CN116563985B - Task processing method and system based on Internet of things lock - Google Patents
Task processing method and system based on Internet of things lock Download PDFInfo
- Publication number
- CN116563985B CN116563985B CN202310833761.4A CN202310833761A CN116563985B CN 116563985 B CN116563985 B CN 116563985B CN 202310833761 A CN202310833761 A CN 202310833761A CN 116563985 B CN116563985 B CN 116563985B
- Authority
- CN
- China
- Prior art keywords
- unlocking
- internet
- lock
- key
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 17
- 238000012545 processing Methods 0.000 claims abstract description 6
- 238000001514 detection method Methods 0.000 claims description 4
- 238000000034 method Methods 0.000 claims description 4
- 230000006855 networking Effects 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention relates to the technical field of digital information transmission and discloses a task processing method and a task processing system based on an Internet of things lock.
Description
Technical Field
The invention relates to the technical field of digital information transmission, in particular to a task processing method and system based on an Internet of things lock.
Background
With the development of the age, people pay more attention to the safety problem, and compared with the traditional door lock, the intelligent door lock has more excellent safety performance and convenient use.
The internet of things lock is one of intelligent door locks, and can be connected with other internet of things equipment or intelligent terminals, so that intelligent unlocking can be realized, and compared with a traditional mechanical structure lockset, the risk of unlocking through a physical means is reduced.
At present, because the lock of the internet of things adopts electronic equipment to control unlocking, the lock of the internet of things has the risk of being unlocked by network technical means, for example, an unlocking password is stolen and disguised as the identity of a resident so as to unlock.
Disclosure of Invention
The invention aims to provide a task processing method and system based on an internet of things lock, and aims to solve the problem that in the prior art, the internet of things lock is unlocked by others due to password theft.
The invention is realized in such a way that in a first aspect, the invention provides a task processing method based on an internet of things lock, comprising the following steps:
the intelligent terminal receives a first unlocking instruction input by a user;
acquiring an identification code of the intelligent terminal based on an unlocking program preset in the intelligent terminal, generating an unlocking task request by combining the identification code with the first unlocking instruction, and sending the unlocking task request to an internet of things lock;
the internet of things lock receives the unlocking task request from the intelligent terminal, identifies the identification code in the unlocking task request to detect whether the intelligent terminal sending the unlocking task request is registered in the internet of things lock,
if the detection is passed, the Internet of things lock constructs a corresponding lock end unlocking frame according to the first unlocking instruction;
the internet of things lock generates a corresponding unlocking task code according to the lock end unlocking frame, and uploads the unlocking task code to a cloud server;
the cloud server generates a corresponding key unlocking frame according to the unlocking task code and sends the key unlocking frame to the intelligent terminal;
the intelligent terminal receives a second unlocking instruction input by a user, combines the second unlocking instruction with the key unlocking frame, and sends the combined key unlocking frame to the internet of things lock;
the internet of things lock compares the key unlocking frame with the lock end unlocking frame, and if the key unlocking frame and the lock end unlocking frame pass the comparison, the internet of things lock executes an unlocking instruction.
Preferably, the first unlocking instruction and the second unlocking instruction each have multiple forms, and different first unlocking instructions correspond to different second unlocking instructions.
Preferably, the constructing, by the internet of things lock, a corresponding lock end unlocking frame according to the first unlocking instruction includes:
the internet of things lock detects the first unlocking instruction and acquires the corresponding second unlocking instruction according to the first unlocking instruction;
and the internet of things lock randomly invokes a section of ordered change key and combines the ordered change key with the second unlocking instruction to generate a locking end unlocking frame.
Preferably, the generating, by the internet of things lock, a corresponding unlocking task code according to the lock end unlocking frame includes:
the internet of things lock generates a corresponding instruction code to be tested according to the second unlocking instruction in the lock end unlocking frame;
the internet of things lock generates a corresponding key code according to the ordered change key in the lock end unlocking frame;
and the Internet of things lock combines the instruction code to be detected with the key code to generate the unlocking task code.
Preferably, the cloud server generates a corresponding key unlocking frame according to the unlocking task code, and the step of sending the key unlocking frame to the intelligent terminal includes:
the cloud server generates a corresponding instruction input interface according to an instruction code to be detected in the unlocking task code;
the cloud server retrieves the orderly change key prestored in the cloud server according to the key code;
and the cloud server combines the instruction input interface with the ordered change key to generate a key unlocking frame.
Preferably, the step of receiving a second unlocking instruction input by a user, combining the second unlocking instruction with the key unlocking frame, and sending the combined key unlocking frame to the internet of things lock includes:
the intelligent terminal receives the key unlocking frame and displays the instruction input interface according to the key unlocking frame;
receiving the second unlocking instruction input by a user through the instruction input interface based on the key unlocking frame;
and the intelligent terminal sends the key unlocking frame to the internet of things lock.
In a second aspect, the present invention provides a task processing system based on an internet of things lock, including: the system comprises an Internet of things lock, an intelligent terminal and a cloud server; the internet of things lock, the intelligent terminal and the cloud server are used for realizing the task processing method based on the internet of things lock in the first aspect under the combined action.
The invention provides a task processing method and a task processing system based on an Internet of things lock, which have the following beneficial effects:
1. according to the method, the first unlocking instruction is sent to the internet of things lock through the intelligent terminal, the internet of things lock sends the corresponding unlocking task code to the cloud server, the cloud server generates the corresponding key unlocking frame according to the unlocking task code and transmits the corresponding key unlocking frame to the intelligent terminal, a user inputs the second unlocking instruction through the intelligent terminal, and the intelligent terminal combines the second unlocking instruction with the key unlocking frame and transmits the second unlocking instruction to the internet of things lock so as to unlock the internet of things lock, so that the safety of the internet of things lock is improved, and the problem that in the prior art, the internet of things lock is unlocked by others due to password theft is solved.
2. The first unlocking instruction comprises identification authentication of the intelligent terminal identification code, so that unlocking cannot be realized by inputting the unlocking instruction by using the intelligent terminal which is not registered at the lock of the Internet of things, and the safety of the lock of the Internet of things is improved.
3. The internet of things lock can be transferred through the cloud server to send the key unlocking frame to the intelligent terminal, and the cloud server only can send information to the registered intelligent terminal, so that even if the intelligent terminal is verified by bypassing the identification code through a hacking technology, the key unlocking frame cannot be obtained to input a second unlocking instruction.
4. The key unlocking frame contains a randomly generated ordered change key which is changed continuously along with time according to a preset rule, so that even if the key unlocking frame is constructed by a hacking technology and a second unlocking instruction is input, the ordered change key in the locking end unlocking frame in the Internet of things lock cannot be corresponding, and unlocking cannot be realized.
Drawings
Fig. 1 is a schematic step diagram of a task processing method based on an internet of things lock according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The same or similar reference numerals in the drawings of the present embodiment correspond to the same or similar components; in the description of the present invention, it should be understood that, if there is an azimuth or positional relationship indicated by terms such as "upper", "lower", "left", "right", etc., based on the azimuth or positional relationship shown in the drawings, it is only for convenience of describing the present invention and simplifying the description, but it is not indicated or implied that the apparatus or element referred to must have a specific azimuth, be constructed and operated in a specific azimuth, and thus terms describing the positional relationship in the drawings are merely illustrative and should not be construed as limitations of the present patent, and specific meanings of the terms described above may be understood by those skilled in the art according to specific circumstances.
The implementation of the present invention will be described in detail below with reference to specific embodiments.
Referring to FIG. 1, a preferred embodiment of the present invention is provided.
In a first aspect, the present invention provides a task processing method based on an internet of things lock, including:
s1: and the intelligent terminal receives a first unlocking instruction input by a user.
S2: and acquiring an identification code of the intelligent terminal based on an unlocking program preset in the intelligent terminal, generating an unlocking task request by combining the identification code with the first unlocking instruction, and sending the unlocking task request to an Internet of things lock.
S3: the internet of things lock receives the unlocking task request from the intelligent terminal, and identifies the identification code in the unlocking task request to detect whether the intelligent terminal sending the unlocking task request is registered in the internet of things lock.
S4: if the detection is passed, the Internet of things lock constructs a corresponding lock end unlocking frame according to the first unlocking instruction.
S5: and the internet of things lock generates a corresponding unlocking task code according to the lock end unlocking frame and uploads the unlocking task code to a cloud server.
S6: and the cloud server generates a corresponding key unlocking frame according to the unlocking task code and sends the key unlocking frame to the intelligent terminal.
S7: the intelligent terminal receives a second unlocking instruction input by a user, combines the second unlocking instruction with the key unlocking frame, and sends the combined key unlocking frame to the internet of things lock.
S8: the internet of things lock compares the key unlocking frame with the lock end unlocking frame, and if the key unlocking frame and the lock end unlocking frame pass the comparison, the internet of things lock executes an unlocking instruction.
Specifically, in one embodiment provided by the present invention, three devices are required: the intelligent terminal, the internet of things lock and the cloud server.
More specifically, the intelligent terminal needs to register in the internet of things lock in advance to acquire corresponding unlocking software, and a user can perform unlocking operation of the internet of things lock through the software.
More specifically, when a user needs to control the internet of things lock to unlock through the intelligent terminal, the user needs to input a first unlocking instruction through unlocking software, and the unlocking program can acquire the identification code of the intelligent terminal after receiving the first unlocking instruction and combine the identification code and transmit the identification code to the internet of things lock.
It should be noted that each intelligent terminal has a unique identification code, which can be used for distinguishing the intelligent terminal.
More specifically, after the internet of things lock receives the unlocking task request from the intelligent terminal, the identification code in the unlocking task request is identified, so as to detect whether the intelligent terminal sending the unlocking task request is registered in the internet of things lock.
It can be understood that when the unregistered intelligent terminal uses the unlocking software to send the first unlocking instruction, the first unlocking instruction cannot be identified and verified through the identification code of the internet of things lock, so that the intelligent terminal which is registered in the internet of things lock in advance is required to be used for unlocking the internet of things lock, the unlocking operation of people other than the user on the internet of things lock through the unregistered intelligent terminal is avoided, and the safety of the internet of things lock is improved.
Specifically, if the detection is passed, the internet of things lock constructs a corresponding lock end unlocking frame according to the first unlocking instruction, and generates a corresponding unlocking task code according to the lock end unlocking frame and uploads the unlocking task code to the cloud server.
Specifically, the cloud server generates a corresponding key unlocking frame according to the unlocking task code, and sends the key unlocking frame to the middle intelligent terminal.
More specifically, the intelligent terminal receives a second unlocking instruction input by a user, combines the second unlocking instruction with the key unlocking frame, sends the combined key unlocking frame to the internet of things lock, compares the key unlocking frame with the lock end unlocking frame by the internet of things lock, and if the comparison is passed, the internet of things lock executes the unlocking instruction.
In the above steps, there are three key points, firstly, performing a second unlocking verification outside the first unlocking instruction, secondly, performing transmission of the key unlocking frame through the cloud server, and thirdly, setting the lock end unlocking frame and the key unlocking frame.
Specifically, the aim of carrying out second unlocking verification outside the first unlocking instruction is to improve the safety of the internet of things lock, if the condition that the user intelligent terminal is stolen occurs, a stealer wants to open the internet of things lock through the intelligent terminal, then the first unlocking instruction and the second unlocking instruction need to be input, and the double unlocking instruction has more safety guarantee than the single unlocking instruction.
More specifically, the first unlocking instruction may have various forms, including a digital code, a pattern code, a fingerprint, etc., and the same form of first unlocking instruction may be provided in plurality, and different first unlocking instructions may correspond to different second unlocking instructions.
For example: the internet of things lock has a first unlock instruction [ number: 1, [ number: 2, [ pattern: 1, [ fingerprint: 1, and each first unlocking instruction corresponds to a second unlocking instruction respectively, and when a first unlocking instruction in one form is input, the unlocking can be realized only by inputting the corresponding second unlocking instruction.
Specifically, the purpose of the transmission of the key unlocking frame through the cloud server is to ensure that the determination of the execution unlocking instruction is the pre-registered intelligent terminal, and it can be understood that the identification code in the first unlocking instruction can be replaced by hacking technology, so that the unregistered intelligent terminal is used for passing the authentication of the identification code, and therefore, additional means are required to improve the security.
More specifically, the registration state of the intelligent terminal registered at the internet of things is stored in the cloud server, so when the cloud server sends the key unlocking frame to the intelligent terminal, the key unlocking frame is sent to the registered intelligent terminal according to the registration record, that is, the cloud server sends the key unlocking frame to the pre-registered intelligent terminal instead of bypassing the unregistered intelligent terminal identified by the identification code.
Specifically, the lock end unlocking frame and the key unlocking frame are an information set, wherein the lock end unlocking frame and the key unlocking frame at least comprise two parts: an unlock information section and a security information section.
Specifically, the unlocking information part in the lock end unlocking frame is a second unlocking instruction corresponding to the first unlocking instruction, and the unlocking information part in the key unlocking frame is an instruction input interface for inputting the second unlocking instruction.
More specifically, the security information part is randomly generated by the internet of things lock, and when the lock end unlocking frame and the key unlocking frame are in correspondence, unlocking of the internet of things lock can be achieved, and it can be understood that, since the security information part exists in the lock end unlocking frame and the key unlocking frame and is generated by the internet of things lock and is transmitted to the registered intelligent terminal through the cloud server, even if the second unlocking instruction is directly transmitted through a hacking technology, the security information part is lack, so that the key unlocking frame cannot be formed, cannot correspond to the lock end unlocking frame, and therefore cannot be unlocked, that is, even if the first unlocking instruction and the corresponding second unlocking instruction are leaked, the internet of things lock is still in a secure state as long as the intelligent terminal is not lost.
The invention provides a task processing method and a task processing system based on an Internet of things lock, which have the following beneficial effects:
1. according to the method, the first unlocking instruction is sent to the internet of things lock through the intelligent terminal, the internet of things lock sends the corresponding unlocking task code to the cloud server, the cloud server generates the corresponding key unlocking frame according to the unlocking task code and transmits the corresponding key unlocking frame to the intelligent terminal, a user inputs the second unlocking instruction through the intelligent terminal, and the intelligent terminal combines the second unlocking instruction with the key unlocking frame and transmits the second unlocking instruction to the internet of things lock so as to unlock the internet of things lock, so that the safety of the internet of things lock is improved, and the problem that in the prior art, the internet of things lock is unlocked by others due to password theft is solved.
2. The first unlocking instruction comprises identification authentication of the intelligent terminal identification code, so that unlocking cannot be realized by inputting the unlocking instruction by using the intelligent terminal which is not registered at the lock of the Internet of things, and the safety of the lock of the Internet of things is improved.
3. The internet of things lock can be transferred through the cloud server to send the key unlocking frame to the intelligent terminal, and the cloud server only can send information to the registered intelligent terminal, so that even if the intelligent terminal is verified by bypassing the identification code through a hacking technology, the key unlocking frame cannot be obtained to input a second unlocking instruction.
4. The key unlocking frame contains a randomly generated ordered change key which is changed continuously along with time according to a preset rule, so that even if the key unlocking frame is constructed by a hacking technology and a second unlocking instruction is input, the ordered change key in the locking end unlocking frame in the Internet of things lock cannot be corresponding, and unlocking cannot be realized.
Preferably, the first unlocking instruction and the second unlocking instruction have multiple forms, and the first unlocking instruction with different forms corresponds to the second unlocking instruction with different forms.
Preferably, the constructing, by the internet of things lock, a corresponding lock end unlocking frame according to the first unlocking instruction includes:
s41: the internet of things lock detects the first unlocking instruction, and obtains the corresponding second unlocking instruction according to the first unlocking instruction.
S42: and the internet of things lock randomly invokes a section of ordered change key and combines the ordered change key with the second unlocking instruction to generate a locking end unlocking frame.
Specifically, the intelligent terminals are registered in advance in the internet of things lock, and one intelligent terminal can set an array unlocking instruction when registering, wherein each array unlocking instruction comprises a first unlocking instruction and a second unlocking instruction.
It can be understood that when the internet of things lock receives the first unlocking instruction, a corresponding second unlocking instruction is generated to form the lock end unlocking frame.
More specifically, the ordered change key is a piece of encrypted digital information, the encrypted digital information can be transformed along with time according to a preset rule, a plurality of sections of ordered change keys are arranged in the internet of things lock, and a section of ordered change key can be randomly extracted when a lock end unlocking frame is generated, so that the unlocking safety is improved.
Preferably, the generating, by the internet of things lock, a corresponding unlocking task code according to the lock end unlocking frame includes:
s51: and the Internet of things lock generates a corresponding instruction code to be detected according to the second unlocking instruction in the lock end unlocking frame.
S52: and the internet of things lock generates a corresponding key code according to the ordered change key in the lock end unlocking frame.
S53: and the Internet of things lock combines the instruction code to be detected with the key code to generate the unlocking task code.
Specifically, the different first unlocking instructions correspond to the different second unlocking instructions, so that different to-be-tested instruction codes are given to the different first unlocking instructions, and therefore, the different to-be-tested instruction codes can correspond to the different second unlocking instructions.
More specifically, different ordered changing keys have different key encodings.
Preferably, the cloud server generates a corresponding key unlocking frame according to the unlocking task code, and the step of sending the key unlocking frame to the intelligent terminal includes:
s61: and the cloud server generates a corresponding instruction input interface according to the instruction code to be detected in the unlocking task code.
S62: and the cloud server invokes the orderly change key prestored in the cloud server according to the key code.
S63: and the cloud server combines the instruction input interface with the ordered change key to generate a key unlocking frame.
Specifically, each second unlocking instruction and the orderly change key preset by the intelligent terminal are also stored in the cloud server.
More specifically, when the cloud server receives the unlock task code, the cloud server receives the to-be-detected instruction code and the key code, and when the cloud server receives the to-be-detected instruction code, the cloud server knows what the second unlock instruction is in, the corresponding instruction is input into the interface for the user to input on the intelligent terminal, the key code corresponds to the ordered change key, and the cloud server retrieves the corresponding ordered change key according to the key code.
More specifically, the cloud server generates a key unlocking frame by combining the instruction input interface and the ordered change key, and transmits the key unlocking frame to the intelligent terminal.
Preferably, the step of receiving a second unlocking instruction input by a user, combining the second unlocking instruction with the key unlocking frame, and sending the combined key unlocking frame to the internet of things lock includes:
s71: and the intelligent terminal receives the key unlocking frame and displays the instruction input interface according to the key unlocking frame.
S72: and the key unlocking frame receives the second unlocking instruction input by the user through the instruction input interface.
S73: and the intelligent terminal sends the key unlocking frame to the internet of things lock.
Specifically, the key unlocking frame includes two parts: an unlocking information part and a security information part, wherein, when the key unlocking frame is transmitted to the intelligent terminal, the key unlocking frame is incomplete, the unlocking information part is input by a user through the intelligent terminal, and therefore, the unlocking information part is required to be in a form of: and an instruction input interface for a user to input a second unlocking instruction.
More specifically, a user inputs a second unlocking instruction through an instruction input interface, and the key unlocking frame at the moment is in a complete form, namely comprises an unlocking information part and a safety information part, and the intelligent terminal sends the key unlocking frame to the internet of things lock so as to correspond to a locking end unlocking frame in the internet of things lock, so that unlocking of the internet of things lock is realized.
In a second aspect, the present invention provides a task processing system based on an internet of things lock, including: the system comprises an Internet of things lock, an intelligent terminal and a cloud server; the internet of things lock, the intelligent terminal and the cloud server are used for realizing the task processing method based on the internet of things lock in the first aspect under the combined action.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.
Claims (5)
1. The task processing method based on the Internet of things lock is characterized by comprising the following steps of:
the intelligent terminal receives a first unlocking instruction input by a user;
acquiring an identification code of the intelligent terminal based on an unlocking program preset in the intelligent terminal, generating an unlocking task request by combining the identification code with the first unlocking instruction, and sending the unlocking task request to an internet of things lock;
the internet of things lock receives the unlocking task request from the intelligent terminal, and identifies the identification code in the unlocking task request to detect whether the intelligent terminal sending the unlocking task request is registered in the internet of things lock;
if the detection is passed, the Internet of things lock constructs a corresponding lock end unlocking frame according to the first unlocking instruction; the method for constructing the corresponding lock end unlocking frame by the internet of things lock according to the first unlocking instruction comprises the following steps: the internet of things lock detects the first unlocking instruction and acquires a corresponding second unlocking instruction according to the first unlocking instruction; the internet of things lock randomly invokes a section of ordered change key, and combines the ordered change key with the second unlocking instruction to generate a locking end unlocking frame;
the internet of things lock generates a corresponding unlocking task code according to the lock end unlocking frame, and uploads the unlocking task code to a cloud server;
the cloud server generates a corresponding key unlocking frame according to the unlocking task code and sends the key unlocking frame to the intelligent terminal;
the intelligent terminal receives a second unlocking instruction input by a user, combines the second unlocking instruction with the key unlocking frame, and sends the combined key unlocking frame to the internet of things lock; the first unlocking instruction and the second unlocking instruction are in various forms, and different first unlocking instructions correspond to different second unlocking instructions;
the internet of things lock compares the key unlocking frame with the lock end unlocking frame, and if the key unlocking frame and the lock end unlocking frame pass the comparison, the internet of things lock executes an unlocking instruction; the lock end unlocking frame and the key unlocking frame at least comprise two parts: the unlocking information part in the lock end unlocking frame is a second unlocking instruction corresponding to the first unlocking instruction, and the unlocking information part in the key unlocking frame is an instruction input interface for inputting the second unlocking instruction; the safety information part in the lock end unlocking frame is randomly generated by the Internet of things lock, the safety information part in the key unlocking frame is called from the cloud server, and when the lock end unlocking frame and the key unlocking frame are in correspondence, unlocking of the Internet of things lock can be achieved.
2. The task processing method based on the internet of things lock according to claim 1, wherein the step of generating the corresponding unlocking task code by the internet of things lock according to the lock end unlocking frame comprises the following steps:
the internet of things lock generates a corresponding instruction code to be tested according to the second unlocking instruction in the lock end unlocking frame;
the internet of things lock generates a corresponding key code according to the ordered change key in the lock end unlocking frame;
and the Internet of things lock combines the instruction code to be detected with the key code to generate the unlocking task code.
3. The task processing method based on the internet of things lock according to claim 2, wherein the cloud server generates a corresponding key unlocking frame according to the unlocking task code, and the step of transmitting the key unlocking frame to the intelligent terminal comprises the following steps:
the cloud server generates a corresponding instruction input interface according to an instruction code to be detected in the unlocking task code;
the cloud server invokes an orderly change key prestored in the cloud server according to the key code;
and the cloud server combines the instruction input interface with the ordered change key prestored in the cloud server to generate a key unlocking frame.
4. The task processing method based on the internet of things lock according to claim 3, wherein the intelligent terminal receives a second unlocking instruction input by a user, combines the second unlocking instruction with the key unlocking frame, and sends the combined key unlocking frame to the internet of things lock, the method comprising the steps of:
the intelligent terminal receives the key unlocking frame and displays the instruction input interface according to the key unlocking frame;
receiving the second unlocking instruction input by a user through the instruction input interface based on the key unlocking frame;
and the intelligent terminal sends the key unlocking frame with the second unlocking instruction to the internet of things lock.
5. Task processing system based on thing networking lock, characterized by, include: the system comprises an Internet of things lock, an intelligent terminal and a cloud server; the internet of things lock, the intelligent terminal and the cloud server are used for realizing the task processing method based on the internet of things lock according to any one of claims 1-4 under the combined action.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310833761.4A CN116563985B (en) | 2023-07-10 | 2023-07-10 | Task processing method and system based on Internet of things lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310833761.4A CN116563985B (en) | 2023-07-10 | 2023-07-10 | Task processing method and system based on Internet of things lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116563985A CN116563985A (en) | 2023-08-08 |
CN116563985B true CN116563985B (en) | 2023-09-05 |
Family
ID=87496870
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310833761.4A Active CN116563985B (en) | 2023-07-10 | 2023-07-10 | Task processing method and system based on Internet of things lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116563985B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021607A (en) * | 2014-05-30 | 2014-09-03 | 深圳市智莱科技有限公司 | Storage box door opening method |
CN104112306A (en) * | 2014-05-21 | 2014-10-22 | 福建三鑫隆新材料技术开发股份有限公司 | Remote-authorization unlocking method of passive labeled electronic lock |
CN107845171A (en) * | 2017-11-13 | 2018-03-27 | 广东乐心医疗电子股份有限公司 | Method and system for unlocking Internet of things intelligent lock by using wearable device |
CN109712287A (en) * | 2018-12-26 | 2019-05-03 | 浙江添锦建筑装饰工程有限公司 | A kind of intelligent district access control system |
CN109979053A (en) * | 2019-03-13 | 2019-07-05 | 许昌学院 | A kind of offline model Internet of Things lock device and cipher key transmission methods based on MULTIPLE DYNAMIC key |
CN112330855A (en) * | 2020-10-15 | 2021-02-05 | 成都市以太节点科技有限公司 | Electronic lock safety management method, equipment and system |
CN114299645A (en) * | 2022-01-12 | 2022-04-08 | 初蓝物联科技(上海)有限公司 | Encryption communication method for padlock of Internet of things |
CN114999030A (en) * | 2022-05-25 | 2022-09-02 | 杭州萤石软件有限公司 | Unlocking method, system, electronic device and storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060170533A1 (en) * | 2005-02-03 | 2006-08-03 | France Telecom | Method and system for controlling networked wireless locks |
US10733819B2 (en) * | 2018-12-21 | 2020-08-04 | 2162256 Alberta Ltd. | Secure and automated vehicular control using multi-factor authentication |
JP7364223B2 (en) * | 2020-01-24 | 2023-10-18 | 株式会社Roseraie | Electronic lock system, method implemented on electronic lock system, mobile terminal, method implemented on mobile terminal, and computer program |
US11270539B2 (en) * | 2020-04-20 | 2022-03-08 | Sling Media L.L.C. | Keyless entry utilizing set-back box |
-
2023
- 2023-07-10 CN CN202310833761.4A patent/CN116563985B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104112306A (en) * | 2014-05-21 | 2014-10-22 | 福建三鑫隆新材料技术开发股份有限公司 | Remote-authorization unlocking method of passive labeled electronic lock |
CN104021607A (en) * | 2014-05-30 | 2014-09-03 | 深圳市智莱科技有限公司 | Storage box door opening method |
CN107845171A (en) * | 2017-11-13 | 2018-03-27 | 广东乐心医疗电子股份有限公司 | Method and system for unlocking Internet of things intelligent lock by using wearable device |
CN109712287A (en) * | 2018-12-26 | 2019-05-03 | 浙江添锦建筑装饰工程有限公司 | A kind of intelligent district access control system |
CN109979053A (en) * | 2019-03-13 | 2019-07-05 | 许昌学院 | A kind of offline model Internet of Things lock device and cipher key transmission methods based on MULTIPLE DYNAMIC key |
CN112330855A (en) * | 2020-10-15 | 2021-02-05 | 成都市以太节点科技有限公司 | Electronic lock safety management method, equipment and system |
CN114299645A (en) * | 2022-01-12 | 2022-04-08 | 初蓝物联科技(上海)有限公司 | Encryption communication method for padlock of Internet of things |
CN114999030A (en) * | 2022-05-25 | 2022-09-02 | 杭州萤石软件有限公司 | Unlocking method, system, electronic device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN116563985A (en) | 2023-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105279832B (en) | Intelligent door lock system and its control method | |
EP1384131B1 (en) | Remote authentification of fingerprints over an insecure network | |
US8041954B2 (en) | Method and system for providing a secure login solution using one-time passwords | |
US6970853B2 (en) | Method and system for strong, convenient authentication of a web user | |
CA2636453C (en) | Multisystem biometric token | |
JP4422088B2 (en) | Image array type authentication system | |
CN105516195B (en) | A kind of security certification system and its authentication method based on application platform login | |
US20090265555A1 (en) | Methods and apparatus for credential validation | |
WO1995019593A1 (en) | A computer security system | |
CN107989514A (en) | There is the safety box of dynamic password | |
CN101174953A (en) | A Method of Identity Authentication Based on S/Key System | |
CN104735168A (en) | Unlocking method of network-based password generation and decryption | |
CN107564159A (en) | A kind of smart bluetooth locks group's management control system | |
CN108920919A (en) | Control method, device and system of interactive intelligent equipment | |
CN110650021A (en) | Authentication terminal network real-name authentication method and system | |
CN116543486A (en) | Offline control method of coded lock and coded lock system | |
CN113971849A (en) | Dynamic coded lock with management system | |
CN116563985B (en) | Task processing method and system based on Internet of things lock | |
CN113593088A (en) | Intelligent unlocking method, intelligent lock, mobile terminal and server | |
WO2003015011A1 (en) | Authentication method using biometric information | |
KR20110112089A (en) | Security Enhanced User Authentication Processing Method and Device | |
JP2004070814A (en) | Server security management method, device and program | |
Satanasaowapak et al. | Residential access control system using QR code and the IoT | |
JP2001005784A (en) | Device and method for collating password | |
CN105991821A (en) | Antitheft processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |