[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110930552A - Unlocking method, equipment and storage medium based on two-dimensional code - Google Patents

Unlocking method, equipment and storage medium based on two-dimensional code Download PDF

Info

Publication number
CN110930552A
CN110930552A CN201911182921.3A CN201911182921A CN110930552A CN 110930552 A CN110930552 A CN 110930552A CN 201911182921 A CN201911182921 A CN 201911182921A CN 110930552 A CN110930552 A CN 110930552A
Authority
CN
China
Prior art keywords
key information
door lock
dimensional code
intelligent door
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911182921.3A
Other languages
Chinese (zh)
Inventor
沈汉标
王妙玉
童威云
吴宁泉
吴逊烈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Ketyoo Intelligent Technology Co Ltd
Original Assignee
Guangdong Ketyoo Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Ketyoo Intelligent Technology Co Ltd filed Critical Guangdong Ketyoo Intelligent Technology Co Ltd
Priority to CN201911182921.3A priority Critical patent/CN110930552A/en
Publication of CN110930552A publication Critical patent/CN110930552A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a method, equipment and a storage medium for unlocking based on a two-dimensional code, which comprises the following steps of S10, connecting an intelligent door lock with a cloud server, and issuing key information to the bound intelligent door lock by the cloud server; s20, the intelligent door lock receives the key information and responds to the cloud server; s30, the cloud server receives the response information of the intelligent door lock and sends the key information to the terminal server; s40, the terminal server generates a two-dimensional code containing key information and sends the two-dimensional code to the mobile terminal; s50, scanning and verifying the two-dimensional code of the mobile terminal by the intelligent door lock. According to the intelligent door lock, the intelligent door lock is opened by scanning the two-dimensional code with certain condition limitation, so that the problem of managing the access control permission of a hotel or other public places is solved, and the use safety of the intelligent door lock is improved.

Description

Unlocking method, equipment and storage medium based on two-dimensional code
Technical Field
The invention relates to the technical field of intelligent lock development, in particular to a method, equipment and a storage medium for unlocking based on a two-dimensional code.
Background
With the rapid development of security and protection technology, the intelligent door lock gradually enters thousands of households, occupies an important position in the intelligent home, is a lock different from the traditional mechanical lock, can be opened through instructions such as sound, fingerprints and human faces, is more intelligent, simple and convenient in the aspects of user safety, identification and manageability, and has wide application in the field of intelligent home. However, the above unlocking method is troublesome in setting process, and many steps are required for changing. The intelligent door lock can only be opened by an administrator with management authority, and is not convenient and fast enough. If the unlocking password or the key is directly given to the visitor, the password may be leaked, and a situation that a stranger illegally breaks in the password may occur, so that the safety cannot be guaranteed.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention aims to provide a method, equipment and a storage medium for unlocking based on a two-dimension code, the intelligent door lock is unlocked by scanning the two-dimension code with certain condition limitation through the intelligent door lock, the problem of managing access control permission in hotels or other public places is solved, and the use safety of the intelligent door lock is improved.
One of the purposes of the invention is realized by adopting the following technical scheme:
a method for unlocking based on a two-dimensional code comprises the following steps:
s10, the intelligent door lock is connected with the cloud server, and the cloud server issues key information to the bound intelligent door lock;
s20, the intelligent door lock receives the key information and responds to the cloud server;
s30, the cloud server receives the response information of the intelligent door lock and sends the key information to the terminal server;
s40, the terminal server generates a two-dimensional code containing key information and sends the two-dimensional code to the mobile terminal;
s50, scanning and verifying the two-dimensional code of the mobile terminal by the intelligent door lock.
Further, S50 further includes the following steps:
and S51, the intelligent door lock analyzes the two-dimensional code, and the key information of the two-dimensional code is verified by combining the key information stored by the intelligent door lock.
Further, the method also comprises S52, verifying whether the key information is consistent with the key information stored by the intelligent door lock, if the key information of the two-dimensional code is consistent with the key information of the intelligent door lock, the verification is successful, and the intelligent door lock is opened; and if the key information of the two-dimensional code is inconsistent with the key information of the intelligent door lock, the verification fails and the unlocking cannot be performed.
Further, after the verification is successful, the intelligent door lock informs the cloud server that the key information is consumed, and the cloud server destroys the key information.
Further, still include: s60, the cloud server polls the key information, verifies whether the key information meets the failure condition, and if the key information meets the failure condition, sends a key destroying instruction to control the intelligent door lock to destroy the key information.
Further, S20 further includes the following steps:
and S21, the intelligent door lock stores the key information in the memory of the lock end module.
Further, the failure condition is that the number of times of using the key information reaches a preset number of times, or the time of using the key information exceeds a preset duration.
Further, the S52 further includes: if the verification fails, the intelligent door lock starts the camera device to record and send the record to the cloud server and the mobile terminal.
The second purpose of the invention is realized by adopting the following technical scheme:
an apparatus comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the processor implementing a method for unlocking based on two-dimensional code as described above when executing the computer program.
The third purpose of the invention is realized by adopting the following technical scheme:
a storage medium having stored thereon a computer program which, when executed, implements a method of unlocking based on a two-dimensional code as described above.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a method, equipment and a storage medium for unlocking based on a two-dimension code, and an intelligent door lock scans and verifies the two-dimension code containing key information to control access control. The entrance guard unlocking convenience is improved when visitors are received in public places such as hotels and houses, meanwhile, the safety and the privacy of the entrance guard unlocking convenience are improved, the complex procedures of manual registration and identity verification of visitors or consumers are reduced, the management cost is reduced, and meanwhile, higher safety is guaranteed.
Drawings
FIG. 1 is a schematic flow chart of a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of a second embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Example one
As shown in fig. 1, the invention provides a method for unlocking based on a two-dimensional code, which comprises the following steps:
and S10, binding the intelligent door lock by the administrator, connecting the intelligent door lock with the cloud server, and sending the key information to the bound intelligent door lock by the cloud server.
And S20, the intelligent door lock receives the key information, synchronizes the key information to a lock end module memory of the intelligent door lock, and responds to the cloud server.
And S30, the cloud server receives the response information of the intelligent door lock and sends the key information to the terminal server. And the cloud server receives the response information of the intelligent door lock, represents that the intelligent door lock has received the key information and is stored, and can perform scanning verification at any time. Therefore, the cloud server sends the key information to the terminal server for the terminal server to generate the two-dimensional code.
And S40, the terminal server receives the key information, generates a two-dimensional code containing the key information and sends the two-dimensional code to the mobile terminal. The terminal server can establish connection with the mobile terminal according to communication modes such as a WiFi module or a Bluetooth module and the like, and transmits the two-dimensional code. In the present application, the mobile terminal may refer to a device capable of taking pictures or displaying pictures, such as a mobile phone and a tablet, used by an administrator or a visitor, or may refer to a two-dimensional code photo printed or sent to the visitor by the administrator, which is not limited again.
S50, scanning and verifying the two-dimensional code of the mobile terminal by the intelligent door lock. The user sweeps the code opening to the lock end of intelligent lock by virtue of the two-dimensional code containing the secret key information, awakens the lock end of the intelligent lock to sweep the code opening, and scans and verifies. The specific process also comprises the following steps:
and S51, the intelligent door lock analyzes the two-dimensional code, and the key information of the two-dimensional code is verified by combining the key information stored by the intelligent door lock.
And S52, verifying whether the key information is consistent with the key information stored by the intelligent door lock, if so, successfully verifying, and opening the intelligent door lock. And the intelligent door lock informs the cloud server that the key information is consumed, and the cloud server destroys the key information. If the key information of the two-dimensional code is inconsistent with the key information of the intelligent door lock, the verification fails, the lock cannot be unlocked, and the intelligent door lock starts a camera device to record and send the record to a cloud server and a mobile terminal. The intelligent door lock starts the camera device, shoots the external condition of intelligent door lock to upload cloud platform and mobile terminal, expert administrator looks over and in time handles, improves the security performance that uses the two-dimensional code to unblank.
And more than two, the method further comprises the step of S60, the cloud server polls the cloud server to poll the key information, whether the key information meets the failure condition is verified, and if the key information meets the failure condition, a key destroying instruction is sent out to control the intelligent door lock to destroy the key information. The cloud server issues the key information to the intelligent door lock again, wherein the preset failure condition is that the using times of the key information reach the preset times, or the using time of the key information exceeds the preset duration. The preset times can be set by the user, generally set to 1 time, and the intelligent door lock can not be opened by scanning the two-dimensional code again after being used. The preset time duration can be set to be 1 hour or 1 day, the time when the intelligent door lock receives the key information is used as the effective starting time of the key information, the key information is effective within the time of adding the preset time duration to the starting time, and a user can open the intelligent door lock through the two-dimensional code containing the key information. And after the time is exceeded, the cloud server can judge that the key information is invalid and cannot open the intelligent door lock. And judging that the key information does not meet the failure condition at the cloud server, if the key information is valid, and still opening the intelligent door lock.
If the user takes the invalidated two-dimensional code, the terminal server needs to obtain the two-dimensional code containing the new key information again, and S50 is executed again.
According to the two-dimension code unlocking method, the intelligent door lock scans and verifies the two-dimension code containing the key information to control the access control, so that the convenience of unlocking the access control (passage and elevator) when the visitor is received in public places such as hotels and houses is improved, the safety and the privacy of the access control are improved, the complicated procedures of manual registration and identity verification of visitors or consumers are reduced, the management cost is reduced, and the higher safety is guaranteed.
In addition, the invention also provides a storage medium, wherein the storage medium stores a computer program, and the computer program realizes the steps of the method for alarming the abnormality of the intelligent door lock system when being executed by the processor.
Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution media, and the like. It should be noted that the computer-readable medium may contain any suitable combination of elements that may be modified in accordance with the requirements of statutory and patent practice in the jurisdiction, for example, in some jurisdictions, computer-readable media may not contain electrical carrier signals or telecommunications signals in accordance with statutory and patent practice.
The invention is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like, as in embodiment two.
Example two
An electronic device, as shown in fig. 2, includes a memory, a processor, and a program stored in the memory, the program is configured to be executed by the processor, and the processor executes the program to implement the above-mentioned method steps of unlocking based on a two-dimensional code.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general processor can be a microprocessor or the processor can be any conventional processor and the like, the processor is a control center of the intelligent door lock, and various interfaces and lines are utilized to connect various parts of a two-dimensional code-based unlocking method.
The memory can be used for storing computer programs and/or modules, and the processor can realize various functions of the unlocking method based on the two-dimensional code by operating or executing the computer programs and/or modules stored in the memory and calling the data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) of the at least one function station advocate, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash-Card) at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.

Claims (10)

1. A method for unlocking based on a two-dimensional code is characterized by comprising the following steps:
s10, the intelligent door lock is connected with the cloud server, and the cloud server issues key information to the bound intelligent door lock;
s20, the intelligent door lock receives the key information and responds to the cloud server;
s30, the cloud server receives the response information of the intelligent door lock and sends the key information to the terminal server;
s40, the terminal server generates a two-dimensional code containing key information and sends the two-dimensional code to the mobile terminal;
s50, scanning and verifying the two-dimensional code of the mobile terminal by the intelligent door lock.
2. The method for unlocking based on the two-dimensional code as claimed in claim 1, wherein the S50 further comprises the following steps:
and S51, the intelligent door lock analyzes the two-dimensional code, and the key information of the two-dimensional code is verified by combining the key information stored by the intelligent door lock.
3. The method for unlocking based on the two-dimensional code as claimed in claim 2, further comprising S52, verifying whether the key information is consistent with the key information stored in the smart door lock, if the key information of the two-dimensional code is consistent with the key information of the smart door lock, the verification is successful, and the smart door lock is opened; and if the key information of the two-dimensional code is inconsistent with the key information of the intelligent door lock, the verification fails and the unlocking cannot be performed.
4. The method for unlocking based on the two-dimensional code of claim 3, wherein after the verification is successful, the smart door lock informs the cloud server that the key information is consumed, and the cloud server destroys the key information.
5. The method for unlocking based on the two-dimensional code as claimed in claim 1, further comprising the steps of:
s60, the cloud server polls the key information, verifies whether the key information meets the failure condition, and if the key information meets the failure condition, sends a key destroying instruction to control the intelligent door lock to destroy the key information.
6. The method for unlocking based on the two-dimensional code as claimed in claim 1, wherein the S20 further comprises the following steps:
and S21, the intelligent door lock stores the key information in the memory of the lock end module.
7. The method for unlocking based on the two-dimensional code as claimed in claim 5, wherein the failure condition is that the number of times of using the key information reaches a preset number of times, or the time of using the key information exceeds a preset duration.
8. The method for unlocking based on the two-dimensional code as claimed in claim 3, wherein the S52 further comprises: if the verification fails, the intelligent door lock starts the camera device to record and send the record to the cloud server and the mobile terminal.
9. An apparatus, comprising a processor, a memory, and a computer program stored on the memory and operable on the processor, wherein the processor executes the computer program to implement the method for unlocking based on two-dimensional code according to any one of claims 1 to 8.
10. A storage medium having stored thereon a computer program which, when executed, implements a method of unlocking based on a two-dimensional code according to any one of claims 1 to 8.
CN201911182921.3A 2019-11-27 2019-11-27 Unlocking method, equipment and storage medium based on two-dimensional code Pending CN110930552A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911182921.3A CN110930552A (en) 2019-11-27 2019-11-27 Unlocking method, equipment and storage medium based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911182921.3A CN110930552A (en) 2019-11-27 2019-11-27 Unlocking method, equipment and storage medium based on two-dimensional code

Publications (1)

Publication Number Publication Date
CN110930552A true CN110930552A (en) 2020-03-27

Family

ID=69846667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911182921.3A Pending CN110930552A (en) 2019-11-27 2019-11-27 Unlocking method, equipment and storage medium based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN110930552A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111526210A (en) * 2020-05-06 2020-08-11 广东纬德信息科技股份有限公司 Distribution network safety intelligent cabinet system, control method, medium and terminal equipment
CN114189863A (en) * 2021-12-16 2022-03-15 青岛海尔科技有限公司 Binding method and device of intelligent door lock, storage medium and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063935A (en) * 2014-06-30 2014-09-24 深圳市同创新佳科技有限公司 Hotel guest room management method and system based on electronic key management server
CN105261096A (en) * 2015-10-26 2016-01-20 东莞市点开网络科技有限公司 Network smart lock system
CN105427416A (en) * 2015-11-04 2016-03-23 广东安居宝数码科技股份有限公司 Two-dimension code unlocking method and system
CN107195038A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 A kind of intelligent cloud lock system and method for unlocking based on Quick Response Code
CN109493460A (en) * 2018-09-18 2019-03-19 徐州展元信息技术有限公司 Two dimensional code intelligent unlocking system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063935A (en) * 2014-06-30 2014-09-24 深圳市同创新佳科技有限公司 Hotel guest room management method and system based on electronic key management server
CN105261096A (en) * 2015-10-26 2016-01-20 东莞市点开网络科技有限公司 Network smart lock system
CN105427416A (en) * 2015-11-04 2016-03-23 广东安居宝数码科技股份有限公司 Two-dimension code unlocking method and system
CN107195038A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 A kind of intelligent cloud lock system and method for unlocking based on Quick Response Code
CN109493460A (en) * 2018-09-18 2019-03-19 徐州展元信息技术有限公司 Two dimensional code intelligent unlocking system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111526210A (en) * 2020-05-06 2020-08-11 广东纬德信息科技股份有限公司 Distribution network safety intelligent cabinet system, control method, medium and terminal equipment
CN114189863A (en) * 2021-12-16 2022-03-15 青岛海尔科技有限公司 Binding method and device of intelligent door lock, storage medium and electronic device
CN114189863B (en) * 2021-12-16 2024-03-22 青岛海尔科技有限公司 Binding method and device of intelligent door lock, storage medium and electronic device

Similar Documents

Publication Publication Date Title
AU2016273890B2 (en) Controlling physical access to secure areas via client devices in a networked environment
KR100705325B1 (en) RF-ID tag reading system for using password and method thereof
US8176323B2 (en) Radio frequency identification (RFID) based authentication methodology using standard and private frequency RFID tags
US9854431B2 (en) Method, apparatus, and system of distributing data of virtual subscriber identity module
CN108632253B (en) Client data security access method and device based on mobile terminal
CN108307674A (en) A kind of method and apparatus ensureing terminal security
US10185816B2 (en) Controlling user access to electronic resources without password
CN103907328A (en) Mobile Device Based Authentication
CN107979571B (en) File use processing method, terminal and server
CN103581378A (en) Smart phone high in safety performance
CN105550591A (en) Security protection device and method for user data in mobile terminal
CN103576787A (en) Panel computer with high safety performance
WO2020253197A1 (en) Method and apparatus for managing virtual user identification card, terminal device and storage medium
CN205230158U (en) Access control system based on two -dimensional code
CN110930552A (en) Unlocking method, equipment and storage medium based on two-dimensional code
RU2596587C2 (en) Mobile communication device
CN103582184A (en) Double-card smart phone high in safety performance
US10819711B2 (en) Data access method, user equipment and server
EP3926992B1 (en) Electronic device, and authentication method in electronic device
KR101294805B1 (en) 2-channel authentication method and system based on authentication application
US20210111885A1 (en) Electronic access control multi-factor authentication using centralized hardware secured credential system and methods of use thereof
CN111063061A (en) Method, equipment and storage medium for using temporary password for intelligent door lock
CN110881182B (en) Terminal and intelligent Bluetooth lock verification method, bluetooth lock and storage medium
CN106330899A (en) Private cloud device account management method and system, electronic device and server
JP2005301454A (en) User identification system and charger/radio ic chip reader

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327