CN111080853A - Intelligent door lock system, unlocking method, device, equipment and medium - Google Patents
Intelligent door lock system, unlocking method, device, equipment and medium Download PDFInfo
- Publication number
- CN111080853A CN111080853A CN201911330958.6A CN201911330958A CN111080853A CN 111080853 A CN111080853 A CN 111080853A CN 201911330958 A CN201911330958 A CN 201911330958A CN 111080853 A CN111080853 A CN 111080853A
- Authority
- CN
- China
- Prior art keywords
- verification
- door lock
- intelligent door
- information
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012795 verification Methods 0.000 claims abstract description 646
- 230000008859 change Effects 0.000 claims description 29
- 230000015654 memory Effects 0.000 claims description 24
- 238000004590 computer program Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 13
- 238000010200 validation analysis Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 18
- 238000004891 communication Methods 0.000 description 16
- 230000008569 process Effects 0.000 description 12
- 230000006870 function Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 230000001934 delay Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an intelligent door lock system, an unlocking method, an unlocking device, equipment and a medium, which are used for improving the safety of an intelligent door lock. According to the embodiment of the invention, when the verification of the received verification information is passed through the intelligent door lock, a verification instruction is sent to the currently connected mobile terminal, a first data packet carrying the identification information and the first verification code of the intelligent door lock is sent to the server, after the verification instruction sent by the intelligent door lock is received by the mobile terminal, a second data packet carrying the identification information and the second verification code of the intelligent door lock is also sent to the server, whether the first verification code and the second verification code for verification are consistent or not is determined by the server according to the identification information of the intelligent door lock in the received first data packet and the second data packet, if so, a first verification passing instruction is sent to the intelligent door lock, the intelligent door lock is opened after receiving the first verification passing instruction, and the safety of the intelligent door lock is ensured through multiple verifications of the mobile terminal and the server.
Description
Technical Field
The invention relates to the technical field of intelligent home, in particular to an intelligent door lock system, an unlocking method, an unlocking device, equipment and a medium.
Background
Along with the development of science and technology, the types of intelligent products are more and more, and intelligent household products are also widely applied to daily life. Taking the smart door lock as an example, more and more users begin to use the smart door lock due to the convenience that the user can enter the home without carrying a key with him. Therefore, how to improve the security of the smart door lock becomes a hot point of research in recent years.
In the prior art, the safety of the intelligent door lock is improved through a safety verification mode. Specifically, the traditional intelligent door lock on the market mostly adopts the security verification mode of fingerprint, and/or password, unblanks to improve the security of intelligent door lock, thereby realize the function of theftproof. However, in the security authentication mode, the fingerprint and/or password of the user can be acquired and copied by a lawbreaker, so that the security of the intelligent door lock cannot be effectively guaranteed.
Disclosure of Invention
The embodiment of the invention provides an intelligent door lock system, an unlocking method, an unlocking device, equipment and a medium, which are used for improving the safety of an intelligent door lock.
The embodiment of the invention provides an intelligent door lock system, which comprises a server, an intelligent door lock and a mobile terminal, wherein the server is connected with the intelligent door lock;
the intelligent door lock is used for sending a verification instruction to the currently connected mobile terminal when the received first verification information passes verification, and sending a first data packet carrying the identification information and the first verification code of the intelligent door lock to the server; after a first verification passing instruction sent by the server is received, the intelligent door lock is opened;
the mobile terminal is used for sending a second data packet carrying the identification information and a second verification code of the intelligent door lock to the server after receiving the verification instruction sent by the intelligent door lock;
the server is used for determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet; and if the verification information is consistent with the identification information, sending a first verification passing instruction to the intelligent door lock with the identification information.
The embodiment of the invention provides an unlocking method of an intelligent door lock, which comprises the following steps:
when the received first verification information passes verification, a verification instruction is sent to the currently connected mobile terminal, and a first data packet carrying identification information and a first verification code of the intelligent door lock is sent to a server;
and after a first verification passing instruction sent by the server is received, the intelligent door lock is opened.
The embodiment of the invention provides an unlocking method of an intelligent door lock, which comprises the following steps:
determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet; and if the verification information is consistent with the identification information, sending a first verification passing instruction to the intelligent door lock with the identification information.
The embodiment of the invention provides an unlocking device of an intelligent door lock, which comprises:
the processing unit is used for sending a verification instruction to the currently connected mobile terminal when the received first verification information passes verification, and sending a first data packet carrying the identification information and the first verification code of the intelligent door lock to the server;
and the receiving unit is used for opening the intelligent door lock after receiving the first verification passing instruction sent by the server.
The embodiment of the invention provides an unlocking device of an intelligent door lock, which comprises:
the judging unit is used for determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet;
and the execution unit is used for sending a first verification passing instruction to the intelligent door lock with the identification information when the first verification code and the second verification code which are used for verification are determined to be consistent.
An embodiment of the present invention provides an electronic device, where the electronic device includes a processor, and the processor is configured to implement, when executing a computer program stored in a memory, the steps of the unlocking method for the intelligent door lock described above, or implement the steps of the unlocking method for the intelligent door lock described above.
An embodiment of the present invention provides a computer-readable storage medium, which stores a computer program executable by a processor, and when the program runs on the processor, the method causes the intelligent door lock to execute the steps of the unlocking method of the intelligent door lock, or causes the server to execute the steps of the unlocking method of the intelligent door lock.
According to the embodiment of the invention, when the verification of the received verification information is passed through the intelligent door lock, a verification instruction is sent to the currently connected mobile terminal, a first data packet carrying the identification information and the first verification code of the intelligent door lock is sent to the server, after the verification instruction sent by the intelligent door lock is received by the mobile terminal, a second data packet carrying the identification information and the second verification code of the intelligent door lock is also sent to the server, whether the first verification code and the second verification code for verification are consistent or not is determined by the server according to the identification information of the intelligent door lock in the received first data packet and the second data packet, if so, a first verification passing instruction is sent to the intelligent door lock, the intelligent door lock is opened after receiving the first verification passing instruction, and the safety of the intelligent door lock is ensured through multiple verifications of the mobile terminal and the server.
Drawings
Fig. 1 is a schematic structural diagram of an unlocking system of an intelligent door lock according to an embodiment of the present invention;
fig. 2 is a schematic view of an unlocking process of the intelligent door lock according to the embodiment of the present invention;
fig. 3 is a schematic view of an unlocking process of the intelligent door lock according to the embodiment of the present invention;
fig. 4 is a schematic view of an unlocking process of the intelligent door lock according to the embodiment of the present invention;
fig. 5 is a schematic structural diagram of an unlocking device of an intelligent door lock according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an unlocking device of an intelligent door lock according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to improve the safety of the intelligent door lock, the embodiment of the invention provides an unlocking system, an unlocking method, an unlocking device, equipment and a medium of the intelligent door lock.
Example 1:
fig. 1 is a schematic structural diagram of an unlocking system of an intelligent door lock provided in an embodiment of the present invention, the system including: the system comprises a server 10, an intelligent door lock 11 and a mobile terminal 12;
the intelligent door lock 11 is configured to send a verification instruction to the currently connected mobile terminal 12 when the received first verification information passes verification, and send a first data packet carrying identification information and a first verification code of the intelligent door lock 11 to the server 10; after receiving a first verification passing instruction sent by the server 10, opening the intelligent door lock 11;
the mobile terminal 12 is configured to send a second data packet carrying the identification information of the intelligent door lock 11 and a second verification code to the server 10 after receiving the verification instruction sent by the intelligent door lock 11;
the server 10 is configured to determine whether the first verification code and the second verification code for verification are consistent according to the identification information of the intelligent door lock 11 in the received first data packet and the received second data packet; and if the identification information is consistent with the verification information, sending a first verification passing instruction to the intelligent door lock 11 with the identification information.
In the embodiment of the invention, when the intelligent door lock 11 is opened, the first verification information is input into the intelligent door lock 11, after the intelligent door lock 11 receives the input first verification information, the intelligent door lock 11 judges that the pre-stored valid verification information is matched with the first verification information, if the pre-stored valid verification information exists, the first verification information is determined to pass the verification, otherwise, the intelligent door lock 11 determines that the first verification information does not pass the verification. The first authentication information may be fingerprint information, password information, or fingerprint information and password information.
Specifically, when the first verification information is fingerprint information, the intelligent door lock 11 prestores valid fingerprint information, and the intelligent door lock 11 judges whether the currently received fingerprint information is matched with any one of the prestored valid fingerprint information, so as to determine whether the verification is passed; when the first verification information is password information, the intelligent door lock 11 prestores valid password information, and the intelligent door lock 11 judges whether the currently received password information is matched with any prestored valid password information, so as to determine whether the verification is passed; when the first verification information is fingerprint information and password information, the intelligent door lock 11 prestores information pairs of valid fingerprint information and password information, and the intelligent door lock 11 judges whether the currently received fingerprint information and password information are matched with the fingerprint information and password information in any of the prestored information pairs of valid fingerprint information and password information, so as to determine whether the verification is passed.
Due to the popularization of the mobile terminal 12, a general user carries the mobile terminal 12 with him, and when the user tries to open the intelligent door lock 11, if the mobile terminal 12 of the user is bound with the intelligent door lock 11 in advance, or the mobile terminal 12 can communicate with the intelligent door lock 11, the mobile terminal 12 can receive an authentication instruction sent by the intelligent door lock 11.
The specific intelligent door lock 11 and the mobile terminal 12 can communicate based on modes such as bluetooth and WiFi, and can be flexibly set according to requirements, and are not limited herein.
In addition, in order to further ensure security, the intelligent door lock 11 may further send a first data packet carrying the identification information and the first verification code of the intelligent door lock 11 to the server 10, and after receiving the verification instruction sent by the currently connected intelligent door lock 11, the mobile terminal 12 also sends a second data packet carrying the identification information and the second verification code of the intelligent door lock 11 to the server 10.
The intelligent door lock 11 may send the identification information of the intelligent door lock 11 to the mobile terminal 12 while sending the verification instruction to the currently connected mobile terminal 12, so that the mobile terminal 12 may obtain the identification information of the intelligent door lock 11, and send the identification information to the server 10 by being carried in the second data packet. The identification information of the intelligent door lock 11 is information that uniquely identifies the intelligent door lock 11, and specifically may be a MAC address, an IP address, and the like of the intelligent door lock 11. Preferably, the identification information of the intelligent door lock 11 is the MAC address of the intelligent door lock 11.
In the embodiment of the present invention, the server 10 may receive the second data packets sent by the plurality of mobile terminals 12 and the first data packets sent by the plurality of intelligent door locks 11. Therefore, in order to obtain the first verification code and the second verification code for verification, the server 10 may obtain the identification information of the intelligent door lock 11 in the first data packet and the second data packet. According to the obtained identification information of the intelligent door lock 11 in the first data packet and the second data packet, determining the second data packet sent by the mobile terminal 12 corresponding to the intelligent door lock 11 sending the first data packet, and obtaining the first verification code in the first data packet and the second verification code in the second data packet, so as to judge whether the first verification code is consistent with the second verification code. If the identification information is consistent with the identification information, a first verification passing instruction is determined to be sent to the intelligent door lock 11 with the identification information; if the two identification information are inconsistent, the first verification passing instruction is determined not to be sent to the intelligent door lock 11 with the identification information. And after receiving the first verification passing instruction sent by the server 10, the intelligent door lock 11 determines to open the intelligent door lock 11.
In the embodiment of the invention, when the received verification information passes the verification through the intelligent door lock 11, a verification instruction is sent to the currently connected mobile terminal 12, and a first data packet carrying the identification information and the first verification code of the intelligent door lock 11 is sent to the server 10, after the mobile terminal 12 receives the verification instruction sent by the intelligent door lock 11, a second data packet carrying the identification information and the second verification code of the intelligent door lock 11 is also sent, the server 10 determines whether the first verification code and the second verification code for verification are consistent according to the identification information of the intelligent door lock 11 in the received first data packet and the received second data packet, if so, the first verification passing instruction is sent to the intelligent door lock 11, after the intelligent door lock 11 receives the first verification passing instruction, the intelligent door lock 11 is opened, and multiple verifications of the mobile terminal 12 and the server 10 are passed, the safety of the intelligent door lock 11 is ensured.
Example 2:
in order to further improve the security of the intelligent door lock 11, on the basis of the above embodiment, in the embodiment of the present invention, the server 10 is further configured to send a second verification passing instruction to the mobile terminal 12 if it is determined that the first verification code and the second verification code for verification are consistent;
the mobile terminal 12 is further configured to send a first control instruction to the intelligent door lock 11 after receiving the second verification passing instruction;
the intelligent door lock 11 is further configured to determine to open the intelligent door lock 11 if the first verification passing instruction sent by the server 10 is received and the first control instruction sent by the mobile terminal 12 is received.
In the above embodiment, the intelligent door lock 11 determines to open the intelligent door lock 11 according to the received first verification passing instruction, and if the thief intercepts or steals the first verification passing instruction, the security of the intelligent door lock 11 is greatly reduced. Therefore, in order to further improve the security of the intelligent door lock 11, in the embodiment of the present invention, when the server 10 determines that the first verification code and the second verification code for verification are consistent, the server 10 may further send a second verification passing instruction to the mobile terminal 12 to notify the mobile terminal 12 that multiple security verifications pass. After receiving the second verification passing instruction sent by the server 10, the mobile terminal 12 determines that the current multiple security verification mode passes, and then sends a first control instruction to the intelligent door lock 11. After receiving the first verification passing instruction sent by the server 10, the intelligent door lock 11 determines to open the intelligent door lock 11 if receiving the first control instruction.
In order to ensure that the mobile terminal 12 can effectively control the intelligent door lock 11 and ensure the unlocking efficiency, in the embodiment of the invention, after the intelligent door lock 11 receives the first verification passing instruction sent by the server 10, whether the first control instruction is received within a set time length is judged, if the first control instruction is received, the intelligent door lock 11 is determined to be unlocked, otherwise, the intelligent door lock 11 is not unlocked. The time length can be determined according to the network delay between the mobile terminal 12, the server 10 and the intelligent door lock 11.
In the embodiment of the invention, after the intelligent door lock 11 receives the first verification passing instruction sent by the server 10 and receives the first control instruction sent by the mobile terminal 12, the intelligent door lock 11 is determined to be opened, so that the safety of the intelligent door lock 11 is further improved.
Example 3:
in order to improve the efficiency of opening the intelligent door lock 11 by the user and improve the user experience, on the basis of the above embodiments, in the embodiment of the present invention:
the intelligent door lock 11 is further configured to determine an un-updated duration of the corresponding valid verification information according to the first time when the first verification information is received and the update time when the valid verification information corresponding to the first verification information is pre-stored, determine whether the un-updated duration is greater than a pre-stored duration threshold, and if so, send a verification instruction to the currently connected mobile terminal 12.
The intelligent door lock 11 is further configured to open the intelligent door lock 11 if it is determined that the non-updated time length is not greater than the pre-stored time length threshold value.
If the user is opening intelligent lock 11 at every turn, intelligent lock 11 all confirms through mobile terminal 12 and server 10 jointly whether open intelligent lock 11, though can guarantee the security, because the verification process is too loaded down with trivial details, has reduced the efficiency that the user opened intelligent lock 11 to reduce user's experience and feel. Therefore, in the embodiment of the present invention, a duration threshold is preset for each valid authentication information, and a corresponding update time is correspondingly saved for each valid authentication information according to the update time thereof. The time length threshold corresponding to each valid verification information may be the same or different, and may be flexibly set according to requirements.
After receiving the input first verification information, the smart door lock 11 first determines whether the first verification information matches any pre-stored valid verification information, and if the first verification information matches any pre-stored valid verification information, determines that the first verification information passes verification, and obtains the update time of the pre-stored valid verification information corresponding to the first verification information, that is, obtains the update time of the valid verification information matching the first verification information. According to the first time when the first verification information is received and the pre-stored updating time of the valid verification information corresponding to the first verification information, determining the non-updating time length of the corresponding valid verification information, judging whether the non-updating time length is greater than a pre-stored time length threshold value, and determining whether to send a verification instruction to the currently connected mobile terminal 12, wherein the time length threshold value is a time length threshold value corresponding to the corresponding valid verification information.
