[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106600768A - Intelligent door lock authentication method, device and terminal - Google Patents

Intelligent door lock authentication method, device and terminal Download PDF

Info

Publication number
CN106600768A
CN106600768A CN201611089583.5A CN201611089583A CN106600768A CN 106600768 A CN106600768 A CN 106600768A CN 201611089583 A CN201611089583 A CN 201611089583A CN 106600768 A CN106600768 A CN 106600768A
Authority
CN
China
Prior art keywords
door lock
identifying code
terminal
sent
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611089583.5A
Other languages
Chinese (zh)
Inventor
陈勇
钱庄
马百鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201611089583.5A priority Critical patent/CN106600768A/en
Publication of CN106600768A publication Critical patent/CN106600768A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an intelligent door lock authentication method, device and terminal. The method includes the steps: receiving authentication numbers transmitted by the terminal through a wireless network; acquiring first authentication codes and second authentication codes; determining whether door locks are opened or not according to the first authentication codes and the second authentication codes. The first authentication codes indicate corresponding relations among the authentication numbers and door lock information of current door locks. The invention provides an intelligent mode that authentication is achieved by the aid of the wireless network, and door lock authentication determines whether the door locks are opened or not. The provided method is convenient and rapid to operate and low in cost, loss is omitted, the door locks are conveniently opened by users, and living convenience is improved.

Description

Intelligent door lock verification method, device and terminal
Technical field
It relates to technical field of intelligence, more particularly to intelligent door lock verification method, device and terminal.
Background technology
As the development of science and technology, the mode for opening the door lock in room are more and more diversified, key can be taken, contactless card, The modes such as password go to open door lock.
In correlation technique, can go to open the door lock in room with key and contactless card;The mode of input password can also be taken Remove the door lock for opening room;The door lock for opening room can also be removed by the way of bio-identification.
But in correlation technique, these modes are easily lost and are replicated, key is easily lost, contactless card Easily demagnetization, password are easily forgotten;And in the method for bio-identification, such as fingerprint recognition needs to purchase somewhat expensive Gao An Overall coefficient recognizes machine, is also performed to the complex operations such as prior typing.So as to how to provide a kind of simple operation, not easy to lose , lower-cost door lock mode, become a problem demanding prompt solution.
The content of the invention
To overcome problem present in correlation technique, the disclosure to provide a kind of intelligent door lock verification method, device and terminal, For solving how to provide a kind of simple operation, not easy to lose, lower-cost door lock mode, become one it is urgently to be resolved hurrily Problem.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of intelligent door lock verification method, including:
The checking number that receiving terminal is sent by wireless network;
The first identifying code and the second identifying code are obtained, first identifying code indicates the checking number and works as front door lock Door lock information corresponding relation;
According to first identifying code and second identifying code, it is determined whether open door lock.
Further, the first identifying code of the acquisition and the second identifying code, including:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent out by wireless network The terminal is given, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has Number is verified with when the door lock information of front door lock corresponding at least one;
Receive the second identifying code that the terminal is sent by wireless network.
Further, it is described according to first identifying code and second identifying code, it is determined whether to open door lock, bag Include:
Determine that first identifying code is consistent with second identifying code, then generate unlocking instruction;
The unlocking instruction is sent to into door lock, so that door lock is unlocked according to the unlocking instruction.
Further, the unlocking instruction is sent to into door lock described, so that door lock is carried out according to the unlocking instruction After unlocking, also include:
Generate door-lock opening status information;
The door-lock opening status information is sent to into the terminal, so that the terminal shows the door-lock opening state Information, with the user for pointing out the terminal door lock is opened.
Further, the unlocking instruction is sent to into door lock described, so that door lock is carried out according to the unlocking instruction After unlocking, also include:
Receive the door information that the door lock sends;
If the door information is the non-opening imformation of door, information is sent to the terminal by wireless network, Door is not switched on the user for pointing out the terminal.
Further, it is described according to first identifying code and second identifying code, it is determined whether to open door lock, bag Include:
Determine that first identifying code is inconsistent with second identifying code, it is determined that do not open door lock.
Further, after door lock is not opened in the determination, also include:
Generate authentication failed information;
The authentication failed information is sent to into the terminal by wireless network, is carried out with the user for pointing out the terminal Again verify.
Further, before the checking number that the receiving terminal is sent by wireless network, also include:
The binding information that receiving terminal is sent by wireless network, the binding information includes verifying number;
Checking number is carried out into corresponding storage with the door lock information of current room.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:By receiving terminal by wireless The checking number that network sends;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and works as Qianmen The door lock information corresponding relation of lock;According to the first identifying code and the second identifying code, it is determined whether open door lock.So as to provide one Kind authentication is carried out by wireless network, complete the aptitude manner of door lock checking, the going to determine whether to open of intelligence works as anterior chamber Between door lock;The method simple operation of offer, not easy to lose and cost is relatively low, is easy to user to open door lock, improves life just Profit.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of intelligent door lock verifies device, including:
Receiver module, is configured to the checking number that receiving terminal is sent by wireless network;
Acquisition module, is configured to obtain the first identifying code and the second identifying code, first identifying code indicate described in test Card number and the door lock information corresponding relation when front door lock;
Determining module, is configured to according to first identifying code and second identifying code, it is determined whether open door lock.
Further, the acquisition module, is specifically configured to:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent out by wireless network The terminal is given, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has Number is verified with when the door lock information of front door lock corresponding at least one;
Receive the second identifying code that the terminal is sent by wireless network.
Further, the determining module, including:
First determination sub-module, is configured to determine that first identifying code is consistent with second identifying code, then generate Unlocking instruction;
Sending submodule, is configured to for the unlocking instruction to be sent to door lock, so that door lock is according to the unlocking instruction Unlocked.
Further, the determining module, also includes:
First prompting submodule, is configured to that the unlocking instruction is sent to into door lock in the sending submodule, so that After door lock is unlocked according to the unlocking instruction, door-lock opening status information is generated;By the door-lock opening status information The terminal is sent to, so that the terminal shows the door-lock opening status information, is opened with the user for pointing out the terminal Door lock.
Further, the determining module, also includes:
Second prompting submodule, is configured to that the unlocking instruction is sent to into door lock in the sending submodule, so that After door lock is unlocked according to the unlocking instruction, the door information that the door lock sends is received;If the door information is The non-opening imformation of door, then send information by wireless network to the terminal, is not beaten with the user for pointing out the terminal Open door.
Further, the determining module, including:
Second determination sub-module, is configured to determine that first identifying code is inconsistent with second identifying code, then really It is fixed not open door lock.
Further, the determining module, also includes:
3rd prompting submodule, is configured to after door lock is not opened in second determination sub-module determination, and generation is tested Card failure information;The authentication failed information is sent to into the terminal by wireless network, to point out the user of the terminal Again verified.
Further, described device, also includes:
Binding module, be configured to the checking number that sent by wireless network in the receiver module receiving terminal it Before, the binding information that receiving terminal is sent by wireless network, the binding information includes verifying number;Will checking number with The door lock information of current room carries out correspondence storage.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:By receiving terminal by wireless The checking number that network sends;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and works as Qianmen The door lock information corresponding relation of lock;According to the first identifying code and the second identifying code, it is determined whether open door lock.So as to provide one Kind authentication is carried out by wireless network, complete the aptitude manner of door lock checking, the going to determine whether to open of intelligence works as anterior chamber Between door lock;The method simple operation of offer, not easy to lose and cost is relatively low, is easy to user to open door lock, improves life just Profit.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of terminal, including:
Processor, and for storing the memorizer of processor executable;
Wherein, the processor is configured to:The checking number that receiving terminal is sent by wireless network;Obtain first to test Card code and the second identifying code, first identifying code indicates the checking number and the door lock information corresponding relation when front door lock; According to first identifying code and second identifying code, it is determined whether open door lock.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:By receiving terminal by wireless The checking number that network sends;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and works as Qianmen The door lock information corresponding relation of lock;According to the first identifying code and the second identifying code, it is determined whether open door lock.So as to provide one Kind authentication is carried out by wireless network, complete the aptitude manner of door lock checking, the going to determine whether to open of intelligence works as anterior chamber Between door lock;The method simple operation of offer, not easy to lose and cost is relatively low, is easy to user to open door lock, improves life just Profit.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
Accompanying drawing herein is merged in description and constitutes the part of this specification, shows the enforcement for meeting the present invention Example, and be used to explain the principle of the present invention together with description.
Fig. 1 is a kind of flow chart of the intelligent door lock verification method embodiment one according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the intelligent door lock verification method embodiment two according to an exemplary embodiment;
Fig. 3 is a kind of flow chart of the intelligent door lock verification method embodiment three according to an exemplary embodiment;
Fig. 4 is the block diagram that a kind of intelligent door lock according to an exemplary embodiment verifies device embodiment four;
Fig. 5 is the block diagram that a kind of intelligent door lock according to an exemplary embodiment verifies device embodiment five;
Fig. 6 is a kind of block diagram of the entity of the terminal embodiment six according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of the terminal unit 800 according to an exemplary embodiment.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.Conversely, they be only with it is such as appended The example of the consistent apparatus and method of some aspects described in detail in claims, the present invention.
Fig. 1 is a kind of flow chart of the intelligent door lock verification method embodiment one according to an exemplary embodiment, such as Shown in Fig. 1, the method is mainly used in wireless network (Wireless Fidelity, abbreviation WIFI) system, and the WIFI systems can To be server, terminal etc., the method is comprised the following steps.
In step s 11, the checking number that receiving terminal is sent by wireless network.
In this step, when user holds terminal room door, there is respectively respective WIFI systems in each room System;User can find the WIFI of current room in the WIFI lists of terminal, be then attempt to connect the WIFI of current room, this When can open WIFI portal pages.Then by terminal, checking number is sent to WIFI systems, is now by wireless network Checking number is sent to WIFI systems, such as user's input handset number in the terminal is clicked on and obtains identifying code, and then to WIFI System sends checking number, now verifies that number is phone number.
In step s 12, the first identifying code and the second identifying code are obtained, first identifying code indicates the checking number With the door lock information corresponding relation for working as front door lock.
In this step, WIFI systems go to obtain first identifying code and second identifying code, wherein, first Identifying code indicates the corresponding relation of the checking number in step S11 and the door lock information when front door lock.
In step s 13, according to first identifying code and second identifying code, it is determined whether open door lock.
In this step, WIFI systems judge whether the first identifying code is consistent with the second identifying code, then generate checking knot Really, the door lock for determining whether to open current room is removed.For example, WIFI systems judge that the first identifying code is consistent with the second identifying code, Then determine the door lock for opening current room;WIFI systems judge that the first identifying code is inconsistent with the second identifying code, it is determined that do not beat Open the door lock of current room.
The checking number that the present embodiment is sent by receiving terminal by wireless network;Obtain the first identifying code and second to test Card code, the first identifying code indicates checking number and the door lock information corresponding relation when front door lock;According to the first identifying code and second Identifying code, it is determined whether open door lock.Authentication is carried out by wireless network so as to provide one kind, door lock checking is completed Aptitude manner, the door lock for going to determine whether to open current room of intelligence;The method simple operation of offer, it is not easy to lose and into This is relatively low, is easy to user to open door lock, improves the convenience of life.
On the basis of the embodiment shown in above-mentioned Fig. 1, Fig. 2 is a kind of intelligent door according to an exemplary embodiment The flow chart of lock verification method embodiment two, as shown in Fig. 2 before step S11, also including:
In the step s 21, the binding information that receiving terminal is sent by wireless network, the binding information includes checking Number;Checking number is carried out into corresponding storage with the door lock information of current room.
In this step, terminal sends binding information, in binding information by wireless network to the WIFI systems in room Including checking number;So as to the checking number that WIFI systems receiving terminal is sent by wireless network, then WIFI systems will connect The checking number for receiving carries out corresponding storage with the door lock information of current room.Step S12 is specifically included:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent out by wireless network The terminal is given, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has Number is verified with when the door lock information of front door lock corresponding at least one;
Receive the second identifying code that the terminal is sent by wireless network.
In this step, there is the data base for prestoring in WIFI systems, has and the door lock for working as front door lock in database purchase The corresponding at least one checking number of information;WIFI systems can be according to the data base for prestoring, it is determined that the checking number for receiving It is whether corresponding with the door lock information when front door lock;WIFI systems determine checking number with work as front door lock door lock information it is corresponding it Afterwards, the first identifying code can be generated;Then, the first identifying code that WIFI systems will be generated, by wireless network terminal is sent to.
For example, WIFI systems receive the phone number that terminal is sent by wireless network;WIFI systems it is determined that Phone number generates the first identifying code with when the door lock information of front door lock is corresponding after;WIFI systems by mobile base station, by the One identifying code is sent to terminal, so as to the second identifying code of terminal receiving user's input.
Again for example, WIFI systems receive the wechat account that terminal is sent by wireless network;WIFI systems are true Wechat account has been determined with after the door lock information of front door lock is corresponding, generated the first identifying code;WIFI systems pass through wechat server, First identifying code is sent to into terminal, so as to the second identifying code of terminal receiving user's input;Now wechat server needs to protect Card user, wechat account, corresponding client terminals have trusting relationship, i.e., every client terminals for logging in the wechat account The user can be represented.
Then, terminal is received after the first identifying code of WIFI systems transmission, shows the first identifying code;So that User is input in the terminal the second identifying code, and terminal can be with the second identifying code of receiving user's input.Then terminal is tested second Card code is sent to WIFI systems.So as to the second identifying code that WIFI systems receiving terminal is sent by wireless network.
In the present embodiment two, the implementation of step S13 is:
Determine that first identifying code is consistent with second identifying code, then generate unlocking instruction;
The unlocking instruction is sent to into door lock, so that door lock is unlocked according to the unlocking instruction.
In this step, when WIFI systems determine that the first identifying code is consistent with the second identifying code, WIFI systems can be with Unlocking instruction is generated, unlocking instruction just can be sent to WIFI systems the door lock of current room, so as to door lock refers to according to unlocking Order is unlocked, so as to open the door of current room.
After step s 13, also include:
In step S22, door-lock opening status information is generated;The door-lock opening status information is sent to into the end End, so that the terminal shows the door-lock opening status information, with the user for pointing out the terminal door lock is opened.
In this step, WIFI systems are it is determined that the first identifying code is consistent with the second identifying code, after opening room door lock, Door-lock opening status information can also be generated, door-lock opening status information is sent to terminal by WIFI systems.So as to terminal can be with The door-lock opening status information is shown, so as to terminal can open door lock with the user of prompt terminal.
For example, WIFI systems are it is determined that the first identifying code is consistent with the second identifying code, after opening room door lock, also Door-lock opening status information can be generated, WIFI systems are sent to door-lock opening status information after terminal, terminal word with And voice shows the door-lock opening status information.
After step s 13, also include:
In step S23, the door information that the door lock sends is received;If the door information does not open letter for door Breath, then send information by wireless network to the terminal, and with the user for pointing out the terminal door is not switched on.
In this step, WIFI systems are it is determined that the first identifying code is consistent with the second identifying code, after opening room door lock, Door information can be sent to WIFI systems by door lock, and WIFI systems receive the door information of door lock transmission, however, it is determined that door is believed Cease for the non-opening imformation of door, then WIFI systems send information by wireless network to terminal, so as to the use of prompt terminal Family is not switched on door, so as to pointing out user to be verified again or pointing out user to contact manager;If it is determined that door information is Door opening imformation, then WIFI systems directly preserve the door opening imformation.
The binding information that the present embodiment is sent by receiving terminal by wireless network, binding information includes checking number Code;Checking number is carried out into corresponding storage with the door lock information of current room;The checking that receiving terminal is sent by wireless network Number;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and the door lock information pair when front door lock Should be related to;According to the first identifying code and the second identifying code, it is determined whether open door lock, however, it is determined that the first identifying code and the second checking Code is consistent, then generate unlocking instruction, unlocking instruction is sent to into door lock, so that door lock is unlocked according to unlocking instruction..So as to Authentication is carried out by wireless network there is provided one kind, complete door lock checking aptitude manner, intelligence go determine whether beat Open the door lock of current room;When it is determined that the first identifying code is consistent with the second identifying code, then generates unlocking instruction and go to be unlocked; The method simple operation of offer, not easy to lose and cost is relatively low, is easy to user to open door lock, improves the convenience of life.
On the basis of the embodiment shown in above-mentioned Fig. 1 and Fig. 2, Fig. 3 is the one kind according to an exemplary embodiment The flow chart of intelligent door lock verification method embodiment three, as shown in figure 3, in the present embodiment three, the implementation of step S13 For:
Determine that first identifying code is inconsistent with second identifying code, it is determined that do not open door lock.
In this step, when WIFI systems determine the first identifying code and inconsistent the second identifying code, WIFI systems are true The fixed door lock for not opening current room.
After step s 13, also include:
In step s 24, authentication failed information is generated;The authentication failed information is sent to by wireless network described Terminal, is verified again with the user for pointing out the terminal.
In this step, WIFI systems determine that WIFI systems can generate checking after the door lock for not opening current room Failure information;Authentication failed information is sent to terminal by WIFI systems by wireless network, so as to terminal shows authentication failed letter Breath so that the user of terminal notifying terminal is verified again, so as to open the door of current room.
Wherein, when user is verified again, each step of the present embodiment can be repeated, however it is necessary that arranging Again the number of times verified, the number of times for example verified again is no more than 3 times.
The binding information that the present embodiment is sent by receiving terminal by wireless network, binding information includes checking number Code;Checking number is carried out into corresponding storage with the door lock information of current room;The checking that receiving terminal is sent by wireless network Number;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and the door lock information pair when front door lock Should be related to;According to the first identifying code and the second identifying code, it is determined whether open door lock, however, it is determined that the first identifying code and the second checking Code is inconsistent, it is determined that do not open door lock, then generates authentication failed information;Authentication failed information is sent by wireless network To terminal, verified again with the user of prompt terminal.Authentication is carried out by wireless network so as to provide one kind, it is complete Into the aptitude manner of door lock checking, the door lock for going to determine whether to open current room of intelligence;It is determined that the first identifying code and When two identifying codes are inconsistent, do not unlocked, then point out user to be verified again;The method simple operation of offer, it is difficult Lose and cost is relatively low, be easy to user to open door lock, improve the convenience of life.
Fig. 4 is the block diagram that a kind of intelligent door lock according to an exemplary embodiment verifies device embodiment four.Reference Fig. 4, the device includes:
Receiver module 31, is configured to the checking number that receiving terminal is sent by wireless network;
Acquisition module 32, is configured to obtain the first identifying code and the second identifying code, and first identifying code indicates described Checking number and the door lock information corresponding relation when front door lock;
Determining module 33, is configured to according to first identifying code and second identifying code, it is determined whether open door Lock.
With regard to the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
The checking number that the present embodiment is sent by receiving terminal by wireless network;Obtain the first identifying code and second to test Card code, the first identifying code indicates checking number and the door lock information corresponding relation when front door lock;According to the first identifying code and second Identifying code, it is determined whether open door lock.Authentication is carried out by wireless network so as to provide one kind, door lock checking is completed Aptitude manner, the door lock for going to determine whether to open current room of intelligence;The method simple operation of offer, it is not easy to lose and into This is relatively low, is easy to user to open door lock, improves the convenience of life.
On the basis of the embodiment shown in above-mentioned Fig. 4, Fig. 5 is a kind of intelligent door according to an exemplary embodiment The block diagram of lock checking device embodiment five.With reference to Fig. 5, the device also includes:
Binding module 41, is configured to the checking number sent by wireless network in the receiving terminal of the receiver module 31 Before, the binding information that receiving terminal is sent by wireless network, the binding information includes verifying number;Number will be verified Corresponding storage is carried out with the door lock information of current room.
The acquisition module 32, is specifically configured to:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent out by wireless network The terminal is given, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has Number is verified with when the door lock information of front door lock corresponding at least one;
Receive the second identifying code that the terminal is sent by wireless network.
The determining module 33, including:
First determination sub-module 331, is configured to determine that first identifying code is consistent with second identifying code, then give birth to Into unlocking instruction;
Sending submodule 332, is configured to for the unlocking instruction to be sent to door lock, so that door lock refers to according to the unlocking Order is unlocked.
First prompting submodule 333, is configured to that the unlocking instruction is sent to into door in the sending submodule 332 Lock, so as to after door lock is unlocked according to the unlocking instruction, generate door-lock opening status information;By the door-lock opening shape State information is sent to the terminal, so that the terminal shows the door-lock opening status information, to point out the use of the terminal Family opens door lock.
Second prompting submodule 334, is configured to that the unlocking instruction is sent to into door in the sending submodule 332 Lock, so as to after door lock is unlocked according to the unlocking instruction, receive the door information that the door lock sends;If the door Information is the non-opening imformation of door, then information is sent to the terminal by wireless network, to point out the use of the terminal Family is not switched on door.
Or, the determining module 33, including:
Second determination sub-module 335, is configured to determine that first identifying code is inconsistent with second identifying code, then It is determined that not opening door lock.
3rd prompting submodule 336, is configured to after second determination sub-module 335 determines and do not open door lock, Generate authentication failed information;The authentication failed information is sent to into the terminal by wireless network, to point out the terminal User verified again.
With regard to the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
The binding information that the present embodiment is sent by receiving terminal by wireless network, binding information includes checking number Code;Checking number is carried out into corresponding storage with the door lock information of current room;The checking that receiving terminal is sent by wireless network Number;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and the door lock information pair when front door lock Should be related to;According to the first identifying code and the second identifying code, it is determined whether open door lock, however, it is determined that the first identifying code and the second checking Code is consistent, then generate unlocking instruction, unlocking instruction is sent to into door lock, so that door lock is unlocked according to unlocking instruction..So as to Authentication is carried out by wireless network there is provided one kind, complete door lock checking aptitude manner, intelligence go determine whether beat Open the door lock of current room;When it is determined that the first identifying code is consistent with the second identifying code, then generates unlocking instruction and go to be unlocked, It is determined that when the first identifying code and inconsistent the second identifying code, do not unlocked, user is then pointed out to be verified again;There is provided Method simple operation, not easy to lose and cost is relatively low, be easy to user open door lock, improve life convenience.
Fig. 6 is a kind of block diagram of the entity of the terminal embodiment six according to an exemplary embodiment.With reference to Fig. 6, should Terminal can be implemented as:Processor 71, and be configured to store the memorizer 72 of processor executable;
Wherein, the processor 71 is configured to:The checking number that receiving terminal is sent by wireless network;Obtain first Identifying code and the second identifying code, first identifying code indicates the checking number and closes when the door lock information of front door lock is corresponding System;According to first identifying code and second identifying code, it is determined whether open door lock.
In the above-described embodiments, it should be appreciated that the processor can be CPU (English:Central Processing Unit, referred to as:CPU), can also be other general processors, digital signal processor (English:Digital Signal Processor, referred to as:DSP), special IC (English:Application Specific Integrated Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor can also be any conventional place Reason device etc., and aforesaid memorizer can be read only memory (English:Read-only memory, abbreviation:ROM), deposit at random Access to memory (English:Random access memory, referred to as:RAM), flash memory, hard disk or solid state hard disc.SIM Card is also referred to as subscriber identification card, smart card, and digital mobile telephone must load onto this card and can use.I.e. in computer chip On store the information of digital mobile phone client, the content such as the key of encryption and the telephone directory of user.With reference to of the invention real The step of applying the method disclosed in example can be embodied directly in hardware processor and perform and complete, or with the hardware in processor and Software module combination execution is completed.
With regard to the WIFI systems in above-described embodiment, wherein modules perform the concrete mode for operating and are somebody's turn to do relevant It has been described in detail in the embodiment of method and apparatus, explanation will be not set forth in detail herein.
The checking number that the present embodiment is sent by receiving terminal by wireless network;Obtain the first identifying code and second to test Card code, the first identifying code indicates checking number and the door lock information corresponding relation when front door lock;According to the first identifying code and second Identifying code, it is determined whether open door lock.Authentication is carried out by wireless network so as to provide one kind, door lock checking is completed Aptitude manner, the door lock for going to determine whether to open current room of intelligence;The method simple operation of offer, it is not easy to lose and into This is relatively low, is easy to user to open door lock, improves the convenience of life.
Fig. 7 is a kind of block diagram of the terminal unit 800 according to an exemplary embodiment.For example, terminal unit 800 can To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium is good for Body equipment, personal digital assistant etc..
With reference to Fig. 7, terminal unit 800 can include following one or more assemblies:Process assembly 802, memorizer 804, Power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, And communication component 816.
The integrated operation of the usual control terminal equipment 800 of process assembly 802, such as with display, call, data are led to Letter, the associated operation of camera operation and record operation.Process assembly 802 can include one or more processors 820 to hold Row instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more moulds Block, the interaction being easy between process assembly 802 and other assemblies.For example, process assembly 802 can include multi-media module, with Facilitate the interaction between multimedia groupware 808 and process assembly 802.
Memorizer 804 is configured to store various types of data to support the operation in terminal unit 800.These data Example include on terminal unit 800 operate any application program or method instruction, contact data, telephone directory Data, message, picture, video etc..Memorizer 804 can by any kind of volatibility or non-volatile memory device or it Combination realize that such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable Except programmable read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, soon Flash memory, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal unit 800.Power supply module 806 can include power supply pipe Reason system, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for terminal unit 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between the terminal unit 800 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch screen, to receive the input signal from user.Touch panel is touched including one or more Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip The border of action, but also the detection persistent period related to the touch or slide and pressure.In certain embodiments, Multimedia groupware 808 includes a front-facing camera and/or post-positioned pick-up head.When terminal unit 800 is in operator scheme, such as clap When taking the photograph pattern or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each is preposition Photographic head and post-positioned pick-up head can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when terminal unit 800 is in operator scheme, such as call model, logging mode and speech recognition mode, mike It is configured to receive external audio signal.The audio signal for being received can be further stored in memorizer 804 or via logical Letter component 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, for exports audio signal.
, to provide interface between process assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, for providing the state of various aspects for terminal unit 800 Assessment.For example, sensor cluster 814 can detect the opening/closed mode of terminal unit 800, the relative localization of component, example If the component is the display and keypad of terminal unit 800, sensor cluster 814 can with detection terminal equipment 800 or The position change of 800 1 components of terminal unit, user is presence or absence of with what terminal unit 800 was contacted, terminal unit 800 The temperature change in orientation or acceleration/deceleration and terminal unit 800.Sensor cluster 814 can include proximity transducer, be configured For the presence of object near detection when without any physical contact.Sensor cluster 814 can also include optical sensor, Such as CMOS or ccd image sensor, for used in imaging applications.In certain embodiments, the sensor cluster 814 may be used also With including acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal unit 800 and other equipment. Terminal unit 800 can be accessed based on the wireless network of communication standard, such as WiFi, 2G or 3G, or combinations thereof.Show at one In example property embodiment, communication component 816 receives broadcast singal or the broadcast from external broadcasting management system via broadcast channel Relevant information.In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, short to promote Cheng Tongxin.For example, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, terminal unit 800 can be by one or more application specific integrated circuits (ASIC), number Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realizations, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided Such as include the memorizer 804 of instruction, above-mentioned instruction can be performed to complete said method by the processor 820 of terminal unit 800.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the process of mobile terminal When device is performed so that mobile terminal is able to carry out a kind of intelligent door lock verification method, and methods described includes:
The checking number that receiving terminal is sent by wireless network;
The first identifying code and the second identifying code are obtained, first identifying code indicates the checking number and works as front door lock Door lock information corresponding relation;
According to first identifying code and second identifying code, it is determined whether open door lock.
Those skilled in the art will readily occur to its of the present invention after considering description and putting into practice invention disclosed herein Its embodiment.The application is intended to any modification of the present invention, purposes or adaptations, these modifications, purposes or Person's adaptations follow the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It should be appreciated that the precision architecture for being described above and being shown in the drawings is the invention is not limited in, and And can without departing from the scope carry out various modifications and changes.The scope of the present invention is only limited by appended claim.

Claims (17)

1. a kind of intelligent door lock verification method, it is characterised in that include:
The checking number that receiving terminal is sent by wireless network;
The first identifying code and the second identifying code are obtained, first identifying code indicates the checking number and the door lock when front door lock Information corresponding relation;
According to first identifying code and second identifying code, it is determined whether open door lock.
2. method according to claim 1, it is characterised in that the identifying code of the acquisition first and the second identifying code, including:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent to by wireless network The terminal, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has and works as The corresponding at least one checking number of door lock information of front door lock;
Receive the second identifying code that the terminal is sent by wireless network.
3. method according to claim 1, it is characterised in that described according to first identifying code and the described second checking Code, it is determined whether open door lock, including:
Determine that first identifying code is consistent with second identifying code, then generate unlocking instruction;
The unlocking instruction is sent to into door lock, so that door lock is unlocked according to the unlocking instruction.
4. method according to claim 3, it is characterised in that the unlocking instruction is sent to into door lock described, so that After door lock is unlocked according to the unlocking instruction, also include:
Generate door-lock opening status information;
The door-lock opening status information is sent to into the terminal, so that the terminal shows the door-lock opening state letter Breath, with the user for pointing out the terminal door lock is opened.
5. method according to claim 3, it is characterised in that the unlocking instruction is sent to into door lock described, so that After door lock is unlocked according to the unlocking instruction, also include:
Receive the door information that the door lock sends;
If the door information is the non-opening imformation of door, information is sent to the terminal by wireless network, to carry The user for showing the terminal is not switched on door.
6. method according to claim 1, it is characterised in that described according to first identifying code and the described second checking Code, it is determined whether open door lock, including:
Determine that first identifying code is inconsistent with second identifying code, it is determined that do not open door lock.
7. method according to claim 6, it is characterised in that after door lock is not opened in the determination, also include:
Generate authentication failed information;
The authentication failed information is sent to into the terminal by wireless network, is carried out again with the user for pointing out the terminal Checking.
8. the method according to any one of claim 1-7, it is characterised in that sent out by wireless network in the receiving terminal Before the checking number for sending, also include:
The binding information that receiving terminal is sent by wireless network, the binding information includes verifying number;
Checking number is carried out into corresponding storage with the door lock information of current room.
9. a kind of intelligent door lock verifies device, it is characterised in that include:
Receiver module, is configured to the checking number that receiving terminal is sent by wireless network;
Acquisition module, is configured to obtain the first identifying code and the second identifying code, and first identifying code indicates the checking number Code and the door lock information corresponding relation when front door lock;
Determining module, is configured to according to first identifying code and second identifying code, it is determined whether open door lock.
10. device according to claim 9, it is characterised in that the acquisition module, is specifically configured to:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent to by wireless network The terminal, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has and works as The corresponding at least one checking number of door lock information of front door lock;
Receive the second identifying code that the terminal is sent by wireless network.
11. devices according to claim 9, it is characterised in that the determining module, including:
First determination sub-module, is configured to determine that first identifying code is consistent with second identifying code, then generate and unlock Instruction;
Sending submodule, is configured to for the unlocking instruction to be sent to door lock, so that door lock is carried out according to the unlocking instruction Unlock.
12. devices according to claim 11, it is characterised in that the determining module, also include:
First prompting submodule, is configured to that the unlocking instruction is sent to into door lock in the sending submodule, so that door lock After being unlocked according to the unlocking instruction, door-lock opening status information is generated;The door-lock opening status information is sent To the terminal, so that the terminal shows the door-lock opening status information, door is opened with the user for pointing out the terminal Lock.
13. devices according to claim 11, it is characterised in that the determining module, also include:
Second prompting submodule, is configured to that the unlocking instruction is sent to into door lock in the sending submodule, so that door lock After being unlocked according to the unlocking instruction, the door information that the door lock sends is received;If the door information is door Non- opening imformation, then send information by wireless network to the terminal, and with the user for pointing out the terminal room is not switched on Door.
14. devices according to claim 9, it is characterised in that the determining module, including:
Second determination sub-module, is configured to determine that first identifying code is inconsistent with second identifying code, it is determined that no Open door lock.
15. devices according to claim 14, it is characterised in that the determining module, also include:
3rd prompting submodule, is configured to after door lock is not opened in second determination sub-module determination, generates checking and loses Lose information;The authentication failed information is sent to into the terminal by wireless network, is carried out with the user for pointing out the terminal Again verify.
16. devices according to any one of claim 9-15, it is characterised in that described device, also include:
Binding module, was configured to before the checking number that the receiver module receiving terminal is sent by wireless network, connect The binding information that terminal is sent by wireless network is received, the binding information includes verifying number;Will checking number with it is current The door lock information in room carries out correspondence storage.
17. a kind of terminals, it is characterised in that include:
Processor, and for storing the memorizer of processor executable;
Wherein, the processor is configured to:The checking number that receiving terminal is sent by wireless network;Obtain the first identifying code With the second identifying code, the first identifying code instruction is described to verify number and the door lock information corresponding relation when front door lock;According to First identifying code and second identifying code, it is determined whether open door lock.
CN201611089583.5A 2016-12-01 2016-12-01 Intelligent door lock authentication method, device and terminal Pending CN106600768A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611089583.5A CN106600768A (en) 2016-12-01 2016-12-01 Intelligent door lock authentication method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611089583.5A CN106600768A (en) 2016-12-01 2016-12-01 Intelligent door lock authentication method, device and terminal

Publications (1)

Publication Number Publication Date
CN106600768A true CN106600768A (en) 2017-04-26

Family

ID=58594634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611089583.5A Pending CN106600768A (en) 2016-12-01 2016-12-01 Intelligent door lock authentication method, device and terminal

Country Status (1)

Country Link
CN (1) CN106600768A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107978048A (en) * 2017-12-07 2018-05-01 潘淑斐 Multifunctional fingerprint identifies door lock
CN109367988A (en) * 2018-09-26 2019-02-22 陕西昱鑫科技发展有限责任公司 A kind of material evidence transport box and its application method being able to carry out information collection and certification
WO2019095728A1 (en) * 2017-11-16 2019-05-23 杭州海康威视数字技术股份有限公司 Information prompting method, apparatus, and system, and intelligent electronic door lock
CN110599639A (en) * 2019-08-13 2019-12-20 深圳市天彦通信股份有限公司 Identity verification method and related product
CN111080853A (en) * 2019-12-20 2020-04-28 珠海格力电器股份有限公司 Intelligent door lock system, unlocking method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1408188A1 (en) * 2002-10-09 2004-04-14 Nissan Motor Company, Limited Door lock/unlock system
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN103871136A (en) * 2014-03-11 2014-06-18 深圳市九洲电器有限公司 Set top box and access control method and system based on same
CN203905651U (en) * 2014-04-30 2014-10-29 常州市思索数码科技有限公司 Intelligent electronic lock
CN105184898A (en) * 2015-07-16 2015-12-23 青岛文创科技有限公司 Multifunctional gating system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1408188A1 (en) * 2002-10-09 2004-04-14 Nissan Motor Company, Limited Door lock/unlock system
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN103871136A (en) * 2014-03-11 2014-06-18 深圳市九洲电器有限公司 Set top box and access control method and system based on same
CN203905651U (en) * 2014-04-30 2014-10-29 常州市思索数码科技有限公司 Intelligent electronic lock
CN105184898A (en) * 2015-07-16 2015-12-23 青岛文创科技有限公司 Multifunctional gating system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019095728A1 (en) * 2017-11-16 2019-05-23 杭州海康威视数字技术股份有限公司 Information prompting method, apparatus, and system, and intelligent electronic door lock
US11417158B2 (en) 2017-11-16 2022-08-16 Hangzhou Hikvision Digital Technology Co., Ltd. Information prompting method, apparatus, and system, and intelligent electronic door lock
CN107978048A (en) * 2017-12-07 2018-05-01 潘淑斐 Multifunctional fingerprint identifies door lock
CN109367988A (en) * 2018-09-26 2019-02-22 陕西昱鑫科技发展有限责任公司 A kind of material evidence transport box and its application method being able to carry out information collection and certification
CN110599639A (en) * 2019-08-13 2019-12-20 深圳市天彦通信股份有限公司 Identity verification method and related product
CN111080853A (en) * 2019-12-20 2020-04-28 珠海格力电器股份有限公司 Intelligent door lock system, unlocking method, device, equipment and medium
CN111080853B (en) * 2019-12-20 2021-02-05 珠海格力电器股份有限公司 Intelligent door lock system, unlocking method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN104091376B (en) Intelligent lock control method and apparatus thereof
CN104992091A (en) Method and apparatus for accessing terminal end
CN106600768A (en) Intelligent door lock authentication method, device and terminal
CN106503513A (en) Method for recognizing sound-groove and device
CN105631254B (en) Unlocking method and tripper
CN105791309A (en) Method, device and system for executing business processing
CN106485127A (en) The control method of electronic equipment, device, electronic equipment and system
CN106023370A (en) Unlocking method and device for NFC equipment
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN107767133A (en) Virtual card opens chucking method, apparatus and system, storage medium
CN105871913A (en) Identity authentication method and system
CN106102061A (en) Method for connecting network and device
CN106446653A (en) Application authority management method and device and electronic equipment
CN107733872A (en) Information Method of printing and device
CN106060027A (en) Methods, devices, equipment and systems for verification based on verification codes
CN107622189A (en) Optimize the method and apparatus of unlocked by fingerprint
CN109801065A (en) Virtual card opens chucking method, apparatus and system, storage medium
CN108476379A (en) Information recording method and information record carrier
CN104951678B (en) Unlocking method and a device
CN106535190A (en) Network connection method and apparatus
CN106775834A (en) Brush machine verification method and device
CN106658467A (en) Virtual SIM card management method and device
CN106780868A (en) Unlock control method, device and the automobile charging gun of automobile charging gun
CN105069344A (en) Mobile terminal locking method and apparatus
CN106022160A (en) Method and apparatuses for deleting user data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170426