CN106600768A - Intelligent door lock authentication method, device and terminal - Google Patents
Intelligent door lock authentication method, device and terminal Download PDFInfo
- Publication number
- CN106600768A CN106600768A CN201611089583.5A CN201611089583A CN106600768A CN 106600768 A CN106600768 A CN 106600768A CN 201611089583 A CN201611089583 A CN 201611089583A CN 106600768 A CN106600768 A CN 106600768A
- Authority
- CN
- China
- Prior art keywords
- door lock
- identifying code
- terminal
- sent
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an intelligent door lock authentication method, device and terminal. The method includes the steps: receiving authentication numbers transmitted by the terminal through a wireless network; acquiring first authentication codes and second authentication codes; determining whether door locks are opened or not according to the first authentication codes and the second authentication codes. The first authentication codes indicate corresponding relations among the authentication numbers and door lock information of current door locks. The invention provides an intelligent mode that authentication is achieved by the aid of the wireless network, and door lock authentication determines whether the door locks are opened or not. The provided method is convenient and rapid to operate and low in cost, loss is omitted, the door locks are conveniently opened by users, and living convenience is improved.
Description
Technical field
It relates to technical field of intelligence, more particularly to intelligent door lock verification method, device and terminal.
Background technology
As the development of science and technology, the mode for opening the door lock in room are more and more diversified, key can be taken, contactless card,
The modes such as password go to open door lock.
In correlation technique, can go to open the door lock in room with key and contactless card;The mode of input password can also be taken
Remove the door lock for opening room;The door lock for opening room can also be removed by the way of bio-identification.
But in correlation technique, these modes are easily lost and are replicated, key is easily lost, contactless card
Easily demagnetization, password are easily forgotten;And in the method for bio-identification, such as fingerprint recognition needs to purchase somewhat expensive Gao An
Overall coefficient recognizes machine, is also performed to the complex operations such as prior typing.So as to how to provide a kind of simple operation, not easy to lose
, lower-cost door lock mode, become a problem demanding prompt solution.
The content of the invention
To overcome problem present in correlation technique, the disclosure to provide a kind of intelligent door lock verification method, device and terminal,
For solving how to provide a kind of simple operation, not easy to lose, lower-cost door lock mode, become one it is urgently to be resolved hurrily
Problem.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of intelligent door lock verification method, including:
The checking number that receiving terminal is sent by wireless network;
The first identifying code and the second identifying code are obtained, first identifying code indicates the checking number and works as front door lock
Door lock information corresponding relation;
According to first identifying code and second identifying code, it is determined whether open door lock.
Further, the first identifying code of the acquisition and the second identifying code, including:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent out by wireless network
The terminal is given, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has
Number is verified with when the door lock information of front door lock corresponding at least one;
Receive the second identifying code that the terminal is sent by wireless network.
Further, it is described according to first identifying code and second identifying code, it is determined whether to open door lock, bag
Include:
Determine that first identifying code is consistent with second identifying code, then generate unlocking instruction;
The unlocking instruction is sent to into door lock, so that door lock is unlocked according to the unlocking instruction.
Further, the unlocking instruction is sent to into door lock described, so that door lock is carried out according to the unlocking instruction
After unlocking, also include:
Generate door-lock opening status information;
The door-lock opening status information is sent to into the terminal, so that the terminal shows the door-lock opening state
Information, with the user for pointing out the terminal door lock is opened.
Further, the unlocking instruction is sent to into door lock described, so that door lock is carried out according to the unlocking instruction
After unlocking, also include:
Receive the door information that the door lock sends;
If the door information is the non-opening imformation of door, information is sent to the terminal by wireless network,
Door is not switched on the user for pointing out the terminal.
Further, it is described according to first identifying code and second identifying code, it is determined whether to open door lock, bag
Include:
Determine that first identifying code is inconsistent with second identifying code, it is determined that do not open door lock.
Further, after door lock is not opened in the determination, also include:
Generate authentication failed information;
The authentication failed information is sent to into the terminal by wireless network, is carried out with the user for pointing out the terminal
Again verify.
Further, before the checking number that the receiving terminal is sent by wireless network, also include:
The binding information that receiving terminal is sent by wireless network, the binding information includes verifying number;
Checking number is carried out into corresponding storage with the door lock information of current room.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:By receiving terminal by wireless
The checking number that network sends;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and works as Qianmen
The door lock information corresponding relation of lock;According to the first identifying code and the second identifying code, it is determined whether open door lock.So as to provide one
Kind authentication is carried out by wireless network, complete the aptitude manner of door lock checking, the going to determine whether to open of intelligence works as anterior chamber
Between door lock;The method simple operation of offer, not easy to lose and cost is relatively low, is easy to user to open door lock, improves life just
Profit.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of intelligent door lock verifies device, including:
Receiver module, is configured to the checking number that receiving terminal is sent by wireless network;
Acquisition module, is configured to obtain the first identifying code and the second identifying code, first identifying code indicate described in test
Card number and the door lock information corresponding relation when front door lock;
Determining module, is configured to according to first identifying code and second identifying code, it is determined whether open door lock.
Further, the acquisition module, is specifically configured to:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent out by wireless network
The terminal is given, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has
Number is verified with when the door lock information of front door lock corresponding at least one;
Receive the second identifying code that the terminal is sent by wireless network.
Further, the determining module, including:
First determination sub-module, is configured to determine that first identifying code is consistent with second identifying code, then generate
Unlocking instruction;
Sending submodule, is configured to for the unlocking instruction to be sent to door lock, so that door lock is according to the unlocking instruction
Unlocked.
Further, the determining module, also includes:
First prompting submodule, is configured to that the unlocking instruction is sent to into door lock in the sending submodule, so that
After door lock is unlocked according to the unlocking instruction, door-lock opening status information is generated;By the door-lock opening status information
The terminal is sent to, so that the terminal shows the door-lock opening status information, is opened with the user for pointing out the terminal
Door lock.
Further, the determining module, also includes:
Second prompting submodule, is configured to that the unlocking instruction is sent to into door lock in the sending submodule, so that
After door lock is unlocked according to the unlocking instruction, the door information that the door lock sends is received;If the door information is
The non-opening imformation of door, then send information by wireless network to the terminal, is not beaten with the user for pointing out the terminal
Open door.
Further, the determining module, including:
Second determination sub-module, is configured to determine that first identifying code is inconsistent with second identifying code, then really
It is fixed not open door lock.
Further, the determining module, also includes:
3rd prompting submodule, is configured to after door lock is not opened in second determination sub-module determination, and generation is tested
Card failure information;The authentication failed information is sent to into the terminal by wireless network, to point out the user of the terminal
Again verified.
Further, described device, also includes:
Binding module, be configured to the checking number that sent by wireless network in the receiver module receiving terminal it
Before, the binding information that receiving terminal is sent by wireless network, the binding information includes verifying number;Will checking number with
The door lock information of current room carries out correspondence storage.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:By receiving terminal by wireless
The checking number that network sends;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and works as Qianmen
The door lock information corresponding relation of lock;According to the first identifying code and the second identifying code, it is determined whether open door lock.So as to provide one
Kind authentication is carried out by wireless network, complete the aptitude manner of door lock checking, the going to determine whether to open of intelligence works as anterior chamber
Between door lock;The method simple operation of offer, not easy to lose and cost is relatively low, is easy to user to open door lock, improves life just
Profit.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of terminal, including:
Processor, and for storing the memorizer of processor executable;
Wherein, the processor is configured to:The checking number that receiving terminal is sent by wireless network;Obtain first to test
Card code and the second identifying code, first identifying code indicates the checking number and the door lock information corresponding relation when front door lock;
According to first identifying code and second identifying code, it is determined whether open door lock.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:By receiving terminal by wireless
The checking number that network sends;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and works as Qianmen
The door lock information corresponding relation of lock;According to the first identifying code and the second identifying code, it is determined whether open door lock.So as to provide one
Kind authentication is carried out by wireless network, complete the aptitude manner of door lock checking, the going to determine whether to open of intelligence works as anterior chamber
Between door lock;The method simple operation of offer, not easy to lose and cost is relatively low, is easy to user to open door lock, improves life just
Profit.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
Accompanying drawing herein is merged in description and constitutes the part of this specification, shows the enforcement for meeting the present invention
Example, and be used to explain the principle of the present invention together with description.
Fig. 1 is a kind of flow chart of the intelligent door lock verification method embodiment one according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the intelligent door lock verification method embodiment two according to an exemplary embodiment;
Fig. 3 is a kind of flow chart of the intelligent door lock verification method embodiment three according to an exemplary embodiment;
Fig. 4 is the block diagram that a kind of intelligent door lock according to an exemplary embodiment verifies device embodiment four;
Fig. 5 is the block diagram that a kind of intelligent door lock according to an exemplary embodiment verifies device embodiment five;
Fig. 6 is a kind of block diagram of the entity of the terminal embodiment six according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of the terminal unit 800 according to an exemplary embodiment.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Explained below is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.Conversely, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects described in detail in claims, the present invention.
Fig. 1 is a kind of flow chart of the intelligent door lock verification method embodiment one according to an exemplary embodiment, such as
Shown in Fig. 1, the method is mainly used in wireless network (Wireless Fidelity, abbreviation WIFI) system, and the WIFI systems can
To be server, terminal etc., the method is comprised the following steps.
In step s 11, the checking number that receiving terminal is sent by wireless network.
In this step, when user holds terminal room door, there is respectively respective WIFI systems in each room
System;User can find the WIFI of current room in the WIFI lists of terminal, be then attempt to connect the WIFI of current room, this
When can open WIFI portal pages.Then by terminal, checking number is sent to WIFI systems, is now by wireless network
Checking number is sent to WIFI systems, such as user's input handset number in the terminal is clicked on and obtains identifying code, and then to WIFI
System sends checking number, now verifies that number is phone number.
In step s 12, the first identifying code and the second identifying code are obtained, first identifying code indicates the checking number
With the door lock information corresponding relation for working as front door lock.
In this step, WIFI systems go to obtain first identifying code and second identifying code, wherein, first
Identifying code indicates the corresponding relation of the checking number in step S11 and the door lock information when front door lock.
In step s 13, according to first identifying code and second identifying code, it is determined whether open door lock.
In this step, WIFI systems judge whether the first identifying code is consistent with the second identifying code, then generate checking knot
Really, the door lock for determining whether to open current room is removed.For example, WIFI systems judge that the first identifying code is consistent with the second identifying code,
Then determine the door lock for opening current room;WIFI systems judge that the first identifying code is inconsistent with the second identifying code, it is determined that do not beat
Open the door lock of current room.
The checking number that the present embodiment is sent by receiving terminal by wireless network;Obtain the first identifying code and second to test
Card code, the first identifying code indicates checking number and the door lock information corresponding relation when front door lock;According to the first identifying code and second
Identifying code, it is determined whether open door lock.Authentication is carried out by wireless network so as to provide one kind, door lock checking is completed
Aptitude manner, the door lock for going to determine whether to open current room of intelligence;The method simple operation of offer, it is not easy to lose and into
This is relatively low, is easy to user to open door lock, improves the convenience of life.
On the basis of the embodiment shown in above-mentioned Fig. 1, Fig. 2 is a kind of intelligent door according to an exemplary embodiment
The flow chart of lock verification method embodiment two, as shown in Fig. 2 before step S11, also including:
In the step s 21, the binding information that receiving terminal is sent by wireless network, the binding information includes checking
Number;Checking number is carried out into corresponding storage with the door lock information of current room.
In this step, terminal sends binding information, in binding information by wireless network to the WIFI systems in room
Including checking number;So as to the checking number that WIFI systems receiving terminal is sent by wireless network, then WIFI systems will connect
The checking number for receiving carries out corresponding storage with the door lock information of current room.Step S12 is specifically included:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent out by wireless network
The terminal is given, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has
Number is verified with when the door lock information of front door lock corresponding at least one;
Receive the second identifying code that the terminal is sent by wireless network.
In this step, there is the data base for prestoring in WIFI systems, has and the door lock for working as front door lock in database purchase
The corresponding at least one checking number of information;WIFI systems can be according to the data base for prestoring, it is determined that the checking number for receiving
It is whether corresponding with the door lock information when front door lock;WIFI systems determine checking number with work as front door lock door lock information it is corresponding it
Afterwards, the first identifying code can be generated;Then, the first identifying code that WIFI systems will be generated, by wireless network terminal is sent to.
For example, WIFI systems receive the phone number that terminal is sent by wireless network;WIFI systems it is determined that
Phone number generates the first identifying code with when the door lock information of front door lock is corresponding after;WIFI systems by mobile base station, by the
One identifying code is sent to terminal, so as to the second identifying code of terminal receiving user's input.
Again for example, WIFI systems receive the wechat account that terminal is sent by wireless network;WIFI systems are true
Wechat account has been determined with after the door lock information of front door lock is corresponding, generated the first identifying code;WIFI systems pass through wechat server,
First identifying code is sent to into terminal, so as to the second identifying code of terminal receiving user's input;Now wechat server needs to protect
Card user, wechat account, corresponding client terminals have trusting relationship, i.e., every client terminals for logging in the wechat account
The user can be represented.
Then, terminal is received after the first identifying code of WIFI systems transmission, shows the first identifying code;So that
User is input in the terminal the second identifying code, and terminal can be with the second identifying code of receiving user's input.Then terminal is tested second
Card code is sent to WIFI systems.So as to the second identifying code that WIFI systems receiving terminal is sent by wireless network.
In the present embodiment two, the implementation of step S13 is:
Determine that first identifying code is consistent with second identifying code, then generate unlocking instruction;
The unlocking instruction is sent to into door lock, so that door lock is unlocked according to the unlocking instruction.
In this step, when WIFI systems determine that the first identifying code is consistent with the second identifying code, WIFI systems can be with
Unlocking instruction is generated, unlocking instruction just can be sent to WIFI systems the door lock of current room, so as to door lock refers to according to unlocking
Order is unlocked, so as to open the door of current room.
After step s 13, also include:
In step S22, door-lock opening status information is generated;The door-lock opening status information is sent to into the end
End, so that the terminal shows the door-lock opening status information, with the user for pointing out the terminal door lock is opened.
In this step, WIFI systems are it is determined that the first identifying code is consistent with the second identifying code, after opening room door lock,
Door-lock opening status information can also be generated, door-lock opening status information is sent to terminal by WIFI systems.So as to terminal can be with
The door-lock opening status information is shown, so as to terminal can open door lock with the user of prompt terminal.
For example, WIFI systems are it is determined that the first identifying code is consistent with the second identifying code, after opening room door lock, also
Door-lock opening status information can be generated, WIFI systems are sent to door-lock opening status information after terminal, terminal word with
And voice shows the door-lock opening status information.
