[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108765649A - Electronic lock control method and device and system - Google Patents

Electronic lock control method and device and system Download PDF

Info

Publication number
CN108765649A
CN108765649A CN201810458578.XA CN201810458578A CN108765649A CN 108765649 A CN108765649 A CN 108765649A CN 201810458578 A CN201810458578 A CN 201810458578A CN 108765649 A CN108765649 A CN 108765649A
Authority
CN
China
Prior art keywords
password
client
door lock
user
tenant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810458578.XA
Other languages
Chinese (zh)
Inventor
吴东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810458578.XA priority Critical patent/CN108765649A/en
Publication of CN108765649A publication Critical patent/CN108765649A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to door lock control fields, especially electronic lock control method and device and system.It is characterized in that:Door lock ID databases, user's id databases are set in server, door lock identifies Connection Service device with ID, client identifies Connection Service device with id, door lock user id1 is sent out by the client id1 using client id1 as mark binding or the door lock ID1 for authorizing it to control or the instruction of trigger gate lock control controls door lock D1.Advantageous effect is:It solves house-owner and has while highest permission door lock to only have tenant in the term of validity of renting a house there is unlocking authority.

Description

Electronic lock control method and device and system
Technical field
The present invention relates to door lock control fields, especially electronic lock control method and device and system.
Background technology
The mode of intelligent cipher lock unlocking at present has password unlocking, IC card to unlock, fingerprint is unlocked, cell phone application remote unlocking.
For house to let user, one side house-owner requires to possess highest permission to door lock, and another aspect tenant does not wish again Hope the unlocking authority possessed by house-owner in the term of validity of renting a house.
Invention content
Have to door lock present invention aim to address house-owner and only has tenant while highest permission in the term of validity of renting a house With unlocking authority.
Door lock of the present invention can be the combination locked with existing password.
Include at present server, client, door lock using the system of cell phone application remote unlocking, server foundation has door lock ID databases, door lock possess unique ID, and client after ID and password login server to control door lock.Or system includes client End, door lock, door lock possess unique ID(MAC Address), the laggard introduction lock control of client-side search equipment in the same WiFi environment System.
This case uses cell phone application(Applications client, this case claim client)The system of remote unlocking includes server, client End, door lock, client possess unique id by registration, and door lock possesses unique ID, and client identifies Connection Service device, door lock with id Connection Service device is identified with ID, certain id and certain ID bind or authorize(User's list is added)After establish control planning, intelligent door lock Further include communication protocol unit, control protocol unit, controller, keyboard, executing agency etc., communications protocol is assisted using TCP or UDP View, control protocol unit includes control routine, and for being arranged and exporting switching value, switching value drives executing agency to unlock.
Here id identifies client, identifies door lock with ID, door lock user can be by binding or authorizing id to be used as door lock control Permission processed.
The technical scheme is that:
A kind of electronic lock control method or system, including server, client, door lock, it is characterized in that:
Door lock ID databases, user's id databases are set in server, and door lock identifies Connection Service device with ID, and client is marked with id Know Connection Service device, door lock user id1 is using client id1 as mark binding or the door lock ID1 for authorizing it to control, by the visitor Family end id1 is sent out or trigger gate lock control instruction control door lock D1.
The electronic lock control method or system, it is characterized in that:Management module is set in server, have the right user with Door lock permission can be arranged after carrying out verification login service device in door lock ID marks, and door lock permission includes addition, deletes other id use Family.Further comprise being set using time limit or use time.
The electronic lock control method, characterized in that including step:
1. house-owner downloads cell phone application client and is registered as user id1;
2. tenant downloads cell phone application client and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that at least one tenant user id2 is door lock ID1, authorize tenant user logical Cross client id2 control door locks ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users, Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1 It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password 1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking.
6. house-owner has the right to delete any mandate tenant user id by client id1, other mandate tenant users are not by shadow It rings.
7. house-owner has the right to delete all mandate tenant user id by client id1, all mandate tenant user id are deleted Password 1 fails afterwards, and the button for restoring client operation interface is unlocked.
Further, step 5. in,