Specifically, if the non-updated time length is greater than the time length threshold value stored in advance, it is indicated that the corresponding valid authentication information is not updated for a long time, the intelligent door lock 11 enters a multiple security authentication mode, and in order to ensure security, the intelligent door lock 11 sends an authentication instruction to the currently connected mobile terminal 12. If the non-updated time length is not greater than the pre-stored time length threshold, it is indicated that the security of the corresponding valid verification information is still high, and in order to simplify the process and improve the unlocking efficiency, the intelligent door lock 11 does not need to send a verification instruction to the currently connected mobile terminal 12, and the intelligent door lock 11 is directly opened.
When the time length threshold is set, different values can be set according to different scenes, and if a strict requirement is imposed on the safety of the intelligent door lock 11, the time length threshold can be set to be smaller, such as one week, two weeks and the like; if it is desired to increase the efficiency of the user opening the smart door lock 11, the duration threshold may be set greater, such as six months, eight months, etc. In the embodiment of the present invention, preferably, the duration threshold may be six months.
In order to further improve the security of the intelligent door lock 11 and improve the user experience, the mobile terminal 12 is further configured to display, after receiving the second verification passing instruction, a prompt message indicating whether to change the verification information on a display interface, and determine a corresponding second control instruction according to the received trigger operation indicating whether to change the verification information, and send the second control instruction to the intelligent door lock 11;
the intelligent door lock 11 is further configured to prompt, according to the received second control instruction, to change the corresponding verification information if it is determined that the second control instruction is an instruction for changing the verification information, and update and store the currently stored corresponding valid verification information according to the received second verification information.
If the same verification information is used for unlocking for a long time, a thief can easily steal the verification information and open the intelligent door lock 11, so that the safety of the intelligent door lock 11 is reduced. Therefore, in the embodiment of the present invention, after receiving the second verification passing instruction sent by the server 10, the mobile terminal 12 may further display, on the current display interface, a prompt message indicating whether to change the verification information. The prompt message can be a text message or a voice message. In order to facilitate the modification of the valid verification information, the prompt information is text information.
For example, the prompt information of text or animation, such as "the security verification passes, please change the fingerprint information and/or the password information in time", "please change the fingerprint information and/or the password information in time to exit the security verification mode", is used to remind the user to change the stored corresponding valid verification information in time, thereby further improving the security of the intelligent door lock 11.
In the embodiment of the present invention, prompt information for changing fingerprint information and corresponding selection buttons, prompt information for changing fingerprint information and password information and prompt information for not changing fingerprint information and password information and corresponding selection buttons are respectively displayed on the display interface of the mobile terminal 12, so that the user can select the verification information according to the requirement.
After the mobile terminal 12 displays the prompt message indicating whether to change the verification information on the display interface, it detects whether the user currently performs the trigger operation of changing the verification information on the display interface, determines a corresponding second control instruction according to the trigger operation, and sends the second control instruction to the intelligent door lock 11.
Specifically, if the triggering operation for fingerprint information modification on the display interface is identified, determining to generate a corresponding second control instruction for modifying the fingerprint information; if the trigger operation for changing the password information on the display interface is identified, generating a second control instruction for changing the password information; if the triggering operation for changing the fingerprint information and the password information on the display interface is identified, generating a second control instruction for changing the fingerprint information and the password information; and if the triggering operation of not changing the fingerprint information and the password information on the display interface is identified, determining to generate a corresponding second control instruction of not changing the fingerprint information and the password information.
The trigger operation may be a single-click operation, a double-click operation, a long-press operation, and the like, and the trigger operation is a single-click operation in order to facilitate the user to select the change of the verification information.
In addition, in order to improve user experience and facilitate the user to acquire the current state of the intelligent door lock 11, after the mobile terminal 12 receives the verification instruction sent by the intelligent door lock 11, the prompt information for entering the multiple security verification modes can be output. Specifically, the prompt message for entering the multiple security verification modes may be a text message for entering the multiple security verification modes displayed on the current display interface, and/or a voice message for entering the multiple security verification modes broadcasted. For example, a text of "please wait for and enter the multiple security verification mode" is displayed on the display interface, or a voice of "please wait for and enter the multiple security verification mode" is broadcasted.
When the second control instruction is received by the intelligent door lock 11 as an instruction for changing the verification information, the user is prompted to change the corresponding verification information according to the received second control instruction, and if the input second verification information is received, the currently stored corresponding valid verification information is updated and stored according to the second verification information.
Specifically, the intelligent door lock 11 receives a second control instruction for changing the fingerprint information, prompts the user to change the fingerprint information, receives the input fingerprint information, updates and stores the currently stored corresponding effective fingerprint information according to the received fingerprint information, and considers the effective fingerprint information as the effective fingerprint information corresponding to the user at this time. The intelligent door lock 11 receives a second control instruction for changing the password information, prompts the user to change the password information, receives the input password information, updates and stores the currently stored corresponding valid password information according to the received password information, and at this moment, considers that the valid password information is the valid password information corresponding to the user. The intelligent door lock 11 receives a second control instruction for changing the fingerprint information and the password information, prompts a user to change the fingerprint information and the password information, sequentially receives the input fingerprint information and the input password information, updates and stores the fingerprint information and the password information in the information pair of the currently stored corresponding effective fingerprint information and password information according to the received fingerprint information and password information, and considers that the effective fingerprint information and the effective password information are the effective fingerprint information and the effective password information corresponding to the user.
In order to prompt the user to change the verification information, the intelligent door lock 11 is specifically configured to output prompt information for changing the verification information if it is determined that the second control instruction is an instruction for changing the verification information.
In the embodiment of the present invention, when the smart door lock 11 determines that the second control instruction is an instruction for changing the verification information, a prompt message for changing the verification information may be output. In order to prompt the user to change the verification information and further improve the user experience, the intelligent door lock 11 may display text information for changing the verification information on a display interface, and may also broadcast voice information for changing the verification information. In order to improve the user experience, in the embodiment of the present invention, the prompt information for replacing the verification information is a voice message.
For example, when the second control instruction received by the smart door lock 11 is a second control instruction for changing the fingerprint information and the password information, according to the second control instruction, the smart door lock 11 broadcasts the voice information of "please change the fingerprint information", updates and stores the currently stored corresponding valid fingerprint information according to the received input fingerprint information, then broadcasts the voice information of "please change the password information", and updates and stores the currently stored corresponding valid password information according to the received input password information.
In order to effectively improve the security of the intelligent door lock 11, the intelligent door lock 11 is further configured to update and store the pre-stored update time of the corresponding valid verification information according to the first time of the first verification information if it is determined that the second control instruction is an instruction for not changing the verification information.
When the intelligent door lock 11 receives that the second control instruction sent by the mobile terminal 12 is an instruction for not changing the verification information, in order to reduce interference to the user, the intelligent door lock 11 updates and stores the update time of the corresponding valid verification information stored in advance according to the received first time.
However, since the security of the verification information that is not changed for a long time is greatly reduced, the intelligent door lock 11 may adjust the time length threshold value for the intelligent door lock 11 to enter the multiple security verification modes when the second control instruction sent by the mobile terminal 12 is an instruction for not changing the verification information, so as to improve the security of the intelligent door lock 11. Therefore, in order to improve the security of the intelligent door lock 11 and prompt the user to replace the verification information in time, the intelligent door lock 11 can reduce the time length threshold corresponding to the corresponding valid verification information. After the intelligent door lock 11 receives the first verification information again, the intelligent door lock 11 determines the non-updated time length of the corresponding valid verification information according to the first time when the first verification information is received and the update time of the corresponding valid verification information which is saved in advance, determines whether the non-updated time length is greater than the adjusted pre-saved time length threshold value, and if the non-updated time length is greater than the adjusted pre-saved time length threshold value, determines that the corresponding valid verification information is not updated for too long time, so that a safety problem exists, and the intelligent door lock 11 sends a verification instruction to the currently connected mobile terminal 12.
In the embodiment of the present invention, after receiving the second verification passing instruction sent by the server 10, the mobile terminal 12 may further generate a corresponding second control instruction according to a trigger operation for changing the verification information received on the display interface, and the intelligent door lock 11 determines that the second control instruction is an instruction for changing the verification information, and updates and stores the currently stored corresponding valid verification information according to the received second control instruction and the received second verification information, so as to prompt the user to change the verification information in time, further improve the security of the intelligent door lock 11, and improve user experience.
Example 4:
in order to accurately determine whether to unlock the door lock, on the basis of the foregoing embodiments, in an embodiment of the present invention, the intelligent door lock 11 is specifically configured to generate a first verification code according to a current second time, carry the first verification code in the first data packet, and send the first verification code to the server 10;
the mobile terminal 12 is specifically configured to generate a second verification code according to the current third time, carry the second verification code in the second data packet, and send the second verification code to the server 10;
the server 10 is specifically configured to determine whether a difference between the first verification code and the second verification code is smaller than a set threshold, and if so, determine that the first verification code and the second verification code for verification are consistent.
In the embodiment of the present invention, the first verification code in the first data packet sent by the intelligent door lock 11 to the server 10 is generated based on the current second time, where the second time may be the time after the intelligent door lock 11 sends the verification instruction to the mobile terminal 12, or may be the time when the intelligent door lock 11 determines that the first data packet is to be sent, and specific flexible setting is possible, which is not limited herein. According to the second time, after the first verification code is generated, the intelligent door lock 11 carries the generated first verification code in a first data packet, and sends the first data packet to the server 10.
Correspondingly, the second verification code in the second data packet sent by the mobile terminal 12 to the server 10 is generated based on the current third time, where the third time may be the time when the mobile terminal 12 receives the verification instruction sent by the intelligent door lock 11, or the time when the mobile terminal 12 needs to send the second data packet, and may also be flexibly set, which is not limited herein. After generating the second verification code according to the third time, the mobile terminal 12 carries the generated second verification code in a second data packet, and sends the second data packet to the server 10.
If the security of the intelligent door lock 11 is reliable, the server 10 must receive the second data packet sent by the mobile terminal 12 within a certain time after receiving the first data packet sent by the intelligent door lock 11, that is, the difference between the first verification code in the first data packet and the second verification code in the second data packet must be smaller than the set threshold. If the security of the intelligent door lock 11 is in a problem, the server 10 generally cannot receive the second data packet sent by the mobile terminal 12 within a certain time after receiving the first data packet of the intelligent door lock 11, or the received second data packet steals the second data packet sent by the mobile terminal 12 for a stealer, that is, the difference between the first verification code in the first data packet and the second verification code in the second data packet is not less than the set threshold.
Therefore, in order to further improve the security of the intelligent door lock 11, in the embodiment of the present invention, a threshold value is preset, and after determining the first verification code and the second verification code for verification according to the identification information of the intelligent door lock 11 in the received first data packet and the second data packet, the server 10 determines whether the difference between the first verification code and the second verification code is smaller than the set threshold value, so as to determine whether the first verification code and the second verification code for verification are consistent. If the difference value between the first verification code and the second verification code is smaller than the set threshold value, it indicates that the first verification code and the second verification code for verification are consistent, and the server 10 sends a first verification passing instruction to the intelligent door lock 11 of the identification information; if the first verification code and the second verification code for verification are not consistent, it is indicated that the security of the intelligent door lock 11 is in problem, and the server 10 does not send the first verification passing instruction to the intelligent door lock 11 with the identification information.
It should be noted that the generated verification code may specifically be a 10-bit world time stamp.
Because the first verification code and the second verification code are different devices, they are generated at different times, and there is generally a certain time difference. Therefore, after acquiring the first verification code and the second verification code for verification, the server 10 determines whether a difference between the first verification code and the second verification code is smaller than a set threshold, and if so, determines that the first verification code and the second verification code for verification are consistent; otherwise, the first verification code and the second verification code which are verified are determined to be inconsistent. For example, when the set threshold is 180 milliseconds, the server 10 determines whether the difference between the first verification code and the second verification code is less than 180 milliseconds, and if so, determines that the first verification code and the second verification code for verification are consistent; otherwise, the first verification code and the second verification code which are verified are determined to be inconsistent.
When the threshold is set, different values can be set according to different scenes, and if strict requirements are made on the safety of the intelligent door lock 11, the threshold can be set to be smaller; this threshold may be set larger if it is desired to avoid the problem of multiple security authentication failures due to network delays. But should not be too large, and preferably, in the embodiment of the present invention, the threshold is set to 180 milliseconds.
When the generated verification code is a 10-bit world time stamp, because the time values of a certain number of bits in the first verification code and the second verification code are consistent within a certain time delay, the server 10 may also extract the time values of the set number of bits in the first verification code and the second verification code for comparison after obtaining the first verification code and the second verification code for verification, determine whether the time value of the set position of the first verification code is consistent with the time value of the set position in the second verification code, and if so, determine that the first verification code and the second verification code for verification are consistent; otherwise, the first verification code and the second verification code which are verified are determined to be inconsistent. For example, the server 10 determines whether the time value of the remaining five bits of the first verification code, from which the last three bits and the first two bits are removed, is consistent with the time value of the remaining five bits of the second verification code, from which the last two bits and the first three bits are removed, and if so, determines that the first verification code and the second verification code to be verified are consistent; otherwise, the first verification code and the second verification code which are verified are determined to be inconsistent.
Since the server 10 needs to extract the time values of the set positions in the first verification code and the second verification code after acquiring the first verification code and the second verification code for verification, and then compares the first verification code and the second verification code, the workload of the server 10 is very large, so as to reduce the workload of the server 10, the smart door lock 11 can extract the time value of the set position in the second time when the first verification code is generated, and carry the extracted time value of the set position as the first verification code in the first data packet, while the mobile terminal 12 can also extract the time value of the set position in the third time when the second verification code is generated, and carry the extracted time value of the set position as the second verification code in the second data packet.
Preferably, in the embodiment of the present invention, the intelligent door lock 11 uses a remaining five-bit time value obtained by removing the first two bits and the last three bits in the second time as a first verification code, and carries the first verification code in a first data packet to send to the server 10, the mobile terminal 12 uses a remaining five-bit time value obtained by removing the first two bits and the last three bits in the third time as a second verification code, and carries the second verification code in the first data packet to send to the server 10, after the server 10 obtains the first verification code and the second verification code for verification, it is determined whether a difference between the first verification code and the second verification code is less than 1, and if the difference between the first verification code and the second verification code is less than 1, it is determined that the first verification code and the second verification code for verification are consistent; otherwise, the first verification code and the second verification code which are verified are determined to be inconsistent.
Fig. 2 is a schematic view of an unlocking process of the intelligent door lock provided in the embodiment of the present invention, where the process includes:
s201: the intelligent door lock judges whether the received first authentication information is authenticated, if so, S202 is executed, otherwise, S210 is executed.
S202: and the intelligent door lock determines the non-updating time length of the corresponding valid verification information according to the first time of the received first verification information and the updating time of the valid verification information corresponding to the first verification information, judges whether the non-updating time length is greater than a pre-stored time length threshold value, if so, S203 is executed, otherwise, S209 is executed.
S203: the intelligent door lock sends a verification instruction to a mobile terminal connected at present, and sends a first data packet carrying identification information and a first verification code of the intelligent door lock to a server.
Wherein the first verification code is generated based on the current second time.
S204: and after receiving the verification instruction sent by the intelligent door lock, the mobile terminal sends a second data packet carrying the identification information and the second verification code of the intelligent door lock to the server.
Wherein the second verification code is generated based on the current third time.
S205: and the server judges whether the difference value of the first verification code and the second verification code for verification is smaller than a set threshold value according to the received identification information of the intelligent door lock in the first data packet and the second data packet, if so, S206 is executed, and otherwise, S210 is executed.
S206, the server sends a first verification passing instruction to the intelligent door lock of the identification information, sends a second verification passing instruction to the mobile terminal, and then executes S207.
And S207, after receiving the second verification passing instruction, the mobile terminal sends a first control instruction to the intelligent door lock.
After receiving the second verification passing instruction, the mobile terminal can also display prompt information for judging whether verification information is changed or not on the display interface, and determines a corresponding second control instruction and sends the second control instruction to the intelligent door lock according to the received trigger operation for judging whether verification information is changed or not on the display interface.
And S208, the intelligent door lock receives the first verification passing instruction sent by the server and the first control instruction sent by the mobile terminal, and then S209 is executed.