After step s 13, also include:
In step S23, the door information that the door lock sends is received;If the door information does not open letter for door
Breath, then send information by wireless network to the terminal, and with the user for pointing out the terminal door is not switched on.
In this step, WIFI systems are it is determined that the first identifying code is consistent with the second identifying code, after opening room door lock,
Door information can be sent to WIFI systems by door lock, and WIFI systems receive the door information of door lock transmission, however, it is determined that door is believed
Cease for the non-opening imformation of door, then WIFI systems send information by wireless network to terminal, so as to the use of prompt terminal
Family is not switched on door, so as to pointing out user to be verified again or pointing out user to contact manager;If it is determined that door information is
Door opening imformation, then WIFI systems directly preserve the door opening imformation.
The binding information that the present embodiment is sent by receiving terminal by wireless network, binding information includes checking number
Code;Checking number is carried out into corresponding storage with the door lock information of current room;The checking that receiving terminal is sent by wireless network
Number;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and the door lock information pair when front door lock
Should be related to;According to the first identifying code and the second identifying code, it is determined whether open door lock, however, it is determined that the first identifying code and the second checking
Code is consistent, then generate unlocking instruction, unlocking instruction is sent to into door lock, so that door lock is unlocked according to unlocking instruction..So as to
Authentication is carried out by wireless network there is provided one kind, complete door lock checking aptitude manner, intelligence go determine whether beat
Open the door lock of current room;When it is determined that the first identifying code is consistent with the second identifying code, then generates unlocking instruction and go to be unlocked;
The method simple operation of offer, not easy to lose and cost is relatively low, is easy to user to open door lock, improves the convenience of life.
On the basis of the embodiment shown in above-mentioned Fig. 1 and Fig. 2, Fig. 3 is the one kind according to an exemplary embodiment
The flow chart of intelligent door lock verification method embodiment three, as shown in figure 3, in the present embodiment three, the implementation of step S13
For:
Determine that first identifying code is inconsistent with second identifying code, it is determined that do not open door lock.
In this step, when WIFI systems determine the first identifying code and inconsistent the second identifying code, WIFI systems are true
The fixed door lock for not opening current room.
After step s 13, also include:
In step s 24, authentication failed information is generated;The authentication failed information is sent to by wireless network described
Terminal, is verified again with the user for pointing out the terminal.
In this step, WIFI systems determine that WIFI systems can generate checking after the door lock for not opening current room
Failure information;Authentication failed information is sent to terminal by WIFI systems by wireless network, so as to terminal shows authentication failed letter
Breath so that the user of terminal notifying terminal is verified again, so as to open the door of current room.
Wherein, when user is verified again, each step of the present embodiment can be repeated, however it is necessary that arranging
Again the number of times verified, the number of times for example verified again is no more than 3 times.
The binding information that the present embodiment is sent by receiving terminal by wireless network, binding information includes checking number
Code;Checking number is carried out into corresponding storage with the door lock information of current room;The checking that receiving terminal is sent by wireless network
Number;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and the door lock information pair when front door lock
Should be related to;According to the first identifying code and the second identifying code, it is determined whether open door lock, however, it is determined that the first identifying code and the second checking
Code is inconsistent, it is determined that do not open door lock, then generates authentication failed information;Authentication failed information is sent by wireless network
To terminal, verified again with the user of prompt terminal.Authentication is carried out by wireless network so as to provide one kind, it is complete
Into the aptitude manner of door lock checking, the door lock for going to determine whether to open current room of intelligence;It is determined that the first identifying code and
When two identifying codes are inconsistent, do not unlocked, then point out user to be verified again;The method simple operation of offer, it is difficult
Lose and cost is relatively low, be easy to user to open door lock, improve the convenience of life.
Fig. 4 is the block diagram that a kind of intelligent door lock according to an exemplary embodiment verifies device embodiment four.Reference
Fig. 4, the device includes:
Receiver module 31, is configured to the checking number that receiving terminal is sent by wireless network;
Acquisition module 32, is configured to obtain the first identifying code and the second identifying code, and first identifying code indicates described
Checking number and the door lock information corresponding relation when front door lock;
Determining module 33, is configured to according to first identifying code and second identifying code, it is determined whether open door
Lock.
With regard to the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
The checking number that the present embodiment is sent by receiving terminal by wireless network;Obtain the first identifying code and second to test
Card code, the first identifying code indicates checking number and the door lock information corresponding relation when front door lock;According to the first identifying code and second
Identifying code, it is determined whether open door lock.Authentication is carried out by wireless network so as to provide one kind, door lock checking is completed
Aptitude manner, the door lock for going to determine whether to open current room of intelligence;The method simple operation of offer, it is not easy to lose and into
This is relatively low, is easy to user to open door lock, improves the convenience of life.
On the basis of the embodiment shown in above-mentioned Fig. 4, Fig. 5 is a kind of intelligent door according to an exemplary embodiment
The block diagram of lock checking device embodiment five.With reference to Fig. 5, the device also includes:
Binding module 41, is configured to the checking number sent by wireless network in the receiving terminal of the receiver module 31
Before, the binding information that receiving terminal is sent by wireless network, the binding information includes verifying number;Number will be verified
Corresponding storage is carried out with the door lock information of current room.
The acquisition module 32, is specifically configured to:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent out by wireless network
The terminal is given, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has
Number is verified with when the door lock information of front door lock corresponding at least one;
Receive the second identifying code that the terminal is sent by wireless network.
The determining module 33, including:
First determination sub-module 331, is configured to determine that first identifying code is consistent with second identifying code, then give birth to
Into unlocking instruction;
Sending submodule 332, is configured to for the unlocking instruction to be sent to door lock, so that door lock refers to according to the unlocking
Order is unlocked.
First prompting submodule 333, is configured to that the unlocking instruction is sent to into door in the sending submodule 332
Lock, so as to after door lock is unlocked according to the unlocking instruction, generate door-lock opening status information;By the door-lock opening shape
State information is sent to the terminal, so that the terminal shows the door-lock opening status information, to point out the use of the terminal
Family opens door lock.
Second prompting submodule 334, is configured to that the unlocking instruction is sent to into door in the sending submodule 332
Lock, so as to after door lock is unlocked according to the unlocking instruction, receive the door information that the door lock sends;If the door
Information is the non-opening imformation of door, then information is sent to the terminal by wireless network, to point out the use of the terminal
Family is not switched on door.
Or, the determining module 33, including:
Second determination sub-module 335, is configured to determine that first identifying code is inconsistent with second identifying code, then
It is determined that not opening door lock.
3rd prompting submodule 336, is configured to after second determination sub-module 335 determines and do not open door lock,
Generate authentication failed information;The authentication failed information is sent to into the terminal by wireless network, to point out the terminal
User verified again.
With regard to the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
The binding information that the present embodiment is sent by receiving terminal by wireless network, binding information includes checking number
Code;Checking number is carried out into corresponding storage with the door lock information of current room;The checking that receiving terminal is sent by wireless network
Number;The first identifying code and the second identifying code are obtained, the first identifying code indicates checking number and the door lock information pair when front door lock
Should be related to;According to the first identifying code and the second identifying code, it is determined whether open door lock, however, it is determined that the first identifying code and the second checking
Code is consistent, then generate unlocking instruction, unlocking instruction is sent to into door lock, so that door lock is unlocked according to unlocking instruction..So as to
Authentication is carried out by wireless network there is provided one kind, complete door lock checking aptitude manner, intelligence go determine whether beat
Open the door lock of current room;When it is determined that the first identifying code is consistent with the second identifying code, then generates unlocking instruction and go to be unlocked,
It is determined that when the first identifying code and inconsistent the second identifying code, do not unlocked, user is then pointed out to be verified again;There is provided
Method simple operation, not easy to lose and cost is relatively low, be easy to user open door lock, improve life convenience.
Fig. 6 is a kind of block diagram of the entity of the terminal embodiment six according to an exemplary embodiment.With reference to Fig. 6, should
Terminal can be implemented as:Processor 71, and be configured to store the memorizer 72 of processor executable;
Wherein, the processor 71 is configured to:The checking number that receiving terminal is sent by wireless network;Obtain first
Identifying code and the second identifying code, first identifying code indicates the checking number and closes when the door lock information of front door lock is corresponding
System;According to first identifying code and second identifying code, it is determined whether open door lock.
In the above-described embodiments, it should be appreciated that the processor can be CPU (English:Central
Processing Unit, referred to as:CPU), can also be other general processors, digital signal processor (English:Digital
Signal Processor, referred to as:DSP), special IC (English:Application Specific Integrated
Circuit, referred to as:ASIC) etc..General processor can be microprocessor or the processor can also be any conventional place
Reason device etc., and aforesaid memorizer can be read only memory (English:Read-only memory, abbreviation:ROM), deposit at random
Access to memory (English:Random access memory, referred to as:RAM), flash memory, hard disk or solid state hard disc.SIM
Card is also referred to as subscriber identification card, smart card, and digital mobile telephone must load onto this card and can use.I.e. in computer chip
On store the information of digital mobile phone client, the content such as the key of encryption and the telephone directory of user.With reference to of the invention real
The step of applying the method disclosed in example can be embodied directly in hardware processor and perform and complete, or with the hardware in processor and
Software module combination execution is completed.
With regard to the WIFI systems in above-described embodiment, wherein modules perform the concrete mode for operating and are somebody's turn to do relevant
It has been described in detail in the embodiment of method and apparatus, explanation will be not set forth in detail herein.
The checking number that the present embodiment is sent by receiving terminal by wireless network;Obtain the first identifying code and second to test
Card code, the first identifying code indicates checking number and the door lock information corresponding relation when front door lock;According to the first identifying code and second
Identifying code, it is determined whether open door lock.Authentication is carried out by wireless network so as to provide one kind, door lock checking is completed
Aptitude manner, the door lock for going to determine whether to open current room of intelligence;The method simple operation of offer, it is not easy to lose and into
This is relatively low, is easy to user to open door lock, improves the convenience of life.
Fig. 7 is a kind of block diagram of the terminal unit 800 according to an exemplary embodiment.For example, terminal unit 800 can
To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium is good for
Body equipment, personal digital assistant etc..
With reference to Fig. 7, terminal unit 800 can include following one or more assemblies:Process assembly 802, memorizer 804,
Power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814,
And communication component 816.
The integrated operation of the usual control terminal equipment 800 of process assembly 802, such as with display, call, data are led to
Letter, the associated operation of camera operation and record operation.Process assembly 802 can include one or more processors 820 to hold
Row instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more moulds
Block, the interaction being easy between process assembly 802 and other assemblies.For example, process assembly 802 can include multi-media module, with
Facilitate the interaction between multimedia groupware 808 and process assembly 802.
Memorizer 804 is configured to store various types of data to support the operation in terminal unit 800.These data
Example include on terminal unit 800 operate any application program or method instruction, contact data, telephone directory
Data, message, picture, video etc..Memorizer 804 can by any kind of volatibility or non-volatile memory device or it
Combination realize that such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable
Except programmable read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, soon
Flash memory, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal unit 800.Power supply module 806 can include power supply pipe
Reason system, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for terminal unit 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between the terminal unit 800 and user.
In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface
Plate, screen may be implemented as touch screen, to receive the input signal from user.Touch panel is touched including one or more
Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip
The border of action, but also the detection persistent period related to the touch or slide and pressure.In certain embodiments,
Multimedia groupware 808 includes a front-facing camera and/or post-positioned pick-up head.When terminal unit 800 is in operator scheme, such as clap
When taking the photograph pattern or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each is preposition
Photographic head and post-positioned pick-up head can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike
Wind (MIC), when terminal unit 800 is in operator scheme, such as call model, logging mode and speech recognition mode, mike
It is configured to receive external audio signal.The audio signal for being received can be further stored in memorizer 804 or via logical
Letter component 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, for exports audio signal.
, to provide interface between process assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, for providing the state of various aspects for terminal unit 800
Assessment.For example, sensor cluster 814 can detect the opening/closed mode of terminal unit 800, the relative localization of component, example
If the component is the display and keypad of terminal unit 800, sensor cluster 814 can with detection terminal equipment 800 or
The position change of 800 1 components of terminal unit, user is presence or absence of with what terminal unit 800 was contacted, terminal unit 800
The temperature change in orientation or acceleration/deceleration and terminal unit 800.Sensor cluster 814 can include proximity transducer, be configured
For the presence of object near detection when without any physical contact.Sensor cluster 814 can also include optical sensor,
Such as CMOS or ccd image sensor, for used in imaging applications.In certain embodiments, the sensor cluster 814 may be used also
With including acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal unit 800 and other equipment.
Terminal unit 800 can be accessed based on the wireless network of communication standard, such as WiFi, 2G or 3G, or combinations thereof.Show at one
In example property embodiment, communication component 816 receives broadcast singal or the broadcast from external broadcasting management system via broadcast channel
Relevant information.In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, short to promote
Cheng Tongxin.For example, RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, terminal unit 800 can be by one or more application specific integrated circuits (ASIC), number
Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realizations, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
Such as include the memorizer 804 of instruction, above-mentioned instruction can be performed to complete said method by the processor 820 of terminal unit 800.Example
Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the process of mobile terminal
When device is performed so that mobile terminal is able to carry out a kind of intelligent door lock verification method, and methods described includes:
The checking number that receiving terminal is sent by wireless network;
The first identifying code and the second identifying code are obtained, first identifying code indicates the checking number and works as front door lock
Door lock information corresponding relation;
According to first identifying code and second identifying code, it is determined whether open door lock.
Those skilled in the art will readily occur to its of the present invention after considering description and putting into practice invention disclosed herein
Its embodiment.The application is intended to any modification of the present invention, purposes or adaptations, these modifications, purposes or
Person's adaptations follow the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the precision architecture for being described above and being shown in the drawings is the invention is not limited in, and
And can without departing from the scope carry out various modifications and changes.The scope of the present invention is only limited by appended claim.
Claims (17)
1. a kind of intelligent door lock verification method, it is characterised in that include:
The checking number that receiving terminal is sent by wireless network;
The first identifying code and the second identifying code are obtained, first identifying code indicates the checking number and the door lock when front door lock
Information corresponding relation;
According to first identifying code and second identifying code, it is determined whether open door lock.
2. method according to claim 1, it is characterised in that the identifying code of the acquisition first and the second identifying code, including:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent to by wireless network
The terminal, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has and works as
The corresponding at least one checking number of door lock information of front door lock;
Receive the second identifying code that the terminal is sent by wireless network.
3. method according to claim 1, it is characterised in that described according to first identifying code and the described second checking
Code, it is determined whether open door lock, including:
Determine that first identifying code is consistent with second identifying code, then generate unlocking instruction;
The unlocking instruction is sent to into door lock, so that door lock is unlocked according to the unlocking instruction.
4. method according to claim 3, it is characterised in that the unlocking instruction is sent to into door lock described, so that
After door lock is unlocked according to the unlocking instruction, also include:
Generate door-lock opening status information;
The door-lock opening status information is sent to into the terminal, so that the terminal shows the door-lock opening state letter
Breath, with the user for pointing out the terminal door lock is opened.
5. method according to claim 3, it is characterised in that the unlocking instruction is sent to into door lock described, so that
After door lock is unlocked according to the unlocking instruction, also include:
Receive the door information that the door lock sends;
If the door information is the non-opening imformation of door, information is sent to the terminal by wireless network, to carry
The user for showing the terminal is not switched on door.
6. method according to claim 1, it is characterised in that described according to first identifying code and the described second checking
Code, it is determined whether open door lock, including:
Determine that first identifying code is inconsistent with second identifying code, it is determined that do not open door lock.
7. method according to claim 6, it is characterised in that after door lock is not opened in the determination, also include:
Generate authentication failed information;
The authentication failed information is sent to into the terminal by wireless network, is carried out again with the user for pointing out the terminal
Checking.
8. the method according to any one of claim 1-7, it is characterised in that sent out by wireless network in the receiving terminal
Before the checking number for sending, also include:
The binding information that receiving terminal is sent by wireless network, the binding information includes verifying number;
Checking number is carried out into corresponding storage with the door lock information of current room.
9. a kind of intelligent door lock verifies device, it is characterised in that include:
Receiver module, is configured to the checking number that receiving terminal is sent by wireless network;
Acquisition module, is configured to obtain the first identifying code and the second identifying code, and first identifying code indicates the checking number
Code and the door lock information corresponding relation when front door lock;
Determining module, is configured to according to first identifying code and second identifying code, it is determined whether open door lock.
10. device according to claim 9, it is characterised in that the acquisition module, is specifically configured to:
According to the data base for prestoring, first identifying code is generated, and first identifying code is sent to by wireless network
The terminal, so that the terminal receives and returns the second identifying code of user input, wherein, the database purchase has and works as
The corresponding at least one checking number of door lock information of front door lock;
Receive the second identifying code that the terminal is sent by wireless network.
11. devices according to claim 9, it is characterised in that the determining module, including:
First determination sub-module, is configured to determine that first identifying code is consistent with second identifying code, then generate and unlock
Instruction;
Sending submodule, is configured to for the unlocking instruction to be sent to door lock, so that door lock is carried out according to the unlocking instruction
Unlock.
12. devices according to claim 11, it is characterised in that the determining module, also include:
First prompting submodule, is configured to that the unlocking instruction is sent to into door lock in the sending submodule, so that door lock
After being unlocked according to the unlocking instruction, door-lock opening status information is generated;The door-lock opening status information is sent
To the terminal, so that the terminal shows the door-lock opening status information, door is opened with the user for pointing out the terminal
Lock.
13. devices according to claim 11, it is characterised in that the determining module, also include:
Second prompting submodule, is configured to that the unlocking instruction is sent to into door lock in the sending submodule, so that door lock
After being unlocked according to the unlocking instruction, the door information that the door lock sends is received;If the door information is door
Non- opening imformation, then send information by wireless network to the terminal, and with the user for pointing out the terminal room is not switched on
Door.
14. devices according to claim 9, it is characterised in that the determining module, including:
Second determination sub-module, is configured to determine that first identifying code is inconsistent with second identifying code, it is determined that no
Open door lock.
15. devices according to claim 14, it is characterised in that the determining module, also include:
3rd prompting submodule, is configured to after door lock is not opened in second determination sub-module determination, generates checking and loses
Lose information;The authentication failed information is sent to into the terminal by wireless network, is carried out with the user for pointing out the terminal
Again verify.
16. devices according to any one of claim 9-15, it is characterised in that described device, also include:
Binding module, was configured to before the checking number that the receiver module receiving terminal is sent by wireless network, connect
The binding information that terminal is sent by wireless network is received, the binding information includes verifying number;Will checking number with it is current
The door lock information in room carries out correspondence storage.
17. a kind of terminals, it is characterised in that include:
Processor, and for storing the memorizer of processor executable;
Wherein, the processor is configured to:The checking number that receiving terminal is sent by wireless network;Obtain the first identifying code
With the second identifying code, the first identifying code instruction is described to verify number and the door lock information corresponding relation when front door lock;According to
First identifying code and second identifying code, it is determined whether open door lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611089583.5A CN106600768A (en) | 2016-12-01 | 2016-12-01 | Intelligent door lock authentication method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611089583.5A CN106600768A (en) | 2016-12-01 | 2016-12-01 | Intelligent door lock authentication method, device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106600768A true CN106600768A (en) | 2017-04-26 |
Family
ID=58594634
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611089583.5A Pending CN106600768A (en) | 2016-12-01 | 2016-12-01 | Intelligent door lock authentication method, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106600768A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107978048A (en) * | 2017-12-07 | 2018-05-01 | 潘淑斐 | Multifunctional fingerprint identifies door lock |
CN109367988A (en) * | 2018-09-26 | 2019-02-22 | 陕西昱鑫科技发展有限责任公司 | A kind of material evidence transport box and its application method being able to carry out information collection and certification |
WO2019095728A1 (en) * | 2017-11-16 | 2019-05-23 | 杭州海康威视数字技术股份有限公司 | Information prompting method, apparatus, and system, and intelligent electronic door lock |
CN110599639A (en) * | 2019-08-13 | 2019-12-20 | 深圳市天彦通信股份有限公司 | Identity verification method and related product |
CN111080853A (en) * | 2019-12-20 | 2020-04-28 | 珠海格力电器股份有限公司 | Intelligent door lock system, unlocking method, device, equipment and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1408188A1 (en) * | 2002-10-09 | 2004-04-14 | Nissan Motor Company, Limited | Door lock/unlock system |
CN102262793A (en) * | 2010-05-26 | 2011-11-30 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
CN103871136A (en) * | 2014-03-11 | 2014-06-18 | 深圳市九洲电器有限公司 | Set top box and access control method and system based on same |
CN203905651U (en) * | 2014-04-30 | 2014-10-29 | 常州市思索数码科技有限公司 | Intelligent electronic lock |
CN105184898A (en) * | 2015-07-16 | 2015-12-23 | 青岛文创科技有限公司 | Multifunctional gating system |
-
2016
- 2016-12-01 CN CN201611089583.5A patent/CN106600768A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1408188A1 (en) * | 2002-10-09 | 2004-04-14 | Nissan Motor Company, Limited | Door lock/unlock system |
CN102262793A (en) * | 2010-05-26 | 2011-11-30 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
CN103871136A (en) * | 2014-03-11 | 2014-06-18 | 深圳市九洲电器有限公司 | Set top box and access control method and system based on same |
CN203905651U (en) * | 2014-04-30 | 2014-10-29 | 常州市思索数码科技有限公司 | Intelligent electronic lock |
CN105184898A (en) * | 2015-07-16 | 2015-12-23 | 青岛文创科技有限公司 | Multifunctional gating system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019095728A1 (en) * | 2017-11-16 | 2019-05-23 | 杭州海康威视数字技术股份有限公司 | Information prompting method, apparatus, and system, and intelligent electronic door lock |
US11417158B2 (en) | 2017-11-16 | 2022-08-16 | Hangzhou Hikvision Digital Technology Co., Ltd. | Information prompting method, apparatus, and system, and intelligent electronic door lock |
CN107978048A (en) * | 2017-12-07 | 2018-05-01 | 潘淑斐 | Multifunctional fingerprint identifies door lock |
CN109367988A (en) * | 2018-09-26 | 2019-02-22 | 陕西昱鑫科技发展有限责任公司 | A kind of material evidence transport box and its application method being able to carry out information collection and certification |
CN110599639A (en) * | 2019-08-13 | 2019-12-20 | 深圳市天彦通信股份有限公司 | Identity verification method and related product |
CN111080853A (en) * | 2019-12-20 | 2020-04-28 | 珠海格力电器股份有限公司 | Intelligent door lock system, unlocking method, device, equipment and medium |
CN111080853B (en) * | 2019-12-20 | 2021-02-05 | 珠海格力电器股份有限公司 | Intelligent door lock system, unlocking method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104091376B (en) | Intelligent lock control method and apparatus thereof | |
CN104992091A (en) | Method and apparatus for accessing terminal end | |
CN106600768A (en) | Intelligent door lock authentication method, device and terminal | |
CN106503513A (en) | Method for recognizing sound-groove and device | |
CN105631254B (en) | Unlocking method and tripper | |
CN105791309A (en) | Method, device and system for executing business processing | |
CN106485127A (en) | The control method of electronic equipment, device, electronic equipment and system | |
CN106023370A (en) | Unlocking method and device for NFC equipment | |
CN108022349A (en) | Information input method, equipment, smart lock and storage medium | |
CN107767133A (en) | Virtual card opens chucking method, apparatus and system, storage medium | |
CN105871913A (en) | Identity authentication method and system | |
CN106102061A (en) | Method for connecting network and device | |
CN106446653A (en) | Application authority management method and device and electronic equipment | |
CN107733872A (en) | Information Method of printing and device | |
CN106060027A (en) | Methods, devices, equipment and systems for verification based on verification codes | |
CN107622189A (en) | Optimize the method and apparatus of unlocked by fingerprint | |
CN109801065A (en) | Virtual card opens chucking method, apparatus and system, storage medium | |
CN108476379A (en) | Information recording method and information record carrier | |
CN104951678B (en) | Unlocking method and a device | |
CN106535190A (en) | Network connection method and apparatus | |
CN106775834A (en) | Brush machine verification method and device | |
CN106658467A (en) | Virtual SIM card management method and device | |
CN106780868A (en) | Unlock control method, device and the automobile charging gun of automobile charging gun | |
CN105069344A (en) | Mobile terminal locking method and apparatus | |
CN106022160A (en) | Method and apparatuses for deleting user data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |