CN108765649A - Electronic lock control method and device and system - Google Patents
Electronic lock control method and device and system Download PDFInfo
- Publication number
- CN108765649A CN108765649A CN201810458578.XA CN201810458578A CN108765649A CN 108765649 A CN108765649 A CN 108765649A CN 201810458578 A CN201810458578 A CN 201810458578A CN 108765649 A CN108765649 A CN 108765649A
- Authority
- CN
- China
- Prior art keywords
- password
- client
- door lock
- user
- tenant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000009739 binding Methods 0.000 claims abstract description 39
- 230000027455 binding Effects 0.000 claims abstract description 39
- 230000008859 change Effects 0.000 claims description 14
- 238000012905 input function Methods 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 6
- 230000000694 effects Effects 0.000 abstract description 3
- 230000004044 response Effects 0.000 description 24
- 238000007726 management method Methods 0.000 description 16
- 238000004891 communication Methods 0.000 description 9
- 238000013475 authorization Methods 0.000 description 3
- 230000001535 kindling effect Effects 0.000 description 3
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003362 replicative effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention relates to door lock control fields, especially electronic lock control method and device and system.It is characterized in that:Door lock ID databases, user's id databases are set in server, door lock identifies Connection Service device with ID, client identifies Connection Service device with id, door lock user id1 is sent out by the client id1 using client id1 as mark binding or the door lock ID1 for authorizing it to control or the instruction of trigger gate lock control controls door lock D1.Advantageous effect is:It solves house-owner and has while highest permission door lock to only have tenant in the term of validity of renting a house there is unlocking authority.
Description
Technical field
The present invention relates to door lock control fields, especially electronic lock control method and device and system.
Background technology
The mode of intelligent cipher lock unlocking at present has password unlocking, IC card to unlock, fingerprint is unlocked, cell phone application remote unlocking.
For house to let user, one side house-owner requires to possess highest permission to door lock, and another aspect tenant does not wish again
Hope the unlocking authority possessed by house-owner in the term of validity of renting a house.
Invention content
Have to door lock present invention aim to address house-owner and only has tenant while highest permission in the term of validity of renting a house
With unlocking authority.
Door lock of the present invention can be the combination locked with existing password.
Include at present server, client, door lock using the system of cell phone application remote unlocking, server foundation has door lock
ID databases, door lock possess unique ID, and client after ID and password login server to control door lock.Or system includes client
End, door lock, door lock possess unique ID(MAC Address), the laggard introduction lock control of client-side search equipment in the same WiFi environment
System.
This case uses cell phone application(Applications client, this case claim client)The system of remote unlocking includes server, client
End, door lock, client possess unique id by registration, and door lock possesses unique ID, and client identifies Connection Service device, door lock with id
Connection Service device is identified with ID, certain id and certain ID bind or authorize(User's list is added)After establish control planning, intelligent door lock
Further include communication protocol unit, control protocol unit, controller, keyboard, executing agency etc., communications protocol is assisted using TCP or UDP
View, control protocol unit includes control routine, and for being arranged and exporting switching value, switching value drives executing agency to unlock.
Here id identifies client, identifies door lock with ID, door lock user can be by binding or authorizing id to be used as door lock control
Permission processed.
The technical scheme is that:
A kind of electronic lock control method or system, including server, client, door lock, it is characterized in that:
Door lock ID databases, user's id databases are set in server, and door lock identifies Connection Service device with ID, and client is marked with id
Know Connection Service device, door lock user id1 is using client id1 as mark binding or the door lock ID1 for authorizing it to control, by the visitor
Family end id1 is sent out or trigger gate lock control instruction control door lock D1.
The electronic lock control method or system, it is characterized in that:Management module is set in server, have the right user with
Door lock permission can be arranged after carrying out verification login service device in door lock ID marks, and door lock permission includes addition, deletes other id use
Family.Further comprise being set using time limit or use time.
The electronic lock control method, characterized in that including step:
1. house-owner downloads cell phone application client and is registered as user id1;
2. tenant downloads cell phone application client and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that at least one tenant user id2 is door lock ID1, authorize tenant user logical
Cross client id2 control door locks ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users,
Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1
It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password
1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking.
6. house-owner has the right to delete any mandate tenant user id by client id1, other mandate tenant users are not by shadow
It rings.
7. house-owner has the right to delete all mandate tenant user id by client id1, all mandate tenant user id are deleted
Password 1 fails afterwards, and the button for restoring client operation interface is unlocked.
Further, step 5. in,
Conventional cipher lock is both provided with unlocking keyboard at present, and the present invention provides method and the use of a kind of password setting:ID1 door locks
On be provided with keyboard, step 5. in be arranged password 1 come into force on the keyboard of ID1 door locks, user is directly with password 1 in ID1
It operates and unlocks on the keyboard of door lock, password 1 is in ID1 door locks after house-owner deletes any mandate tenant user id by client id1
Keyboard on fail, the password 1 on client operation interface still effectively, i.e., lock body keyboard permission deactivate, which currently uses
Family all must input password 1 at its client operation interface and execute unlocking;If you need to the keyboard password input function for restoring ID1 door locks
It must be newly set password 2 and enable lock body keyboard permission.
Or:
1. house-owner downloads cell phone application client and is registered as user id1;
2. tenant downloads cell phone application client and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that a tenant user id2 is door lock ID1, tenant user is authorized to pass through visitor
Family end id2 controls door lock ID1, and it is door lock ID1 to authorize tenant user to add at least one tenant user id3 by client id2
Mandate tenant user, authorize tenant user to pass through client id3 and control door lock ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users,
Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1
It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password
1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking.
6. tenant user is authorized to have the right to delete other mandate tenant user id, remaining mandate tenant by client id2
User is unaffected.
7. house-owner has the right to delete by client id1 authorizes tenant user id2, deletes after authorizing tenant user id2 and own
Tenant user id is authorized to delete, while password 1 fails, the button for restoring client operation interface is unlocked.
Further, step 5. in,
Conventional cipher lock is both provided with unlocking keyboard at present, and the present invention provides method and the use of a kind of password setting:ID1 door locks
On be provided with keyboard, step 5. in be arranged password 1 come into force on the keyboard of ID1 door locks, user is directly with password 1 in ID1
It operates and unlocks on the keyboard of door lock, after authorizing tenant user id2 to delete any other mandate tenant user id by client id2
Password 1 fails on the keyboard of ID1 door locks, i.e., lock body keyboard permission deactivates, and the password 1 on client operation interface still has
Effect, door lock active user must input password 1 at its client operation interface and execute unlocking;If you need to restore ID1 door locks
Keyboard password input function must be newly set password 2 and enable lock body keyboard permission.
Or:
1. house-owner downloads cell phone application client and is registered as user id1;
2. tenant downloads cell phone application client and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. the mandate tenant user that client id1 addition tenant users id2 is door lock ID1, authorizes tenant user to pass through client
Id2 controls door lock ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close
All door lock users must input password 1 and execute unlocking after code 1(Password and client operation circle are inputted including door lock keyboard
Face inputs password);
6. house-owner has the right to delete by client id1 authorizes tenant user id2, while password 1 fails, and restores client operation circle
The button in face is unlocked.
The electronic lock control method or system, it is characterized in that:The password 1 can be by operated mobile fingerprint
It substitutes(Utilize the fingerprint sensor of mobile phone).
The electronic lock control method or system, it is characterized in that:The password 1 can be by operated mobile phone touch
Gesture substitutes(Utilize the touch screen sensor of mobile phone).
The electronic lock control method or system, it is characterized in that:The APP can bind wechat or QQ or payment
It is precious.
Further, it registers as one kind and controlling embodiment, door lock ID1 Quick Response Codes are pasted on corresponding door, by visitor
Family end id1 scanning triggering unlocking instructions:Server obtains ID1 identification informations of the client id1 by scanning recognition, and server exists
Id1 is searched in door lock ID1 user lists, if there is being then validated user, unlocking instruction is sent out from server to ID1 door locks.
Further, the Quick Response Code can be substituted by one-dimension code or other graphic codes substitute, or random Quick Response Code substitutes,
Or numerical digit substitutes.
Further, the Quick Response Code is anti-fake two-dimension code(Prevent Quick Response Code from replicating in embodiment of registering).
Chinese patent announces CN104376339B- a kind of graphic code scan method and its graphic code knot with authentication function
Structure discloses a kind of anti-fake two-dimension code.
A kind of electronic lock control method or system, it is characterized in that:
System includes server, wechat client, management client, door lock;
Housekeeping module, including door lock ID databases, authorization module are set in server, by management client to housekeeping
Module is operated, and realizes hotel occupancy room door lock management;
Door lock ID is posted in quick response code form on corresponding door;
Its step includes:
(1)Wechat client id1 user checks in as tenant id1, is set to tenant id1 typings and permission by management client
It sets, typing is that the user list of certain door lock is added, and door lock ID1 is licensed to id1 by server;
(2)Wechat client id1 scanning door ID Quick Response Codes simultaneously upload id information to server, and server is inquired by id information
The mandate list of door lock ID1 simultaneously executes unlocking according to mandate list;
(3)Server sends out unlocking instruction to ID1 door locks, executes unlocking operation by door lock controller, door lock ID1 returns execute letter
Breath is to server and is supplied to wechat client id1;
(4)Tenant id1 check out after by management client ID1 authorize list in delete id1;Or time limit start-stop expire after by taking
Business device deletes id1 in ID1 authorizes list.
Further, wechat client id1 reports door id information while reporting geographical location information, and server has certification
The step of geographical location.
Further, implement step of booking rooms automatically:
A. service platform of booking rooms is provided, tenant logs in the service platform with wechat client id1;
B. tenant submits order and pays success;
ID1 door locks are licensed to wechat client id1 by service platform of C. booking rooms notice server, i.e., ID1 is added in id1 authorizes name
It is single, while time limit start-stop permission is set;
D. tenant holds the ID1 Quick Response Codes of the corresponding door of wechat client id1 scanning ID1 door locks and can unlock;
E. after time limit start-stop permission expires id1 is deleted in ID1 authorizes list by server.
A kind of electronic door lock device, it is characterized in that:Including,
Communication module is arranged in door lock end, for connecting network;
Communication protocol unit, control protocol unit, control routine unit, I/O interfaces, door lock controller, door lock is arranged in door lock end
Controller drives gate lock actuator open and close lock tongue;
Door lock end is provided with ID marks, has corresponding ID databases, door lock to identify Connection Service device, server with ID in server
In be provided with user's id databases, door lock ID1 includes at least an id1 user, i.e. ID1 at least establishes an id1 relationship, id1
User is by controlling door lock ID1 after client id1 login service devices;
Door lock end is provided with lock body keyboard.
The beneficial effects of the invention are as follows:Solving house-owner has while highest permission in the term of validity of renting a house only door lock
Tenant has unlocking authority.
Description of the drawings
Fig. 1 is principle of the invention flow chart.
Fig. 2 is door lock ID1 operation interfaces.
Relational graphs of the Fig. 3 between database of the present invention.
Fig. 4 is system applicating flow chart in guest room of the present invention.
Fig. 5 provides a kind of door lock binding element schematic diagram.
Fig. 6 is the basic configuration figure at door lock end of the present invention.
Specific implementation mode
Present invention will be further explained below with reference to the attached drawings and examples.
Cell phone application, that is, client.
Fig. 1 is principle of the invention flow chart, and system includes server, client, door lock, and door lock ID numbers are arranged in server
According to library, user's id databases, door lock identifies Connection Service device with ID, and client identifies Connection Service device, door lock user id1 with id
Using client id1 as mark binding or the door lock ID1 for authorizing it to control, sent out by the client id1 or trigger gate lock control
System instruction control door lock D1.
ID1 door locks include existing intelligent door lock function, unlocking mode includes password unlocking, IC card is unlocked, fingerprint is unlocked,
Cell phone application remote unlocking, cell phone application remote unlocking further comprise that button unlocks and in client on client operation interface
Password unlocking is inputted in operation interface, and is unlocked using mobile phone fingerprint sensor licencing key.
ID1 door lock Connection Service devices and and server progress data exchange.
House-owner carries out user's registration on the server by client, it is assumed that is registered as user id1, registration can bind hand
Machine number.
Tenant carries out user's registration on the server by client, it is assumed that is registered as user id2, registration can bind hand
Machine number.
1 door lock of binding ID is applied for client id1 by house-owner, while ID1 door locks provide corresponding bindings, binding side
Formula includes existing all secure binding methods, and bindings carry out binding validatation by server, serviced after binding validatation success
Device binds id1 and ID1, and user id1 can carry out door lock ID1 by the door open button of client id1 operation interfaces at this time
Operation(Referring to Fig. 2 door lock ID1 operation interfaces), sent out from server to ID1 door locks after the operation of server acquisition user id1
Id1 operational orders, door lock ID1 receive the id1 operational order back door locks ID1 that server transmits and execute id1 user instructions, meanwhile,
It will be supplied to client after door lock work state information backhaul service device.
House-owner's client id1 has bound door lock ID1 and has limited the use of family as the highest weight of ID1 at this time, binding success it is initial
State is unlocked for client operation interface button, and unlocking mode and setting password can be arranged in the client id1 of highest permission, open
Lock mode includes the unlocking of client operation interface button, the unlocking of client operation interface password unlocking, door lock keyboard password, IC card
Unlock etc., it is tenant that client id1, which can add id2,(Addition manner includes:Input No. id or unique number or phone number,
Or scan the two-dimensional code addition), client id2 obtains client after server id2 is added to ID1 user lists, adds successfully
Operation interface button is unlocked and permission is arranged in password(House-owner ensures that ID1 door locks are binding original state), user id2 sends out operation
Id2 operational orders are sent to door lock ID1 and execute id2 user instructions by instruction to server, server, meanwhile, door lock is worked
It is supplied to client after status information backhaul service device.
Further, password 1 is arranged by client id2 operation interfaces in tenant, server receive client id2 setting make it is close
Code 1 comes into force, while password 1, which is sent to ID1 door locks, makes lock body keyboard password 1 come into force, at this point, input lock body keyboard password 1 can
To unlock, any APP clients also must input password 1 at its client operation interface and could unlock.
If the lessee room phase expires, id2 is deleted in ID1 user lists by server automatically, while password 1 fails, it is extensive
Multiple client operation interface button is unlocked, or deletes id2 by house-owner's client id1, is deleted in ID1 user lists by server
Id2, while password 1 fails, and restores client operation interface button and unlocks.
Certainly, administrative login interface can be set in server, and the user that has the right carries out verification with door lock ID marks and logs in clothes
Door lock permission can be set after business device, and door lock permission includes addition, deletes other id users.Further comprise being set using the time limit
Or use time.
The control authority of door lock ID1 can be shared with other clients by user id1 by way of sharing, i.e. the door lock
As the client good friend shared, it is of course possible to which deletion is shared, and Fig. 2 is door lock ID1 operation interfaces, and door lock ID1 user is such as
Id2, id3 etc., and permission can be set, such as geographical location permission(Server has the step of verification client geographical location, by ground
Managing position restriction must scene unlocking), time limit limitation, password authentification limitation etc., and provide deletion function.
Further, it registers as one kind and controlling embodiment, door lock ID1 Quick Response Codes are pasted on corresponding door, by visitor
Family end id1 scanning triggering door open commands:Server obtains ID1 identification informations of the client id1 by scanning recognition, server root
According to ID1 identification informations unlocking instruction is sent out to ID1 door locks.
Further, the door lock password being arranged on mobile phone can be substituted by fingerprint, directly be referred on mobile phone by user
Line verification is unlocked.
Fig. 2 is door lock ID1 operation interfaces, including door lock ID1 unlocking buttons, my door lock include door lock ID1, door lock ID2,
Door lock ID3 ..., the user of ID1 door locks includes authorized user(Tenant)Id2, id3 etc., at the same can carry out priority assignation and
It deletes.Registration button is registered for house-owner or tenant, and scanning can be used for bindings or door lock control of registering.Further, may be used
To load more complicated control keyboard 201, controlled by control protocol, control protocol includes control routine, control routine
Carry out door lock control and setting, such as further verification password, door lock priority assignation.Operation interface provides actions menu, operation
Menu includes setting menu, function menu etc..The customization control keyboard that each door lock manufacturer can further be loaded, by controlling
Code definition control keyboard processed.
Relational graphs of the Fig. 3 between database of the present invention, 301 be user's id databases(Namely client id data
Library), including mark id such as id1, id2, id3 ..., each id are also associated with one unique number, as wechat system WeChat ID,
Associated phone number, associate device fingerprint etc..302 be door lock ID databases, including mark ID1, ID2, ID3 ..., further
Can be associated with unique encodings k1, k2, k3 ..., which can be unique sequence numbers, can be uniquely determined by being associated with ID
Some specific door lock, i.e. ID are plain code, and k values are private mark, ensure the safety of door lock ID identity, further, each ID is also associated with
One unique door lock MAC Address, door lock identify Connection Service device with ID.303 be user's id1 door lock lists, as ID1, ID2,
ID3 ... by binding or authorizing(That is opening relationships)As the door lock list of id1 user, similarly, 304 be the door of user id2
Lock list.Certainly, by binding or authorizing, some ID door lock is also formed simultaneously one or more id user lists, i.e., ties up each other
Fixed or mandate relationship(Similar to friend relation), 305 be door lock ID1 user lists in figure, includes necessarily id1,306 be door lock
ID4 user lists include necessarily id2.
For sharing operation, the group of wechat is similar to by way of binding or authorizing opening relationships, binding person is door lock
Highest permission, similar group master can authorize or delete other door lock users.
Door lock includes communication module, and communication module includes wired or wireless, and WIFI network is typically provided with password at present, can
To input password or sound wave connection input password or the direct-connected input passwords of WIFI using first bluetooth connection.
In view of binding safety, one can be arranged and be associated with IDD correspondingly with ID, simultaneously using IDD as binding logo
It is posted on lock body with Quick Response Code, IDD Quick Response Codes is taken off independent preservation after user's binding success.In this way for house to let
Favorably, ID lists can be added in the id of tenant by house-owner(And it can delete at any time), and tenant can not implement to bind again.
For rental housing, electronic lock control method of the present invention, including step:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that at least one tenant user id2 is door lock ID1, authorize tenant user logical
Cross client id2 control door locks ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users,
Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1
It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password
1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking.
(Since house-owner does not know password 1, so can not unlock, it, can be by all rooms if password is arranged in any tenant
Visitor knows without telling house-owner).
Purpose using voting mechanism is to ensure the equity equality of all tenants.
6. house-owner has the right to delete any mandate tenant user id by client id1, other mandate tenant users are not by shadow
It rings.
7. house-owner has the right to delete all mandate tenant user id by client id1, all mandate tenant user id are deleted
Password 1 fails afterwards, and the button for restoring client operation interface is unlocked.
Further, step 5. in,
Conventional cipher lock is both provided with unlocking keyboard at present, and the present invention provides method and the use of a kind of password setting, by house-owner
Or tenant enables permission in its client operation interface setting lock body keyboard:Be provided with keyboard on ID1 door locks, step 5. in set
The password 1 set comes into force on the keyboard of ID1 door locks, and user directly operates unlocking, house-owner with password 1 on the keyboard of ID1 door locks
Password 1 fails on the keyboard of ID1 door locks after deleting any mandate tenant user id by client id1, i.e., lock body keyboard is weighed
Limit deactivates, and still effectively, door lock active user must be at its client operation interface for the password 1 on client operation interface
Input password 1 executes unlocking;Keyboard password input function if you need to restore ID1 door locks must be newly set password 2 and enable lock
Body keyboard permission.
Or:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that a tenant user id2 is door lock ID1, tenant user is authorized to pass through visitor
Family end id2 controls door lock ID1, and it is door lock ID1 to authorize tenant user to add at least one tenant user id3 by client id2
Mandate tenant user, authorize tenant user to pass through client id3 and control door lock ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users,
Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1
It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password
1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking.
(Since house-owner does not know password 1, so can not unlock, it, can be by all rooms if password is arranged in any tenant
Visitor knows without telling house-owner)
6. tenant user is authorized to have the right to delete other mandate tenant user id, remaining mandate tenant user by client id2
It is unaffected.
7. house-owner has the right to delete by client id1 authorizes tenant user id2, deletes after authorizing tenant user id2 and own
Tenant user id is authorized to delete, while password 1 fails, the button for restoring client operation interface is unlocked.
Further, step 5. in,
Conventional cipher lock is both provided with unlocking keyboard at present, and the present invention provides method and the use of a kind of password setting, by house-owner
Or tenant enables permission in its client operation interface setting lock body keyboard:Be provided with keyboard on ID1 door locks, step 5. in set
The password 1 set comes into force on the keyboard of ID1 door locks, and user directly operates unlocking with password 1 on the keyboard of ID1 door locks, authorizes
Password 1 loses on the keyboard of ID1 door locks after tenant user id2 deletes any other mandate tenant user id by client id2
Effect, i.e. lock body keyboard permission deactivate, and still effectively, door lock active user must be for password 1 on client operation interface
Its client operation interface input password 1 executes unlocking;Keyboard password input function if you need to restore ID1 door locks must be set again
It sets password 2 and lock body keyboard enabling is set.
If tenant forgets Password 1, step can be executed 7. re-establish afterwards password setting is carried out by tenant again after relationship.
Or:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. the mandate tenant user that client id1 addition tenant users id2 is door lock ID1, authorizes tenant user to pass through client
Id2 controls door lock ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close
All door lock users after code 1(Including house-owner)Password 1 must all be inputted and execute unlocking(Password and visitor are inputted including door lock keyboard
Family end operation interface inputs password);
6. house-owner has the right to delete by client id1 authorizes tenant user id2, while password 1 fails, and restores client operation circle
The button in face is unlocked.
The electronic lock control method or system, it is characterized in that:The password 1 can be by operated mobile fingerprint
It substitutes(Utilize the fingerprint sensor of mobile phone).
The electronic lock control method or system, it is characterized in that:The APP can bind wechat or QQ or payment
It is precious.
Further, it registers as one kind and controlling embodiment, door lock ID1 Quick Response Codes are pasted on corresponding door, by visitor
Family end id1 scanning triggering unlocking instructions:Server obtains ID1 identification informations of the client id1 by scanning recognition, and server exists
Id1 is searched in door lock ID1 user lists, if there is being then validated user, unlocking instruction is sent out from server to ID1 door locks.
Further, the Quick Response Code can be substituted by one-dimension code or other graphic codes substitute, or random Quick Response Code substitutes,
Or numerical digit substitutes.
Further, the Quick Response Code is anti-fake two-dimension code(Prevent Quick Response Code from replicating in embodiment of registering).
Chinese patent announces CN104376339B- a kind of graphic code scan method and its graphic code knot with authentication function
Structure discloses a kind of anti-fake two-dimension code.
In the present invention, binding and the essence authorized are the sheet relations for establishing ID and id, and binding is recognized using both sides
Card pattern(ID and id both sides establish list), authorize allows certification using folk prescription(Id lists are established by ID).
API external linkages control program may be used in the present invention, in addition can also use small routine, be controlled by small routine
Program chains processed.
The present invention can be associated with wechat mark or authorize wechat mark, directly provide payment function by wechat system, pay
A system, which is each operated in, with unlocking is seamlessly connected completion.
Fig. 4 is system applicating flow chart in guest room of the present invention, and system includes server of the present invention, wechat server, wechat visitor
Family end, management client, door lock;
Wechat server and server of the present invention carry out data exchange;
Housekeeping module, including door lock ID databases, authorization module are set in server, by management client to housekeeping
Module is operated, and realizes hotel occupancy room door lock management;
Door lock ID is posted in quick response code form on corresponding door.
Its step includes:
(1)Wechat client id1 user checks in as tenant id1, is set to tenant id1 typings and permission by management client
It sets, typing is that the user list of certain door lock is added, access permission, elevator permission other than priority assignation such as time limit start-stop, door,
Parking lot bayonet permission, entertainment body-building access permission etc., door lock ID1 is licensed to id1 by server;
Typing refers to typing unique mark or scanning unique mark Quick Response Code, such as wechat, can with typing WeChat ID or cell-phone number,
Or scanning wechat Quick Response Code.
(2)Wechat client id1 scanning door ID Quick Response Codes simultaneously upload id information to server, and server passes through id information
Inquiry(Position or determine ID1)The mandate list of door lock ID1 simultaneously executes unlocking according to mandate list;
It may further carry out id1 tenant's certification, id1 purview certifications, geographic position authentication(In view of Quick Response Code can replicate,
It is screened with geographical location).
(3)Server sends out unlocking instruction to ID1 door locks, executes unlocking operation by door lock controller, door lock ID1 returns are held
Row information is to server and is supplied to wechat client id1.
(4)Tenant id1 check out after by management client ID1 authorize list in delete id1;Or after time limit start-stop expires
By server id1 is deleted in ID1 authorizes list.
Further, wechat client id1 reports door id information while reporting geographical location information, and server has certification
The step of geographical location.
Server can record to form daily record for management client inquiry with dual lock, it is of course possible to by the wechat id of waiter
Typing its management guest room and authorize its manage multiple ID door locks.
When door-locking system of the present invention is applied to hotel management, the user of door lock binds passes through authorization module by management client
It realizes, the relationship of ID and id are established in binding or mandate, so it is exactly that the id marks of wechat client are added to certain door to authorize
In the relationship list for locking ID, i.e. user list is managed by management client, including opening relationships, deletes relationship.
Further, implement step of booking rooms automatically:
A. service platform of booking rooms is provided, tenant logs in the service platform with wechat client id1;
B. tenant submits order and pays success;
ID1 door locks are licensed to wechat client id1 by service platform of C. booking rooms notice server, i.e., ID1 is added in id1 authorizes name
It is single, while time limit start-stop permission is set;
D. tenant holds the ID1 Quick Response Codes of the corresponding door of wechat client id1 scanning ID1 door locks and can unlock;
E. after time limit start-stop permission expires id1 is deleted in ID1 authorizes list by server.
Fig. 5 provides a kind of door lock binding element schematic diagram, and 501 be the lock body of door lock, and 502 be door lock ID Quick Response Codes and ID
Number, 503 is bind or authorize trigger button, bind in order to bind safety, 503 or authorize trigger button can be by a key
It substitutes, usually with lock separately keeping, when binding, 503 buttons of triggering enter binding procedure, are uploaded and are taken by client scan Quick Response Code
Business device passes through server authentication and implements to bind.Certainly, binding of the invention refers to all binding methods.
Fig. 6 is the basic configuration figure at door lock end of the present invention, and communication module is arranged in door lock end, for connecting network;Door lock end
Communication protocol unit, control protocol unit, control routine unit, I/O interfaces, door lock controller, door lock controller driving are set
Gate lock actuator open and close lock tongue.The present invention can be in conjunction with existing intelligent door lock, and intelligent door lock further includes keyboard, execution machine
Structure etc., communications protocol use TCP or udp protocol, and control protocol unit includes control routine, for being arranged and exporting switching value,
Switching value drives executing agency to unlock.
Control interface of the present invention can also use small routine external linkage to generate, and provide desktop shortcuts.
Above application pattern and rule do not limit the essential characteristic of the method and system of the present invention, and the non-limiting present invention
Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. made should all include
Within protection scope of the present invention.
Claims (10)
1. a kind of electronic lock control method or system, including server, client, door lock, it is characterized in that:
Door lock ID databases, user's id databases are set in server, and door lock identifies Connection Service device with ID, and client is marked with id
Know Connection Service device, door lock user id1 is using client id1 as mark binding or the door lock ID1 for authorizing it to control, by the visitor
Family end id1 is sent out or trigger gate lock control instruction control door lock D1.
2. electronic lock control method according to claim 1 or system, it is characterized in that:Setting management mould in server
Block, the user that has the right carry out that door lock permission can be arranged after verification login service device with door lock ID mark, door lock permission include addition,
Delete other id users.
3. electronic lock control method according to claim 1 or 2 or system, characterized in that including step:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that at least one tenant user id2 is door lock ID1, authorize tenant user logical
Cross client id2 control door locks ID1.
4. electronic lock control method according to claim 3 or system, characterized in that including step:
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, after password 1 is set
All door lock users must input password 1 at its client operation interface and execute unlocking;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users,
Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1
It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password
1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking;
6. house-owner has the right to delete any mandate tenant user id by client id1, other mandate tenant users are unaffected;
7. house-owner has the right to delete all mandate tenant user id by client id1, delete close after all mandate tenant user id
Code 1 fails, and the button for restoring client operation interface is unlocked.
5. electronic lock control method according to claim 4 or system, characterized in that including step:
Step 5. in be arranged password 1 come into force on the keyboard of ID1 door locks, user directly with password 1 ID1 door locks keyboard
Upper operation is unlocked, and password 1 loses on the keyboard of ID1 door locks after house-owner deletes any mandate tenant user id by client id1
It imitates, still effectively, door lock active user must input the password 1 on client operation interface at its client operation interface
Password 1 executes unlocking;Keyboard password input function if you need to restore ID1 door locks must be newly set password 2.
6. electronic lock control method according to claim 1 or 2 or system, characterized in that including step:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that a tenant user id2 is door lock ID1, tenant user is authorized to pass through visitor
Family end id2 controls door lock ID1, and it is door lock ID1 to authorize tenant user to add at least one tenant user id3 by client id2
Mandate tenant user, authorize tenant user to pass through client id3 and control door lock ID1.
7. electronic lock control method according to claim 6 or system, characterized in that including step:
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, after password 1 is set
All door lock users must input password 1 at its client operation interface and execute unlocking;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close
All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users,
Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1
It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password
1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking;
6. tenant user is authorized to have the right to delete other mandate tenant user id, remaining mandate tenant user by client id2
It is unaffected;
7. house-owner has the right to delete by client id1 authorizes tenant user id2, all mandates after authorizing tenant user id2 are deleted
Tenant user id is deleted, while password 1 fails, and the button for restoring client operation interface is unlocked.
8. electronic lock control method according to claim 7 or system, characterized in that including step:
Step 5. in be arranged password 1 come into force on the keyboard of ID1 door locks, user directly with password 1 ID1 door locks keyboard
Upper operation is unlocked, and password 1 is in ID1 after authorizing tenant user id2 to delete any other mandate tenant user id by client id2
It fails on the keyboard of door lock, still effectively, door lock active user must be in its client for the password 1 on client operation interface
End operation interface input password 1 executes unlocking;Keyboard password input function if you need to restore ID1 door locks must be newly set password
2。
9. the electronic lock control method according to claims 1 or 2 or 4 or 6 or 7 or system, it is characterized in that:The password
1 can be substituted by operated mobile fingerprint.
10. the electronic lock control method according to claims 1 or 2 or 4 or 6 or 7 or system, it is characterized in that:The APP
Wechat or QQ or Alipay can be bound.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810458578.XA CN108765649A (en) | 2018-05-14 | 2018-05-14 | Electronic lock control method and device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810458578.XA CN108765649A (en) | 2018-05-14 | 2018-05-14 | Electronic lock control method and device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108765649A true CN108765649A (en) | 2018-11-06 |
Family
ID=64006754
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810458578.XA Pending CN108765649A (en) | 2018-05-14 | 2018-05-14 | Electronic lock control method and device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108765649A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472909A (en) * | 2019-01-11 | 2019-03-15 | 常州科新永安电子锁有限公司 | Blue-tooth intelligence lock, system and application method |
CN109584405A (en) * | 2017-09-28 | 2019-04-05 | 珠海优特物联科技有限公司 | A kind of key-cut system and preparation method |
CN109584419A (en) * | 2018-12-03 | 2019-04-05 | 马立和 | Intelligent door lock unifies dynamic configuration interface system |
CN110443916A (en) * | 2019-07-02 | 2019-11-12 | 广西达朗科技有限公司 | A kind of smart lock taboo control system and method with space-time multidimensional matching technique |
CN114419763A (en) * | 2021-12-30 | 2022-04-29 | 北京深思数盾科技股份有限公司 | Remote control method, terminal, server and storage medium |
CN116895113A (en) * | 2023-08-29 | 2023-10-17 | 微网优联科技(成都)有限公司 | Intelligent door lock remote interaction system and method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002027126A1 (en) * | 2000-09-26 | 2002-04-04 | Kabushiki Kaisha Kenwood | Method of unlocking electronic lock |
CN101227285A (en) * | 2008-01-29 | 2008-07-23 | 中兴通讯股份有限公司 | System and method for dynamic controlling terminal user authority |
CN105205898A (en) * | 2015-10-22 | 2015-12-30 | 深圳优方网络技术有限公司 | Electronic code permission management system for intelligent lock |
CN105303670A (en) * | 2015-12-04 | 2016-02-03 | 马孝康 | Access control management method, device and system |
CN106327649A (en) * | 2016-08-31 | 2017-01-11 | 北京厚文知识产权顾问有限公司 | Two-dimensional code based access control system and door opening method |
CN106952377A (en) * | 2017-04-07 | 2017-07-14 | 深圳广田智能科技有限公司 | The method and system of smart home door lock are opened by mobile fingerprint |
CN107734158A (en) * | 2017-09-29 | 2018-02-23 | 孟庆国 | The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member |
CN107958513A (en) * | 2017-12-05 | 2018-04-24 | 广东亚太天能科技股份有限公司 | A kind of offline authorization method and system of electronic lock |
-
2018
- 2018-05-14 CN CN201810458578.XA patent/CN108765649A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002027126A1 (en) * | 2000-09-26 | 2002-04-04 | Kabushiki Kaisha Kenwood | Method of unlocking electronic lock |
CN101227285A (en) * | 2008-01-29 | 2008-07-23 | 中兴通讯股份有限公司 | System and method for dynamic controlling terminal user authority |
CN105205898A (en) * | 2015-10-22 | 2015-12-30 | 深圳优方网络技术有限公司 | Electronic code permission management system for intelligent lock |
CN105303670A (en) * | 2015-12-04 | 2016-02-03 | 马孝康 | Access control management method, device and system |
CN106327649A (en) * | 2016-08-31 | 2017-01-11 | 北京厚文知识产权顾问有限公司 | Two-dimensional code based access control system and door opening method |
CN106952377A (en) * | 2017-04-07 | 2017-07-14 | 深圳广田智能科技有限公司 | The method and system of smart home door lock are opened by mobile fingerprint |
CN107734158A (en) * | 2017-09-29 | 2018-02-23 | 孟庆国 | The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member |
CN107958513A (en) * | 2017-12-05 | 2018-04-24 | 广东亚太天能科技股份有限公司 | A kind of offline authorization method and system of electronic lock |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109584405A (en) * | 2017-09-28 | 2019-04-05 | 珠海优特物联科技有限公司 | A kind of key-cut system and preparation method |
CN109584419A (en) * | 2018-12-03 | 2019-04-05 | 马立和 | Intelligent door lock unifies dynamic configuration interface system |
CN109584419B (en) * | 2018-12-03 | 2020-06-23 | 哈尔滨学院 | Unified dynamic configuration interface system of intelligent door lock |
CN109472909A (en) * | 2019-01-11 | 2019-03-15 | 常州科新永安电子锁有限公司 | Blue-tooth intelligence lock, system and application method |
CN110443916A (en) * | 2019-07-02 | 2019-11-12 | 广西达朗科技有限公司 | A kind of smart lock taboo control system and method with space-time multidimensional matching technique |
CN114419763A (en) * | 2021-12-30 | 2022-04-29 | 北京深思数盾科技股份有限公司 | Remote control method, terminal, server and storage medium |
CN116895113A (en) * | 2023-08-29 | 2023-10-17 | 微网优联科技(成都)有限公司 | Intelligent door lock remote interaction system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108765649A (en) | Electronic lock control method and device and system | |
CA2997954C (en) | Device enabled identity authentication | |
CN103988169B (en) | Secure data based on tactful accordance is accessed | |
CN105719376B (en) | A kind of access control system and method | |
CN108737251A (en) | Control method for door lock, device, system, guest room application based on instant messaging | |
CN110474865B (en) | Block chain user authority system and implementation method | |
CN103516514B (en) | The establishing method of account access rights and control device | |
US20130335193A1 (en) | Electronic wireless lock | |
CN103248484A (en) | Door access control system and method | |
CN103903319A (en) | Electronic lock system based on internet dynamic authorization | |
CN104735168B (en) | The method for unlocking of password and decryption is generated based on network | |
CN106652109A (en) | Intelligent lock control method, device and lock management server | |
CN104272645B (en) | For realizing the access enabler AE and its method of the access to industrial automation and the intelligent electronic device IED of control system IACS | |
TW201545098A (en) | System and method of mobile check-in and a cloud system thereof | |
CN109565640A (en) | The service based on privately owned position of safety | |
JP7172716B2 (en) | Authorization system, management server and authorization method | |
CN106127888B (en) | Intelligent lock operation method and smart lock operating system | |
CN103516674B (en) | Quickly and the method for network device online and control device | |
JP5955700B2 (en) | Key distribution system | |
Manual | Procedure | |
CN114863597B (en) | Access management method, system and device based on trusted bar code | |
CN111161454A (en) | Intelligent lock safety networking and control method | |
JP2015007309A (en) | Key distribution system and key distribution method | |
JP2014148875A (en) | Key distribution system | |
CN108550208A (en) | Method for managing user right, server and the readable medium of intelligent door lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181106 |