Conventional cipher lock is both provided with unlocking keyboard at present, and the present invention provides method and the use of a kind of password setting:ID1 door locks On be provided with keyboard, step 5. in be arranged password 1 come into force on the keyboard of ID1 door locks, user is directly with password 1 in ID1 It operates and unlocks on the keyboard of door lock, password 1 is in ID1 door locks after house-owner deletes any mandate tenant user id by client id1 Keyboard on fail, the password 1 on client operation interface still effectively, i.e., lock body keyboard permission deactivate, which currently uses Family all must input password 1 at its client operation interface and execute unlocking;If you need to the keyboard password input function for restoring ID1 door locks It must be newly set password 2 and enable lock body keyboard permission.
Or:
1. house-owner downloads cell phone application client and is registered as user id1;
2. tenant downloads cell phone application client and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that a tenant user id2 is door lock ID1, tenant user is authorized to pass through visitor Family end id2 controls door lock ID1, and it is door lock ID1 to authorize tenant user to add at least one tenant user id3 by client id2 Mandate tenant user, authorize tenant user to pass through client id3 and control door lock ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users, Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1 It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password 1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking.
6. tenant user is authorized to have the right to delete other mandate tenant user id, remaining mandate tenant by client id2 User is unaffected.
7. house-owner has the right to delete by client id1 authorizes tenant user id2, deletes after authorizing tenant user id2 and own Tenant user id is authorized to delete, while password 1 fails, the button for restoring client operation interface is unlocked.
Further, step 5. in,
Conventional cipher lock is both provided with unlocking keyboard at present, and the present invention provides method and the use of a kind of password setting:ID1 door locks On be provided with keyboard, step 5. in be arranged password 1 come into force on the keyboard of ID1 door locks, user is directly with password 1 in ID1 It operates and unlocks on the keyboard of door lock, after authorizing tenant user id2 to delete any other mandate tenant user id by client id2 Password 1 fails on the keyboard of ID1 door locks, i.e., lock body keyboard permission deactivates, and the password 1 on client operation interface still has Effect, door lock active user must input password 1 at its client operation interface and execute unlocking;If you need to restore ID1 door locks Keyboard password input function must be newly set password 2 and enable lock body keyboard permission.
Or:
1. house-owner downloads cell phone application client and is registered as user id1;
2. tenant downloads cell phone application client and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. the mandate tenant user that client id1 addition tenant users id2 is door lock ID1, authorizes tenant user to pass through client Id2 controls door lock ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close All door lock users must input password 1 and execute unlocking after code 1(Password and client operation circle are inputted including door lock keyboard Face inputs password);
6. house-owner has the right to delete by client id1 authorizes tenant user id2, while password 1 fails, and restores client operation circle The button in face is unlocked.
The electronic lock control method or system, it is characterized in that:The password 1 can be by operated mobile fingerprint It substitutes(Utilize the fingerprint sensor of mobile phone).
The electronic lock control method or system, it is characterized in that:The password 1 can be by operated mobile phone touch Gesture substitutes(Utilize the touch screen sensor of mobile phone).
The electronic lock control method or system, it is characterized in that:The APP can bind wechat or QQ or payment It is precious.
Further, it registers as one kind and controlling embodiment, door lock ID1 Quick Response Codes are pasted on corresponding door, by visitor Family end id1 scanning triggering unlocking instructions:Server obtains ID1 identification informations of the client id1 by scanning recognition, and server exists Id1 is searched in door lock ID1 user lists, if there is being then validated user, unlocking instruction is sent out from server to ID1 door locks.
Further, the Quick Response Code can be substituted by one-dimension code or other graphic codes substitute, or random Quick Response Code substitutes, Or numerical digit substitutes.
Further, the Quick Response Code is anti-fake two-dimension code(Prevent Quick Response Code from replicating in embodiment of registering).
Chinese patent announces CN104376339B- a kind of graphic code scan method and its graphic code knot with authentication function Structure discloses a kind of anti-fake two-dimension code.
A kind of electronic lock control method or system, it is characterized in that:
System includes server, wechat client, management client, door lock;
Housekeeping module, including door lock ID databases, authorization module are set in server, by management client to housekeeping Module is operated, and realizes hotel occupancy room door lock management;
Door lock ID is posted in quick response code form on corresponding door;
Its step includes:
(1)Wechat client id1 user checks in as tenant id1, is set to tenant id1 typings and permission by management client It sets, typing is that the user list of certain door lock is added, and door lock ID1 is licensed to id1 by server;
(2)Wechat client id1 scanning door ID Quick Response Codes simultaneously upload id information to server, and server is inquired by id information The mandate list of door lock ID1 simultaneously executes unlocking according to mandate list;
(3)Server sends out unlocking instruction to ID1 door locks, executes unlocking operation by door lock controller, door lock ID1 returns execute letter Breath is to server and is supplied to wechat client id1;
(4)Tenant id1 check out after by management client ID1 authorize list in delete id1;Or time limit start-stop expire after by taking Business device deletes id1 in ID1 authorizes list.
Further, wechat client id1 reports door id information while reporting geographical location information, and server has certification The step of geographical location.
Further, implement step of booking rooms automatically:
A. service platform of booking rooms is provided, tenant logs in the service platform with wechat client id1;
B. tenant submits order and pays success;
ID1 door locks are licensed to wechat client id1 by service platform of C. booking rooms notice server, i.e., ID1 is added in id1 authorizes name It is single, while time limit start-stop permission is set;
D. tenant holds the ID1 Quick Response Codes of the corresponding door of wechat client id1 scanning ID1 door locks and can unlock;
E. after time limit start-stop permission expires id1 is deleted in ID1 authorizes list by server.
A kind of electronic door lock device, it is characterized in that:Including,
Communication module is arranged in door lock end, for connecting network;
Communication protocol unit, control protocol unit, control routine unit, I/O interfaces, door lock controller, door lock is arranged in door lock end Controller drives gate lock actuator open and close lock tongue;
Door lock end is provided with ID marks, has corresponding ID databases, door lock to identify Connection Service device, server with ID in server In be provided with user's id databases, door lock ID1 includes at least an id1 user, i.e. ID1 at least establishes an id1 relationship, id1 User is by controlling door lock ID1 after client id1 login service devices;
Door lock end is provided with lock body keyboard.
The beneficial effects of the invention are as follows:Solving house-owner has while highest permission in the term of validity of renting a house only door lock Tenant has unlocking authority.
Description of the drawings
Fig. 1 is principle of the invention flow chart.
Fig. 2 is door lock ID1 operation interfaces.
Relational graphs of the Fig. 3 between database of the present invention.
Fig. 4 is system applicating flow chart in guest room of the present invention.
Fig. 5 provides a kind of door lock binding element schematic diagram.
Fig. 6 is the basic configuration figure at door lock end of the present invention.
Specific implementation mode
Present invention will be further explained below with reference to the attached drawings and examples.
Cell phone application, that is, client.
Fig. 1 is principle of the invention flow chart, and system includes server, client, door lock, and door lock ID numbers are arranged in server According to library, user's id databases, door lock identifies Connection Service device with ID, and client identifies Connection Service device, door lock user id1 with id Using client id1 as mark binding or the door lock ID1 for authorizing it to control, sent out by the client id1 or trigger gate lock control System instruction control door lock D1.
ID1 door locks include existing intelligent door lock function, unlocking mode includes password unlocking, IC card is unlocked, fingerprint is unlocked, Cell phone application remote unlocking, cell phone application remote unlocking further comprise that button unlocks and in client on client operation interface Password unlocking is inputted in operation interface, and is unlocked using mobile phone fingerprint sensor licencing key.
ID1 door lock Connection Service devices and and server progress data exchange.
House-owner carries out user's registration on the server by client, it is assumed that is registered as user id1, registration can bind hand Machine number.
Tenant carries out user's registration on the server by client, it is assumed that is registered as user id2, registration can bind hand Machine number.
1 door lock of binding ID is applied for client id1 by house-owner, while ID1 door locks provide corresponding bindings, binding side Formula includes existing all secure binding methods, and bindings carry out binding validatation by server, serviced after binding validatation success Device binds id1 and ID1, and user id1 can carry out door lock ID1 by the door open button of client id1 operation interfaces at this time Operation(Referring to Fig. 2 door lock ID1 operation interfaces), sent out from server to ID1 door locks after the operation of server acquisition user id1 Id1 operational orders, door lock ID1 receive the id1 operational order back door locks ID1 that server transmits and execute id1 user instructions, meanwhile, It will be supplied to client after door lock work state information backhaul service device.
House-owner's client id1 has bound door lock ID1 and has limited the use of family as the highest weight of ID1 at this time, binding success it is initial State is unlocked for client operation interface button, and unlocking mode and setting password can be arranged in the client id1 of highest permission, open Lock mode includes the unlocking of client operation interface button, the unlocking of client operation interface password unlocking, door lock keyboard password, IC card Unlock etc., it is tenant that client id1, which can add id2,(Addition manner includes:Input No. id or unique number or phone number, Or scan the two-dimensional code addition), client id2 obtains client after server id2 is added to ID1 user lists, adds successfully Operation interface button is unlocked and permission is arranged in password(House-owner ensures that ID1 door locks are binding original state), user id2 sends out operation Id2 operational orders are sent to door lock ID1 and execute id2 user instructions by instruction to server, server, meanwhile, door lock is worked It is supplied to client after status information backhaul service device.
Further, password 1 is arranged by client id2 operation interfaces in tenant, server receive client id2 setting make it is close Code 1 comes into force, while password 1, which is sent to ID1 door locks, makes lock body keyboard password 1 come into force, at this point, input lock body keyboard password 1 can To unlock, any APP clients also must input password 1 at its client operation interface and could unlock.
If the lessee room phase expires, id2 is deleted in ID1 user lists by server automatically, while password 1 fails, it is extensive Multiple client operation interface button is unlocked, or deletes id2 by house-owner's client id1, is deleted in ID1 user lists by server Id2, while password 1 fails, and restores client operation interface button and unlocks.
Certainly, administrative login interface can be set in server, and the user that has the right carries out verification with door lock ID marks and logs in clothes Door lock permission can be set after business device, and door lock permission includes addition, deletes other id users.Further comprise being set using the time limit Or use time.
The control authority of door lock ID1 can be shared with other clients by user id1 by way of sharing, i.e. the door lock As the client good friend shared, it is of course possible to which deletion is shared, and Fig. 2 is door lock ID1 operation interfaces, and door lock ID1 user is such as Id2, id3 etc., and permission can be set, such as geographical location permission(Server has the step of verification client geographical location, by ground Managing position restriction must scene unlocking), time limit limitation, password authentification limitation etc., and provide deletion function.
Further, it registers as one kind and controlling embodiment, door lock ID1 Quick Response Codes are pasted on corresponding door, by visitor Family end id1 scanning triggering door open commands:Server obtains ID1 identification informations of the client id1 by scanning recognition, server root According to ID1 identification informations unlocking instruction is sent out to ID1 door locks.
Further, the door lock password being arranged on mobile phone can be substituted by fingerprint, directly be referred on mobile phone by user Line verification is unlocked.
Fig. 2 is door lock ID1 operation interfaces, including door lock ID1 unlocking buttons, my door lock include door lock ID1, door lock ID2, Door lock ID3 ..., the user of ID1 door locks includes authorized user(Tenant)Id2, id3 etc., at the same can carry out priority assignation and It deletes.Registration button is registered for house-owner or tenant, and scanning can be used for bindings or door lock control of registering.Further, may be used To load more complicated control keyboard 201, controlled by control protocol, control protocol includes control routine, control routine Carry out door lock control and setting, such as further verification password, door lock priority assignation.Operation interface provides actions menu, operation Menu includes setting menu, function menu etc..The customization control keyboard that each door lock manufacturer can further be loaded, by controlling Code definition control keyboard processed.
Relational graphs of the Fig. 3 between database of the present invention, 301 be user's id databases(Namely client id data Library), including mark id such as id1, id2, id3 ..., each id are also associated with one unique number, as wechat system WeChat ID, Associated phone number, associate device fingerprint etc..302 be door lock ID databases, including mark ID1, ID2, ID3 ..., further Can be associated with unique encodings k1, k2, k3 ..., which can be unique sequence numbers, can be uniquely determined by being associated with ID Some specific door lock, i.e. ID are plain code, and k values are private mark, ensure the safety of door lock ID identity, further, each ID is also associated with One unique door lock MAC Address, door lock identify Connection Service device with ID.303 be user's id1 door lock lists, as ID1, ID2, ID3 ... by binding or authorizing(That is opening relationships)As the door lock list of id1 user, similarly, 304 be the door of user id2 Lock list.Certainly, by binding or authorizing, some ID door lock is also formed simultaneously one or more id user lists, i.e., ties up each other Fixed or mandate relationship(Similar to friend relation), 305 be door lock ID1 user lists in figure, includes necessarily id1,306 be door lock ID4 user lists include necessarily id2.
For sharing operation, the group of wechat is similar to by way of binding or authorizing opening relationships, binding person is door lock Highest permission, similar group master can authorize or delete other door lock users.
Door lock includes communication module, and communication module includes wired or wireless, and WIFI network is typically provided with password at present, can To input password or sound wave connection input password or the direct-connected input passwords of WIFI using first bluetooth connection.
In view of binding safety, one can be arranged and be associated with IDD correspondingly with ID, simultaneously using IDD as binding logo It is posted on lock body with Quick Response Code, IDD Quick Response Codes is taken off independent preservation after user's binding success.In this way for house to let Favorably, ID lists can be added in the id of tenant by house-owner(And it can delete at any time), and tenant can not implement to bind again.
For rental housing, electronic lock control method of the present invention, including step:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that at least one tenant user id2 is door lock ID1, authorize tenant user logical Cross client id2 control door locks ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users, Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1 It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password 1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking.
(Since house-owner does not know password 1, so can not unlock, it, can be by all rooms if password is arranged in any tenant Visitor knows without telling house-owner).
Purpose using voting mechanism is to ensure the equity equality of all tenants.
6. house-owner has the right to delete any mandate tenant user id by client id1, other mandate tenant users are not by shadow It rings.
7. house-owner has the right to delete all mandate tenant user id by client id1, all mandate tenant user id are deleted Password 1 fails afterwards, and the button for restoring client operation interface is unlocked.
Further, step 5. in,
Conventional cipher lock is both provided with unlocking keyboard at present, and the present invention provides method and the use of a kind of password setting, by house-owner Or tenant enables permission in its client operation interface setting lock body keyboard:Be provided with keyboard on ID1 door locks, step 5. in set The password 1 set comes into force on the keyboard of ID1 door locks, and user directly operates unlocking, house-owner with password 1 on the keyboard of ID1 door locks Password 1 fails on the keyboard of ID1 door locks after deleting any mandate tenant user id by client id1, i.e., lock body keyboard is weighed Limit deactivates, and still effectively, door lock active user must be at its client operation interface for the password 1 on client operation interface Input password 1 executes unlocking;Keyboard password input function if you need to restore ID1 door locks must be newly set password 2 and enable lock Body keyboard permission.
Or:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that a tenant user id2 is door lock ID1, tenant user is authorized to pass through visitor Family end id2 controls door lock ID1, and it is door lock ID1 to authorize tenant user to add at least one tenant user id3 by client id2 Mandate tenant user, authorize tenant user to pass through client id3 and control door lock ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users, Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1 It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password 1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking.
(Since house-owner does not know password 1, so can not unlock, it, can be by all rooms if password is arranged in any tenant Visitor knows without telling house-owner)
6. tenant user is authorized to have the right to delete other mandate tenant user id, remaining mandate tenant user by client id2 It is unaffected.
7. house-owner has the right to delete by client id1 authorizes tenant user id2, deletes after authorizing tenant user id2 and own Tenant user id is authorized to delete, while password 1 fails, the button for restoring client operation interface is unlocked.
Further, step 5. in,
Conventional cipher lock is both provided with unlocking keyboard at present, and the present invention provides method and the use of a kind of password setting, by house-owner Or tenant enables permission in its client operation interface setting lock body keyboard:Be provided with keyboard on ID1 door locks, step 5. in set The password 1 set comes into force on the keyboard of ID1 door locks, and user directly operates unlocking with password 1 on the keyboard of ID1 door locks, authorizes Password 1 loses on the keyboard of ID1 door locks after tenant user id2 deletes any other mandate tenant user id by client id2 Effect, i.e. lock body keyboard permission deactivate, and still effectively, door lock active user must be for password 1 on client operation interface Its client operation interface input password 1 executes unlocking;Keyboard password input function if you need to restore ID1 door locks must be set again It sets password 2 and lock body keyboard enabling is set.
If tenant forgets Password 1, step can be executed 7. re-establish afterwards password setting is carried out by tenant again after relationship.
Or:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. the mandate tenant user that client id1 addition tenant users id2 is door lock ID1, authorizes tenant user to pass through client Id2 controls door lock ID1.
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, setting is close All door lock users after code 1(Including house-owner)Password 1 must all be inputted and execute unlocking(Password and visitor are inputted including door lock keyboard Family end operation interface inputs password);
6. house-owner has the right to delete by client id1 authorizes tenant user id2, while password 1 fails, and restores client operation circle The button in face is unlocked.
The electronic lock control method or system, it is characterized in that:The password 1 can be by operated mobile fingerprint It substitutes(Utilize the fingerprint sensor of mobile phone).
The electronic lock control method or system, it is characterized in that:The APP can bind wechat or QQ or payment It is precious.
Further, it registers as one kind and controlling embodiment, door lock ID1 Quick Response Codes are pasted on corresponding door, by visitor Family end id1 scanning triggering unlocking instructions:Server obtains ID1 identification informations of the client id1 by scanning recognition, and server exists Id1 is searched in door lock ID1 user lists, if there is being then validated user, unlocking instruction is sent out from server to ID1 door locks.
Further, the Quick Response Code can be substituted by one-dimension code or other graphic codes substitute, or random Quick Response Code substitutes, Or numerical digit substitutes.
Further, the Quick Response Code is anti-fake two-dimension code(Prevent Quick Response Code from replicating in embodiment of registering).
Chinese patent announces CN104376339B- a kind of graphic code scan method and its graphic code knot with authentication function Structure discloses a kind of anti-fake two-dimension code.
In the present invention, binding and the essence authorized are the sheet relations for establishing ID and id, and binding is recognized using both sides Card pattern(ID and id both sides establish list), authorize allows certification using folk prescription(Id lists are established by ID).
API external linkages control program may be used in the present invention, in addition can also use small routine, be controlled by small routine Program chains processed.
The present invention can be associated with wechat mark or authorize wechat mark, directly provide payment function by wechat system, pay A system, which is each operated in, with unlocking is seamlessly connected completion.
Fig. 4 is system applicating flow chart in guest room of the present invention, and system includes server of the present invention, wechat server, wechat visitor Family end, management client, door lock;
Wechat server and server of the present invention carry out data exchange;
Housekeeping module, including door lock ID databases, authorization module are set in server, by management client to housekeeping Module is operated, and realizes hotel occupancy room door lock management;
Door lock ID is posted in quick response code form on corresponding door.
Its step includes:
(1)Wechat client id1 user checks in as tenant id1, is set to tenant id1 typings and permission by management client It sets, typing is that the user list of certain door lock is added, access permission, elevator permission other than priority assignation such as time limit start-stop, door, Parking lot bayonet permission, entertainment body-building access permission etc., door lock ID1 is licensed to id1 by server;
Typing refers to typing unique mark or scanning unique mark Quick Response Code, such as wechat, can with typing WeChat ID or cell-phone number, Or scanning wechat Quick Response Code.
(2)Wechat client id1 scanning door ID Quick Response Codes simultaneously upload id information to server, and server passes through id information Inquiry(Position or determine ID1)The mandate list of door lock ID1 simultaneously executes unlocking according to mandate list;
It may further carry out id1 tenant's certification, id1 purview certifications, geographic position authentication(In view of Quick Response Code can replicate, It is screened with geographical location).
(3)Server sends out unlocking instruction to ID1 door locks, executes unlocking operation by door lock controller, door lock ID1 returns are held Row information is to server and is supplied to wechat client id1.
(4)Tenant id1 check out after by management client ID1 authorize list in delete id1;Or after time limit start-stop expires By server id1 is deleted in ID1 authorizes list.
Further, wechat client id1 reports door id information while reporting geographical location information, and server has certification The step of geographical location.
Server can record to form daily record for management client inquiry with dual lock, it is of course possible to by the wechat id of waiter Typing its management guest room and authorize its manage multiple ID door locks.
When door-locking system of the present invention is applied to hotel management, the user of door lock binds passes through authorization module by management client It realizes, the relationship of ID and id are established in binding or mandate, so it is exactly that the id marks of wechat client are added to certain door to authorize In the relationship list for locking ID, i.e. user list is managed by management client, including opening relationships, deletes relationship.
Further, implement step of booking rooms automatically:
A. service platform of booking rooms is provided, tenant logs in the service platform with wechat client id1;
B. tenant submits order and pays success;
ID1 door locks are licensed to wechat client id1 by service platform of C. booking rooms notice server, i.e., ID1 is added in id1 authorizes name It is single, while time limit start-stop permission is set;
D. tenant holds the ID1 Quick Response Codes of the corresponding door of wechat client id1 scanning ID1 door locks and can unlock;
E. after time limit start-stop permission expires id1 is deleted in ID1 authorizes list by server.
Fig. 5 provides a kind of door lock binding element schematic diagram, and 501 be the lock body of door lock, and 502 be door lock ID Quick Response Codes and ID Number, 503 is bind or authorize trigger button, bind in order to bind safety, 503 or authorize trigger button can be by a key It substitutes, usually with lock separately keeping, when binding, 503 buttons of triggering enter binding procedure, are uploaded and are taken by client scan Quick Response Code Business device passes through server authentication and implements to bind.Certainly, binding of the invention refers to all binding methods.
Fig. 6 is the basic configuration figure at door lock end of the present invention, and communication module is arranged in door lock end, for connecting network;Door lock end Communication protocol unit, control protocol unit, control routine unit, I/O interfaces, door lock controller, door lock controller driving are set Gate lock actuator open and close lock tongue.The present invention can be in conjunction with existing intelligent door lock, and intelligent door lock further includes keyboard, execution machine Structure etc., communications protocol use TCP or udp protocol, and control protocol unit includes control routine, for being arranged and exporting switching value, Switching value drives executing agency to unlock.
Control interface of the present invention can also use small routine external linkage to generate, and provide desktop shortcuts.
Above application pattern and rule do not limit the essential characteristic of the method and system of the present invention, and the non-limiting present invention Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. made should all include Within protection scope of the present invention.

Claims (10)

1. a kind of electronic lock control method or system, including server, client, door lock, it is characterized in that:
Door lock ID databases, user's id databases are set in server, and door lock identifies Connection Service device with ID, and client is marked with id Know Connection Service device, door lock user id1 is using client id1 as mark binding or the door lock ID1 for authorizing it to control, by the visitor Family end id1 is sent out or trigger gate lock control instruction control door lock D1.
2. electronic lock control method according to claim 1 or system, it is characterized in that:Setting management mould in server Block, the user that has the right carry out that door lock permission can be arranged after verification login service device with door lock ID mark, door lock permission include addition, Delete other id users.
3. electronic lock control method according to claim 1 or 2 or system, characterized in that including step:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that at least one tenant user id2 is door lock ID1, authorize tenant user logical Cross client id2 control door locks ID1.
4. electronic lock control method according to claim 3 or system, characterized in that including step:
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, after password 1 is set All door lock users must input password 1 at its client operation interface and execute unlocking;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users, Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1 It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password 1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking;
6. house-owner has the right to delete any mandate tenant user id by client id1, other mandate tenant users are unaffected;
7. house-owner has the right to delete all mandate tenant user id by client id1, delete close after all mandate tenant user id Code 1 fails, and the button for restoring client operation interface is unlocked.
5. electronic lock control method according to claim 4 or system, characterized in that including step:
Step 5. in be arranged password 1 come into force on the keyboard of ID1 door locks, user directly with password 1 ID1 door locks keyboard Upper operation is unlocked, and password 1 loses on the keyboard of ID1 door locks after house-owner deletes any mandate tenant user id by client id1 It imitates, still effectively, door lock active user must input the password 1 on client operation interface at its client operation interface Password 1 executes unlocking;Keyboard password input function if you need to restore ID1 door locks must be newly set password 2.
6. electronic lock control method according to claim 1 or 2 or system, characterized in that including step:
1. house-owner downloads cell phone application and is registered as user id1;
2. tenant downloads cell phone application and is registered as user idx;
3. house-owner is with the client id1 binding door locks ID1 of oneself;
4. client id1 adds the mandate tenant user that a tenant user id2 is door lock ID1, tenant user is authorized to pass through visitor Family end id2 controls door lock ID1, and it is door lock ID1 to authorize tenant user to add at least one tenant user id3 by client id2 Mandate tenant user, authorize tenant user to pass through client id3 and control door lock ID1.
7. electronic lock control method according to claim 6 or system, characterized in that including step:
5. authorizing tenant user that door lock password 1 is arranged by client id2 operation interfaces, and can arbitrarily it change, after password 1 is set All door lock users must input password 1 at its client operation interface and execute unlocking;
Or, door lock password 1 is arranged by its client operation interface in any mandate tenant user, and can arbitrarily it change, setting is close All door lock users must input password 1 at its client operation interface and execute unlocking after code 1;
Or, at least authorize tenant user that password 1 is set by its client operation interface by two in all mandate tenant users, Password 1 can just come into force, and all door lock users must be in its client operation interface input execution of password 1 after coming into force for password 1 It unlocks;
Or, password 1 must be arranged by its client operation interface in all mandate tenant users, password 1 can just come into force, password 1 come into force after all door lock users all must its client operation interface input password 1 execute unlocking;
6. tenant user is authorized to have the right to delete other mandate tenant user id, remaining mandate tenant user by client id2 It is unaffected;
7. house-owner has the right to delete by client id1 authorizes tenant user id2, all mandates after authorizing tenant user id2 are deleted Tenant user id is deleted, while password 1 fails, and the button for restoring client operation interface is unlocked.
8. electronic lock control method according to claim 7 or system, characterized in that including step:
Step 5. in be arranged password 1 come into force on the keyboard of ID1 door locks, user directly with password 1 ID1 door locks keyboard Upper operation is unlocked, and password 1 is in ID1 after authorizing tenant user id2 to delete any other mandate tenant user id by client id2 It fails on the keyboard of door lock, still effectively, door lock active user must be in its client for the password 1 on client operation interface End operation interface input password 1 executes unlocking;Keyboard password input function if you need to restore ID1 door locks must be newly set password 2。
9. the electronic lock control method according to claims 1 or 2 or 4 or 6 or 7 or system, it is characterized in that:The password 1 can be substituted by operated mobile fingerprint.
10. the electronic lock control method according to claims 1 or 2 or 4 or 6 or 7 or system, it is characterized in that:The APP Wechat or QQ or Alipay can be bound.
CN201810458578.XA 2018-05-14 2018-05-14 Electronic lock control method and device and system Pending CN108765649A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810458578.XA CN108765649A (en) 2018-05-14 2018-05-14 Electronic lock control method and device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810458578.XA CN108765649A (en) 2018-05-14 2018-05-14 Electronic lock control method and device and system

Publications (1)

Publication Number Publication Date
CN108765649A true CN108765649A (en) 2018-11-06

Family

ID=64006754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810458578.XA Pending CN108765649A (en) 2018-05-14 2018-05-14 Electronic lock control method and device and system

Country Status (1)

Country Link
CN (1) CN108765649A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472909A (en) * 2019-01-11 2019-03-15 常州科新永安电子锁有限公司 Blue-tooth intelligence lock, system and application method
CN109584405A (en) * 2017-09-28 2019-04-05 珠海优特物联科技有限公司 A kind of key-cut system and preparation method
CN109584419A (en) * 2018-12-03 2019-04-05 马立和 Intelligent door lock unifies dynamic configuration interface system
CN110443916A (en) * 2019-07-02 2019-11-12 广西达朗科技有限公司 A kind of smart lock taboo control system and method with space-time multidimensional matching technique
CN114419763A (en) * 2021-12-30 2022-04-29 北京深思数盾科技股份有限公司 Remote control method, terminal, server and storage medium
CN116895113A (en) * 2023-08-29 2023-10-17 微网优联科技(成都)有限公司 Intelligent door lock remote interaction system and method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002027126A1 (en) * 2000-09-26 2002-04-04 Kabushiki Kaisha Kenwood Method of unlocking electronic lock
CN101227285A (en) * 2008-01-29 2008-07-23 中兴通讯股份有限公司 System and method for dynamic controlling terminal user authority
CN105205898A (en) * 2015-10-22 2015-12-30 深圳优方网络技术有限公司 Electronic code permission management system for intelligent lock
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN106327649A (en) * 2016-08-31 2017-01-11 北京厚文知识产权顾问有限公司 Two-dimensional code based access control system and door opening method
CN106952377A (en) * 2017-04-07 2017-07-14 深圳广田智能科技有限公司 The method and system of smart home door lock are opened by mobile fingerprint
CN107734158A (en) * 2017-09-29 2018-02-23 孟庆国 The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN107958513A (en) * 2017-12-05 2018-04-24 广东亚太天能科技股份有限公司 A kind of offline authorization method and system of electronic lock

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002027126A1 (en) * 2000-09-26 2002-04-04 Kabushiki Kaisha Kenwood Method of unlocking electronic lock
CN101227285A (en) * 2008-01-29 2008-07-23 中兴通讯股份有限公司 System and method for dynamic controlling terminal user authority
CN105205898A (en) * 2015-10-22 2015-12-30 深圳优方网络技术有限公司 Electronic code permission management system for intelligent lock
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN106327649A (en) * 2016-08-31 2017-01-11 北京厚文知识产权顾问有限公司 Two-dimensional code based access control system and door opening method
CN106952377A (en) * 2017-04-07 2017-07-14 深圳广田智能科技有限公司 The method and system of smart home door lock are opened by mobile fingerprint
CN107734158A (en) * 2017-09-29 2018-02-23 孟庆国 The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN107958513A (en) * 2017-12-05 2018-04-24 广东亚太天能科技股份有限公司 A kind of offline authorization method and system of electronic lock

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109584405A (en) * 2017-09-28 2019-04-05 珠海优特物联科技有限公司 A kind of key-cut system and preparation method
CN109584419A (en) * 2018-12-03 2019-04-05 马立和 Intelligent door lock unifies dynamic configuration interface system
CN109584419B (en) * 2018-12-03 2020-06-23 哈尔滨学院 Unified dynamic configuration interface system of intelligent door lock
CN109472909A (en) * 2019-01-11 2019-03-15 常州科新永安电子锁有限公司 Blue-tooth intelligence lock, system and application method
CN110443916A (en) * 2019-07-02 2019-11-12 广西达朗科技有限公司 A kind of smart lock taboo control system and method with space-time multidimensional matching technique
CN114419763A (en) * 2021-12-30 2022-04-29 北京深思数盾科技股份有限公司 Remote control method, terminal, server and storage medium
CN116895113A (en) * 2023-08-29 2023-10-17 微网优联科技(成都)有限公司 Intelligent door lock remote interaction system and method

Similar Documents

Publication Publication Date Title
CN108765649A (en) Electronic lock control method and device and system
CA2997954C (en) Device enabled identity authentication
CN103988169B (en) Secure data based on tactful accordance is accessed
CN105719376B (en) A kind of access control system and method
CN108737251A (en) Control method for door lock, device, system, guest room application based on instant messaging
CN110474865B (en) Block chain user authority system and implementation method
CN103516514B (en) The establishing method of account access rights and control device
US20130335193A1 (en) Electronic wireless lock
CN103248484A (en) Door access control system and method
CN103903319A (en) Electronic lock system based on internet dynamic authorization
CN104735168B (en) The method for unlocking of password and decryption is generated based on network
CN106652109A (en) Intelligent lock control method, device and lock management server
CN104272645B (en) For realizing the access enabler AE and its method of the access to industrial automation and the intelligent electronic device IED of control system IACS
TW201545098A (en) System and method of mobile check-in and a cloud system thereof
CN109565640A (en) The service based on privately owned position of safety
JP7172716B2 (en) Authorization system, management server and authorization method
CN106127888B (en) Intelligent lock operation method and smart lock operating system
CN103516674B (en) Quickly and the method for network device online and control device
JP5955700B2 (en) Key distribution system
Manual Procedure
CN114863597B (en) Access management method, system and device based on trusted bar code
CN111161454A (en) Intelligent lock safety networking and control method
JP2015007309A (en) Key distribution system and key distribution method
JP2014148875A (en) Key distribution system
CN108550208A (en) Method for managing user right, server and the readable medium of intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181106