And if the intelligent door lock determines that the second control instruction is an instruction for changing the verification information, the intelligent door lock prompts to change the corresponding verification information according to the received second control instruction, and updates and stores the currently stored corresponding verification information according to the received updated verification information.
S209: the intelligent door lock determines to open the intelligent door lock.
And S210, the intelligent door lock determines not to open the intelligent door lock.
Example 5:
fig. 3 is a schematic view of an unlocking process of the intelligent door lock according to the embodiment of the present invention, where the unlocking process includes the following steps:
s301: and when the received first verification information passes verification, sending a verification instruction to the currently connected mobile terminal, and sending a first data packet carrying the identification information and the first verification code of the intelligent door lock to the server.
S302: and after a first verification passing instruction sent by the server is received, the intelligent door lock is opened.
The method is applied to electronic equipment, and particularly applied to an intelligent door lock.
After receiving a first verification passing instruction sent by the server, the intelligent door lock is opened, and the intelligent door lock opening method comprises the following steps:
and if the first verification passing instruction sent by the server is received and the first control instruction sent by the mobile terminal is received, determining to open the intelligent door lock.
Before sending the verification instruction to the currently connected mobile terminal, the method further includes:
determining the non-updating time length of the corresponding effective verification information according to the received first time of the first verification information and the updating time of the effective verification information corresponding to the first verification information which is stored in advance; and judging whether the non-updated time length is greater than a pre-stored time length threshold value, and if so, carrying out the subsequent step of sending a verification instruction to the currently connected mobile terminal.
The method further comprises the following steps:
receiving a second control instruction sent by the mobile terminal;
if the second control instruction is determined to be an instruction for changing the verification information, prompting to change the corresponding verification information according to the received second control instruction;
and updating and storing the currently stored corresponding valid verification information according to the received second verification information.
The method further comprises the following steps:
and if the second control instruction is determined to be an instruction for changing the verification information, outputting prompt information for changing the verification information.
The method further comprises the following steps:
and if the second control instruction is determined to be an instruction for not changing the verification information, updating and storing the corresponding updating time of the valid verification information which is stored in advance according to the first time.
Generating the first data packet comprises:
and generating a first verification code according to the current second time, carrying the first verification code in the first data packet and sending the first verification code to the server.
It should be noted that the contents of the unlocking method of the intelligent door lock are the same as those of the above embodiments, and are not described herein again.
According to the embodiment of the invention, when the received verification information passes the verification through the intelligent door lock, the verification instruction is sent to the currently connected mobile terminal, the first data packet carrying the identification information and the first verification code of the intelligent door lock is sent to the server, the intelligent door lock is opened after the intelligent door lock receives the first verification passing instruction, and the safety of the intelligent door lock is ensured through the multiple verification of the mobile terminal and the server.
Example 6:
fig. 4 is a schematic view of an unlocking process of the intelligent door lock according to the embodiment of the present invention, where the unlocking process includes the following steps:
s401: determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet;
s402: and if the verification information is consistent with the identification information, sending a first verification passing instruction to the intelligent door lock with the identification information.
The method is applied to the electronic equipment, and particularly applied to the server.
If the first verification code and the second verification code are generated according to the current time, the determining whether the first verification code and the second verification code for verification are consistent comprises:
and judging whether the difference value of the first verification code and the second verification code is smaller than a set threshold value, if so, determining that the first verification code and the second verification code for verification are consistent, wherein the first verification code is generated according to the current second time, and the second verification code is generated according to the current third time.
It should be noted that the contents of the unlocking method of the intelligent door lock are the same as those of the above embodiments, and are not described herein again.
According to the embodiment of the invention, the server determines whether the first verification code and the second verification code for verification are consistent or not according to the received identification information of the intelligent door lock in the first data packet and the second data packet, and if so, a first verification passing instruction is sent to the intelligent door lock. Therefore, the safety of the intelligent door lock is ensured through multiple verification of the mobile terminal and the server.
Example 7:
fig. 5 is a schematic structural diagram of an unlocking device of an intelligent door lock according to an embodiment of the present invention, where the unlocking device includes:
the processing unit 51 is configured to send a verification instruction to the currently connected mobile terminal when the received first verification information passes verification, and send a first data packet carrying identification information of the intelligent door lock and a first verification code to the server;
and the receiving unit 52 is configured to open the intelligent door lock after receiving the first verification passing instruction sent by the server.
The receiving unit 52 is specifically configured to determine to open the intelligent door lock if the first verification passing instruction sent by the server is received and a first control instruction sent by the mobile terminal is received.
The processing unit 51 is specifically configured to, before the verification instruction is sent to the currently connected mobile terminal, determine, according to the first time of the received first verification information and the update time of valid verification information that is pre-stored and corresponds to the first verification information, the non-update duration of the corresponding valid verification information; and judging whether the non-updated time length is greater than a pre-stored time length threshold value, and if so, carrying out the subsequent step of sending a verification instruction to the currently connected mobile terminal.
The receiving unit 52 is further configured to receive a second control instruction sent by the mobile terminal;
the device further comprises:
and an updating unit 53, configured to prompt to change the corresponding verification information according to the received second control instruction if it is determined that the second control instruction is an instruction for changing the verification information, and update and store the currently stored corresponding valid verification information according to the received second verification information.
And the display unit 54 is configured to output prompt information for changing the verification information if it is determined that the second control instruction is an instruction for changing the verification information.
The updating unit 53 is further configured to update and store the pre-stored update time of the corresponding valid verification information according to the first time if it is determined that the second control instruction is an instruction for not changing verification information.
The processing unit 51 is specifically configured to generate a first verification code according to the current second time, carry the first verification code in the first data packet, and send the first verification code to the server.
According to the embodiment of the invention, when the received verification information passes the verification through the intelligent door lock, the verification instruction is sent to the currently connected mobile terminal, the first data packet carrying the identification information and the first verification code of the intelligent door lock is sent to the server, the intelligent door lock is opened after the intelligent door lock receives the first verification passing instruction, and the safety of the intelligent door lock is ensured through the multiple verification of the mobile terminal and the server.
Example 8:
fig. 6 is a schematic structural diagram of an unlocking device of an intelligent door lock according to an embodiment of the present invention, where the unlocking device includes:
the judging unit 61 is configured to determine whether the first verification code and the second verification code for verification are consistent according to the identification information of the intelligent door lock in the received first data packet and the second data packet;
and the execution unit 62 is configured to send a first verification passing instruction to the intelligent door lock with the identification information if it is determined that the first verification code and the second verification code for verification are consistent.
The determining unit 61 is specifically configured to determine whether a difference between the first verification code and the second verification code is smaller than a set threshold if the first verification code and the second verification code are generated according to the current time.
According to the embodiment of the invention, the server determines whether the first verification code and the second verification code for verification are consistent or not according to the received identification information of the intelligent door lock in the first data packet and the second data packet, and if so, a first verification passing instruction is sent to the intelligent door lock. Therefore, the safety of the intelligent door lock is ensured through multiple verification of the mobile terminal and the server.
Example 9:
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and on the basis of the foregoing embodiments, an embodiment of the present invention further provides an electronic device, as shown in fig. 7, including: the system comprises a processor 71, a communication interface 72, a memory 73 and a communication bus 74, wherein the processor 71, the communication interface 72 and the memory 73 are communicated with each other through the communication bus 74;
the memory 73 has stored therein a computer program which, when executed by the processor 71, causes the processor 71 to perform the steps of:
when the received first verification information passes verification, a verification instruction is sent to the currently connected mobile terminal, and a first data packet carrying identification information and a first verification code of the intelligent door lock is sent to a server;
and after a first verification passing instruction sent by the server is received, the intelligent door lock is opened.
The processor 71 is specifically configured to determine to open the intelligent door lock if the first verification passing instruction sent by the server is received and a first control instruction sent by the mobile terminal is received.
The processor 71 is specifically configured to, before the verification instruction is sent to the currently connected mobile terminal, determine, according to the first time of the received first verification information and the update time of valid verification information that is pre-stored and corresponds to the first verification information, the non-update duration of the corresponding valid verification information; and judging whether the non-updated time length is greater than a pre-stored time length threshold value, and if so, carrying out the subsequent step of sending a verification instruction to the currently connected mobile terminal.
The processor 71 is further configured to receive a second control instruction sent by the mobile terminal;
and the processor 71 is configured to prompt, if it is determined that the second control instruction is an instruction for changing the verification information, to change the corresponding verification information according to the received second control instruction, and update and store the currently stored corresponding valid verification information according to the received second verification information.
And the processor 71 is configured to output prompt information for changing the verification information if it is determined that the second control instruction is an instruction for changing the verification information.
The processor 71 is further configured to update and store the corresponding update time of the valid verification information, which is stored in advance, according to the first time if it is determined that the second control instruction is an instruction for not changing the verification information.
The processor 71 is specifically configured to generate a first verification code according to the current second time, carry the first verification code in the first data packet, and send the first verification code to the server.
Because the principle of solving the problems of the electronic equipment is similar to that of the unlocking method of the intelligent door lock, the implementation of the electronic equipment can refer to the implementation of the method, and repeated parts are not described again.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface 72 is used for communication between the above-described electronic apparatus and other apparatuses.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
The processor may be a general-purpose processor, including a central processing unit, a Network Processor (NP), and the like; but may also be a Digital instruction processor (DSP), an application specific integrated circuit, a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like.
According to the embodiment of the invention, when the received verification information passes the verification through the intelligent door lock, the verification instruction is sent to the currently connected mobile terminal, the first data packet carrying the identification information and the first verification code of the intelligent door lock is sent to the server, the intelligent door lock is opened after the intelligent door lock receives the first verification passing instruction, and the safety of the intelligent door lock is ensured through the multiple verification of the mobile terminal and the server.
Example 10:
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and on the basis of the foregoing embodiments, an embodiment of the present invention further provides an electronic device, as shown in fig. 8, including: the system comprises a processor 81, a communication interface 82, a memory 83 and a communication bus 84, wherein the processor 81, the communication interface 82 and the memory 83 are communicated with each other through the communication bus 84;
the memory 83 has stored therein a computer program which, when executed by the processor 81, causes the processor 81 to perform the steps of:
determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet; and if the verification information is consistent with the identification information, sending a first verification passing instruction to the intelligent door lock with the identification information.
The processor 81 is specifically configured to, if the first verification code and the second verification code are generated according to the current time, determine whether a difference between the first verification code and the second verification code is smaller than a set threshold, and if so, determine that the first verification code and the second verification code for verification are consistent.
Because the principle of solving the problems of the electronic equipment is similar to that of the unlocking method of the intelligent door lock, the implementation of the electronic equipment can refer to the implementation of the method, and repeated parts are not described again.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface 82 is used for communication between the above-described electronic apparatus and other apparatuses.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
The processor may be a general-purpose processor, including a central processing unit, a Network Processor (NP), and the like; but may also be a Digital instruction processor (DSP), an application specific integrated circuit, a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like.
According to the embodiment of the invention, the server determines whether the first verification code and the second verification code for verification are consistent or not according to the received identification information of the intelligent door lock in the first data packet and the second data packet, and if so, a first verification passing instruction is sent to the intelligent door lock. Therefore, the safety of the intelligent door lock is ensured through multiple verification of the mobile terminal and the server.
Example 11:
on the basis of the foregoing embodiments, an embodiment of the present invention provides a computer-readable storage medium, in which a computer program executable by an electronic device is stored, and when the program is run on the electronic device, the electronic device is caused to execute the following steps:
when the received first verification information passes verification, a verification instruction is sent to the currently connected mobile terminal, and a first data packet carrying identification information and a first verification code of the intelligent door lock is sent to a server;
and after a first verification passing instruction sent by the server is received, the intelligent door lock is opened.
After receiving a first verification passing instruction sent by the server, the intelligent door lock is opened, and the intelligent door lock opening method comprises the following steps:
and if the first verification passing instruction sent by the server is received and the first control instruction sent by the mobile terminal is received, determining to open the intelligent door lock.
Before sending the verification instruction to the currently connected mobile terminal, the method further includes:
determining the non-updating time length of the corresponding effective verification information according to the received first time of the first verification information and the updating time of the effective verification information corresponding to the first verification information which is stored in advance; and judging whether the non-updated time length is greater than a pre-stored time length threshold value, and if so, carrying out the subsequent step of sending a verification instruction to the currently connected mobile terminal.
The method further comprises the following steps:
receiving a second control instruction sent by the mobile terminal;
if the second control instruction is determined to be an instruction for changing the verification information, prompting to change the corresponding verification information according to the received second control instruction;
and updating and storing the currently stored corresponding valid verification information according to the received second verification information.
The method further comprises the following steps:
and if the second control instruction is determined to be an instruction for changing the verification information, outputting prompt information for changing the verification information.
The method further comprises the following steps:
and if the second control instruction is determined to be an instruction for not changing the verification information, updating and storing the corresponding updating time of the valid verification information which is stored in advance according to the first time.
Generating the first data packet comprises:
and generating a first verification code according to the current second time, carrying the first verification code in the first data packet and sending the first verification code to the server.
The computer readable storage medium may be any available medium or data storage device that can be accessed by a processor in an electronic device, including but not limited to magnetic memory such as floppy disks, hard disks, magnetic tape, magneto-optical disks (MO), etc., optical memory such as CDs, DVDs, BDs, HVDs, etc., and semiconductor memory such as ROMs, EPROMs, EEPROMs, nonvolatile memories (NANDFLASH), Solid State Disks (SSDs), etc.
According to the embodiment of the invention, when the received verification information passes the verification through the intelligent door lock, the verification instruction is sent to the currently connected mobile terminal, the first data packet carrying the identification information and the first verification code of the intelligent door lock is sent to the server, the intelligent door lock is opened after the intelligent door lock receives the first verification passing instruction, and the safety of the intelligent door lock is ensured through the multiple verification of the mobile terminal and the server.
Example 12:
on the basis of the foregoing embodiments, an embodiment of the present invention provides a computer-readable storage medium, in which a computer program executable by an electronic device is stored, and when the program is run on the electronic device, the electronic device is caused to execute the following steps:
determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet;
and if the verification information is consistent with the identification information, sending a first verification passing instruction to the intelligent door lock with the identification information.
If the first verification code and the second verification code are generated according to the current time, the determining whether the first verification code and the second verification code for verification are consistent comprises:
and judging whether the difference value of the first verification code and the second verification code is smaller than a set threshold value, if so, determining that the first verification code and the second verification code for verification are consistent, wherein the first verification code is generated according to the current second time, and the second verification code is generated according to the current third time.
The computer readable storage medium may be any available medium or data storage device that can be accessed by a processor in an electronic device, including but not limited to magnetic memory such as floppy disks, hard disks, magnetic tape, magneto-optical disks (MO), etc., optical memory such as CDs, DVDs, BDs, HVDs, etc., and semiconductor memory such as ROMs, EPROMs, EEPROMs, nonvolatile memories (NANDFLASH), Solid State Disks (SSDs), etc.
According to the embodiment of the invention, the server determines whether the first verification code and the second verification code for verification are consistent or not according to the received identification information of the intelligent door lock in the first data packet and the second data packet, and if so, a first verification passing instruction is sent to the intelligent door lock. Therefore, the safety of the intelligent door lock is ensured through multiple verification of the mobile terminal and the server.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (27)
1. The intelligent door lock system is characterized by comprising a server, an intelligent door lock and a mobile terminal;
the intelligent door lock is used for sending a verification instruction to the currently connected mobile terminal when the received first verification information passes verification, and sending a first data packet carrying the identification information and the first verification code of the intelligent door lock to the server; after a first verification passing instruction sent by the server is received, the intelligent door lock is opened;
the mobile terminal is used for sending a second data packet carrying the identification information and a second verification code of the intelligent door lock to the server after receiving the verification instruction sent by the intelligent door lock;
the server is used for determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet; and if the verification information is consistent with the identification information, sending a first verification passing instruction to the intelligent door lock with the identification information.
2. The system of claim 1, wherein the server is further configured to send a second verification passing instruction to the mobile terminal if it is determined that the first verification code and the second verification code for verification are consistent;
the mobile terminal is further used for sending a first control instruction to the intelligent door lock after receiving the second verification passing instruction;
the intelligent door lock is further used for determining to open the intelligent door lock after receiving the first verification passing instruction sent by the server and the first control instruction sent by the mobile terminal.
3. The system according to claim 1, wherein the smart door lock is further configured to determine an un-updated duration of the corresponding valid authentication information according to the received first time of the first authentication information and an update time of valid authentication information corresponding to the first authentication information, determine whether the un-updated duration is greater than a pre-stored duration threshold, and if so, send an authentication instruction to the currently connected mobile terminal.
4. The system of claim 3, wherein the mobile terminal is further configured to display a prompt message indicating whether to change the verification information on the display interface after receiving the second verification passing instruction, determine a corresponding second control instruction according to a received trigger operation indicating whether to change the verification information on the display interface, and send the second control instruction to the smart door lock;
and the intelligent door lock is also used for prompting the change of the corresponding verification information according to the received second control instruction if the second control instruction is determined to be the instruction for changing the verification information, and updating and storing the currently stored corresponding effective verification information according to the received second verification information.
5. The system of claim 4, wherein the smart door lock is specifically configured to output a prompt message for changing the verification information if it is determined that the second control command is a command for changing the verification information.
6. The system of claim 4, wherein the smart door lock is further configured to update and store the corresponding update time of the valid verification information, which is stored in advance, according to the first time if it is determined that the second control command is a command for not changing the verification information.
7. The system according to any one of claims 1 to 6, wherein the smart door lock is specifically configured to generate a first verification code according to a current second time, carry the first verification code in the first data packet, and send the first verification code to the server;
the mobile terminal is specifically configured to generate a second verification code according to a current third time, carry the second verification code in the second data packet, and send the second verification code to the server;
the server is specifically configured to determine whether a difference between the first verification code and the second verification code is smaller than a set threshold, and if so, determine that the first verification code and the second verification code for verification are consistent.
8. An unlocking method of an intelligent door lock is characterized by comprising the following steps:
when the received first verification information passes verification, a verification instruction is sent to the currently connected mobile terminal, and a first data packet carrying identification information and a first verification code of the intelligent door lock is sent to a server;
and after a first verification passing instruction sent by the server is received, the intelligent door lock is opened.
9. The method of claim 8, wherein the receiving the first verification passing instruction sent by the server and then opening the intelligent door lock comprises:
and if the first verification passing instruction sent by the server is received and the first control instruction sent by the mobile terminal is received, determining to open the intelligent door lock.
10. The method of claim 8, wherein before sending the validation instruction to the currently connected mobile terminal, the method further comprises:
determining the non-updating time length of the corresponding effective verification information according to the received first time of the first verification information and the updating time of the effective verification information corresponding to the first verification information which is stored in advance;
and judging whether the non-updated time length is greater than a pre-stored time length threshold value, and if so, carrying out the subsequent step of sending a verification instruction to the currently connected mobile terminal.
11. The method of claim 10, further comprising:
receiving a second control instruction sent by the mobile terminal;
if the second control instruction is determined to be an instruction for changing the verification information, prompting to change the corresponding verification information according to the received second control instruction;
and updating and storing the currently stored corresponding valid verification information according to the received second verification information.
12. The method of claim 11, further comprising:
and if the second control instruction is determined to be an instruction for changing the verification information, outputting prompt information for changing the verification information.
13. The method of claim 11, further comprising:
and if the second control instruction is determined to be an instruction for not changing the verification information, updating and storing the corresponding updating time of the valid verification information which is stored in advance according to the first time.
14. The method of any of claims 8-13, wherein generating the first data packet comprises:
and generating a first verification code according to the current second time, carrying the first verification code in the first data packet and sending the first verification code to the server.
15. An unlocking method of an intelligent door lock is characterized by comprising the following steps:
determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet;
and if the verification information is consistent with the identification information, sending a first verification passing instruction to the intelligent door lock with the identification information.
16. The method of claim 15, wherein if the first authentication code and the second authentication code are generated according to a current time, the determining whether the first authentication code and the second authentication code for authentication are consistent comprises:
and judging whether the difference value of the first verification code and the second verification code is smaller than a set threshold value, and if so, determining that the first verification code and the second verification code which are verified are consistent.
17. An unlocking device of an intelligent door lock, characterized in that the device comprises:
the processing unit is used for sending a verification instruction to the currently connected mobile terminal when the received first verification information passes verification, and sending a first data packet carrying the identification information and the first verification code of the intelligent door lock to the server;
and the receiving unit is used for opening the intelligent door lock after receiving the first verification passing instruction sent by the server.
18. The apparatus according to claim 17, wherein the receiving unit is specifically configured to determine to open the smart door lock if the first verification passing instruction sent by the server is received and a first control instruction sent by the mobile terminal is received.
19. The apparatus according to claim 17, wherein the processing unit is specifically configured to, before the authentication instruction is sent to the currently connected mobile terminal, determine an un-updated duration of the corresponding valid authentication information according to the first time of the received first authentication information and an update time of valid authentication information corresponding to the first authentication information that is pre-stored; and judging whether the non-updated time length is greater than a pre-stored time length threshold value, and if so, carrying out the subsequent step of sending a verification instruction to the currently connected mobile terminal.
20. The apparatus according to claim 19, wherein the receiving unit is further configured to receive a second control instruction sent by the mobile terminal;
the device further comprises:
and the updating unit is used for prompting the change of the corresponding verification information according to the received second control instruction if the second control instruction is determined to be the instruction for changing the verification information, and updating and storing the currently stored corresponding effective verification information according to the received second verification information.
21. The apparatus of claim 20, further comprising:
and the display unit is used for outputting prompt information for changing the verification information if the second control instruction is determined to be an instruction for changing the verification information.
22. The apparatus according to claim 20, wherein the updating unit is further configured to update and store the update time of the corresponding valid authentication information that is stored in advance according to the first time if it is determined that the second control instruction is an instruction that does not change authentication information.
23. The apparatus of claim 17, wherein the processing unit is specifically configured to generate a first verification code according to the current second time, carry the first verification code in the first data packet, and send the first verification code to the server.
24. An unlocking device of an intelligent door lock, characterized in that the device comprises:
the judging unit is used for determining whether the first verification code and the second verification code for verification are consistent or not according to the identification information of the intelligent door lock in the received first data packet and the second data packet;
and the execution unit is used for sending a first verification passing instruction to the intelligent door lock with the identification information when the first verification code and the second verification code which are used for verification are determined to be consistent.
25. The apparatus of claim 24, wherein the determining unit is specifically configured to determine whether a difference between the first verification code and the second verification code is smaller than a set threshold if the first verification code and the second verification code are generated according to a current time.
26. An electronic device, characterized in that the electronic device comprises a processor for implementing the steps of the unlocking method of the intelligent door lock according to any one of claims 8-14 or the steps of the unlocking method of the intelligent door lock according to any one of claims 15-16 when executing the computer program stored in the memory.
27. A computer-readable storage medium, characterized in that it stores a computer program executable by a processor, which when run on the processor causes the intelligent door lock to perform the steps of the unlocking method of the intelligent door lock according to any one of claims 8 to 14, or causes the server to perform the steps of the unlocking method of the intelligent door lock according to any one of claims 15 to 16.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911330958.6A CN111080853B (en) | 2019-12-20 | 2019-12-20 | Intelligent door lock system, unlocking method, device, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911330958.6A CN111080853B (en) | 2019-12-20 | 2019-12-20 | Intelligent door lock system, unlocking method, device, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111080853A true CN111080853A (en) | 2020-04-28 |
CN111080853B CN111080853B (en) | 2021-02-05 |
Family
ID=70316501
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911330958.6A Active CN111080853B (en) | 2019-12-20 | 2019-12-20 | Intelligent door lock system, unlocking method, device, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111080853B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111383371A (en) * | 2020-04-29 | 2020-07-07 | 珠海格力电器股份有限公司 | Unlocking method, door lock, server, system, storage medium and electronic device |
CN111815822A (en) * | 2020-07-20 | 2020-10-23 | 中国联合网络通信集团有限公司 | Unlocking method, terminal and intelligent door lock |
CN111932751A (en) * | 2020-08-15 | 2020-11-13 | 广州云莫凡信息科技有限公司 | Intelligent park Internet of things comprehensive management platform and management method |
CN112330850A (en) * | 2020-07-10 | 2021-02-05 | 深圳Tcl新技术有限公司 | Door lock broadcast control method and device, intelligent door lock and storage medium |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070252675A1 (en) * | 2004-09-24 | 2007-11-01 | David Lamar | Electronically enabling device remotely |
US20100306549A1 (en) * | 2008-01-30 | 2010-12-02 | Evva Sicherheitstechnologie Gmbh | Method and device for managing access control |
CN105590361A (en) * | 2016-01-05 | 2016-05-18 | 上海斐讯数据通信技术有限公司 | Intelligent antitheft door and method for remotely unlocking intelligent antitheft door |
CN105913529A (en) * | 2016-05-27 | 2016-08-31 | 福建星网锐捷通讯股份有限公司 | Unlocking control method and system of networking entrance guard |
CN106023369A (en) * | 2016-05-19 | 2016-10-12 | 重庆理工大学 | Cloud platform-based combined safety lock system and control method thereof |
CN106600768A (en) * | 2016-12-01 | 2017-04-26 | 北京小米移动软件有限公司 | Intelligent door lock authentication method, device and terminal |
CN106856018A (en) * | 2016-12-21 | 2017-06-16 | 英业达科技有限公司 | Transmission identity data is with the system and method for access control |
CN106898065A (en) * | 2017-01-21 | 2017-06-27 | 云丁网络技术(北京)有限公司 | A kind of method for unlocking of intelligent door lock |
CN107038778A (en) * | 2017-03-31 | 2017-08-11 | 天津大学 | A kind of smart lock based on NFC changes close control method offline |
WO2017140240A1 (en) * | 2016-02-19 | 2017-08-24 | 胡飞虎 | Guest authentication method and system |
CN107135229A (en) * | 2017-06-02 | 2017-09-05 | 云丁网络技术(北京)有限公司 | Intelligent home information safe verification method, device, equipment and system |
CN107393066A (en) * | 2017-06-30 | 2017-11-24 | 北京康得新创科技股份有限公司 | Unlocking method, terminal, server and the system for unlocking of smart lock |
CN107909685A (en) * | 2017-10-27 | 2018-04-13 | 张荣斌 | A kind of unlocking system and method for unlocking based on dynamic password |
KR20180065557A (en) * | 2016-12-08 | 2018-06-18 | 경북대학교 산학협력단 | Entrance management system for animal farm |
KR20190118993A (en) * | 2019-10-01 | 2019-10-21 | (주)진학어플라이 | Surrogate Interview Prevention Method and Processing Technology Using Deep Learning |
CN110555924A (en) * | 2018-06-01 | 2019-12-10 | 杭州海康威视数字技术股份有限公司 | Method and device for unlocking processing |
-
2019
- 2019-12-20 CN CN201911330958.6A patent/CN111080853B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070252675A1 (en) * | 2004-09-24 | 2007-11-01 | David Lamar | Electronically enabling device remotely |
US20100306549A1 (en) * | 2008-01-30 | 2010-12-02 | Evva Sicherheitstechnologie Gmbh | Method and device for managing access control |
CN105590361A (en) * | 2016-01-05 | 2016-05-18 | 上海斐讯数据通信技术有限公司 | Intelligent antitheft door and method for remotely unlocking intelligent antitheft door |
WO2017140240A1 (en) * | 2016-02-19 | 2017-08-24 | 胡飞虎 | Guest authentication method and system |
CN106023369A (en) * | 2016-05-19 | 2016-10-12 | 重庆理工大学 | Cloud platform-based combined safety lock system and control method thereof |
CN105913529A (en) * | 2016-05-27 | 2016-08-31 | 福建星网锐捷通讯股份有限公司 | Unlocking control method and system of networking entrance guard |
CN106600768A (en) * | 2016-12-01 | 2017-04-26 | 北京小米移动软件有限公司 | Intelligent door lock authentication method, device and terminal |
KR20180065557A (en) * | 2016-12-08 | 2018-06-18 | 경북대학교 산학협력단 | Entrance management system for animal farm |
CN106856018A (en) * | 2016-12-21 | 2017-06-16 | 英业达科技有限公司 | Transmission identity data is with the system and method for access control |
CN106898065A (en) * | 2017-01-21 | 2017-06-27 | 云丁网络技术(北京)有限公司 | A kind of method for unlocking of intelligent door lock |
CN107038778A (en) * | 2017-03-31 | 2017-08-11 | 天津大学 | A kind of smart lock based on NFC changes close control method offline |
CN107135229A (en) * | 2017-06-02 | 2017-09-05 | 云丁网络技术(北京)有限公司 | Intelligent home information safe verification method, device, equipment and system |
CN107393066A (en) * | 2017-06-30 | 2017-11-24 | 北京康得新创科技股份有限公司 | Unlocking method, terminal, server and the system for unlocking of smart lock |
CN107909685A (en) * | 2017-10-27 | 2018-04-13 | 张荣斌 | A kind of unlocking system and method for unlocking based on dynamic password |
CN110555924A (en) * | 2018-06-01 | 2019-12-10 | 杭州海康威视数字技术股份有限公司 | Method and device for unlocking processing |
KR20190118993A (en) * | 2019-10-01 | 2019-10-21 | (주)진학어플라이 | Surrogate Interview Prevention Method and Processing Technology Using Deep Learning |
Non-Patent Citations (4)
Title |
---|
HAE-DUCK J. JEONG: "Utilizing a Bluetooth remote lock system for a smartphone", 《PERVASIVE AND MOBILE COMPUTING》 * |
周鹏: "基于手机蓝牙技术的网络化门", 《中国优秀硕士学位论文全文数据库》 * |
廖杰: "基于云计算的动态密码门禁系统", 《技术平台》 * |
景光铮: "基于微信平台二维码身份识别的门禁系统", 《探索与观察》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111383371A (en) * | 2020-04-29 | 2020-07-07 | 珠海格力电器股份有限公司 | Unlocking method, door lock, server, system, storage medium and electronic device |
CN112330850A (en) * | 2020-07-10 | 2021-02-05 | 深圳Tcl新技术有限公司 | Door lock broadcast control method and device, intelligent door lock and storage medium |
CN111815822A (en) * | 2020-07-20 | 2020-10-23 | 中国联合网络通信集团有限公司 | Unlocking method, terminal and intelligent door lock |
CN111932751A (en) * | 2020-08-15 | 2020-11-13 | 广州云莫凡信息科技有限公司 | Intelligent park Internet of things comprehensive management platform and management method |
Also Published As
Publication number | Publication date |
---|---|
CN111080853B (en) | 2021-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111080853B (en) | Intelligent door lock system, unlocking method, device, equipment and medium | |
US9131377B2 (en) | Method and apparatus for unlocking operating system | |
US9372977B2 (en) | Screen unlocking method, device and terminal | |
CN105704332B (en) | Mobile payment method and device | |
US10831881B2 (en) | Method and terminal for enhancing information security | |
CN107729836B (en) | Face recognition method and related product | |
CN105159531A (en) | Application starting method and mobile terminal | |
CN106529248B (en) | User terminal unlocking method and device and user terminal | |
WO2014177904A1 (en) | Memory controller | |
CN104951685A (en) | Method and mobile terminal for running application programs | |
CN107247899B (en) | Role authority control method and device based on security engine and security chip | |
CN106897629A (en) | The control method and terminal of terminal applies | |
CN111225285A (en) | Bluetooth device display name modification and display method, device, equipment and medium | |
US20150047019A1 (en) | Information processing method and electronic device | |
US8549312B2 (en) | Mobile terminal and method for protecting its system data | |
CN113378119B (en) | Software authorization method, device, equipment and storage medium | |
CN103391195B (en) | A kind of method of work of dynamic token | |
US20200120077A1 (en) | Secure data provisioning | |
CN110287661A (en) | Unlocking method of electronic equipment and electronic equipment | |
CN105402987B (en) | A kind of refrigerator and its control method | |
CN110379051B (en) | Unlocking method, device, terminal and storage medium | |
FI20206256A1 (en) | An identification method for electric vehicle charging stations | |
US11163863B2 (en) | Biometrics-based control device | |
WO2017166359A1 (en) | User domain access method, access device, and mobile terminal | |
CN109587529B (en) | Authorization method and authorization device for television function items |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |