) * 2021-09-29 2024-03-29 南京金盾公共安全技术研究院有限公司 Renting house management system

Also Published As

Publication number Publication date
CN106652106A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
WO2016184195A1 (en) Door lock control method, apparatus and terminal
KR102538002B1 (en) Method and system for managing a door entry using beacon signal
JP7216101B2 (en) Access control system and access control method using the same
CN105893802A (en) Method for locking/unlocking computer screen based on Bluetooth
KR102483794B1 (en) Entrance management system and method thereof
KR101765080B1 (en) smart door lock system based on iot and the method thereof
WO2018058796A1 (en) Intelligent hardware apparatus-based security system employing proximity recognition matching
KR102397042B1 (en) Entrance management system and method thereof
EP2806370A1 (en) Portable authentication tool and method
KR20150114618A (en) The Method to be controlled the Door Camera and Doorlock by SmartPhone with NFC Function Based on M2M in Mobile Network and the Equipment for it
CA2994476A1 (en) Systems and methods for secure authentication for access control, home control, and alarm systems
WO2018006344A1 (en) Ultrasound-based operation method and system for intelligent access control
WO2018006345A1 (en) Method and system for verifying intelligent entrance guard based on ultrasonic wave
Sharma et al. A Review on Internet of Things Based Door Security
WO2018006329A1 (en) Verification method and system based on identity card

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16795682

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16795682

Country of ref document: EP

Kind code of ref document: A1