CN107146307A - A kind of method of securely unlocking of intelligent lock system - Google Patents
A kind of method of securely unlocking of intelligent lock system Download PDFInfo
- Publication number
- CN107146307A CN107146307A CN201710305357.4A CN201710305357A CN107146307A CN 107146307 A CN107146307 A CN 107146307A CN 201710305357 A CN201710305357 A CN 201710305357A CN 107146307 A CN107146307 A CN 107146307A
- Authority
- CN
- China
- Prior art keywords
- lock
- mobile phone
- password
- unlocking
- middle control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method of securely unlocking of intelligent lock system, middle control mobile phone is first bound for the first time with smart lock, the smart lock identification information of middle control mobile phone storage binding smart lock, the handset identity information of mobile phone is controlled in smart lock storage binding, middle control mobile phone independently generates unlocking cipher according to the smart lock identification information of handset identity information and storage, and smart lock independently generates password in lock according to memory mobile phone identification information and the smart lock identification information of itself.When unlocking, the unlocking cipher of middle control mobile phone generation is input to password in smart lock, the lock that smart lock generates the unlocking cipher with it and carries out contrast verification, unlocking cipher is identical with password in lock, then smart lock is unlocked, if unlocking cipher is different from password in lock, continues to close smart lock.The method of securely unlocking that the present invention is provided, whole process is that actual use person initiates and used, and is not required to third-party platform participation, it is ensured that the safety and reliability of unlocking, it is ensured that the personal safety of user and property safety.
Description
Technical field
The present invention relates to technical field of security and protection, and in particular to a kind of securely unlocking technology of intelligent lock system.
Background technology
With the development of smart home industry, the direction that smart lock has started to manage and control to high in the clouds is developed.It is existing
Safe and intelligent lock system includes smart lock cloud service platform, mobile phone and unlocking APP softwares on mobile phone, installed in intelligence
Intelligent lock controller inside lock, and the communication network (such as WiFi network) interconnected that communicated with Intelligent lock controller, by communicating
Network insertion internet, and then networked with smart lock cloud service platform.
The method for unlocking of the smart lock of prior art is:Mobile phone is sent out by unlocking APP softwares to smart lock cloud service platform
Send unlocking ask, by smart lock cloud service platform calculate temporary password and by temporary password by network be respectively transmitted to mobile phone and
Corresponding Intelligent lock controller, Intelligent lock controller stores the temporary password, and mobile phone receives the temporary password, and then user should
Temporary password is input to smart lock, and it is interim that the temporary password that Intelligent lock controller inputs user and Intelligent lock controller are stored
Password carries out contrast verification, and when both checkings are identical, Intelligent lock controller opens smart lock, is tested if two temporary passwords are compared
When card is differed, smart lock continues to close.This method unlocked by smart lock cloud service platform and network is present such as
Lower potential safety hazard:
1st, information leakage.Temporary password is produced by cloud platform and by public network transmissions, from cloud platform owner in one's hands
If mobile Internet, it is mainly computer internet from cloud platform to Intelligent lock controller, these public networks may be deposited
In potential safety hazard, the situation that network is stolen, information is stolen occurs now and then.
2nd, it can not unlock.Because temporary password will be transferred to Intelligent lock controller by smart lock cloud service platform, it is transmitted across
Cheng Zhonghui exist error of transmission, intermediate equipment failure and other reasons and cause the temporary password correctly to be connect by Intelligent lock controller
Receive and store, even if user inputs correct temporary password and can not unlocked.
3rd, it is under one's control.The smart lock of all use this kind of function, all by technology provider remote control, by smart lock cloud
Service platform issues temporary password, and the property safety of such user has very big potential safety hazard.Also, if smart lock cloud takes
Business platform and technology provider no longer provide this service, then smart lock becomes mechanical lock, and user benefit can not be ensured.
Therefore, it is necessary to provide a kind of safer smart lock method for unlocking.
The content of the invention
The present invention solves the technical problem of provide a kind of method of securely unlocking of intelligent lock system so that based on thing
Password keeps independence with network in the unlocking cipher and lock that the intelligent lock system of networking is generated in securely unlocking, will not produce
The safety issue brought on public network by password in transmission unlocking cipher and lock.
In order to solve the above technical problems, the technical scheme that a kind of method of securely unlocking of intelligent lock system of the present invention is used
It is:The intelligent lock system includes smart lock and middle control mobile phone, and the smart lock includes Intelligent lock controller, the method for securely unlocking bag
Include following steps:
First binding, control mobile phone sets up the interconnection that communicates with the Intelligent lock controller in this, controls handset identity in this and stores
The smart lock identification information of the Intelligent lock controller, the Intelligent lock controller recognizes and stored the handset identity letter that mobile phone is controlled in this
Breath;
Password is generated, mobile phone is controlled in this and is unlocked using the handset identity information and the generation of the smart lock identification information of storage
Password, the Intelligent lock controller utilizes password in the smart lock identification information and the handset identity information of storage generation lock;Or
Person, sets unlocking cipher, and the unlocking cipher of setting is controlled by controlling mobile phone in this with the smart lock by controlling mobile phone in this
The communication connection that device has been set up, is transferred in the Intelligent lock controller as password in corresponding lock;
Password authentification, during unlocking, unlocking cipher is inputted to the smart lock, the Intelligent lock controller of the smart lock inputs this
Unlocking cipher with lock in password carry out contrast verification;
Unlock response, if the unlocking cipher is identical with password in the lock, the Intelligent lock controller is considered effectively to unlock close
Code, then open the smart lock, if the unlocking cipher is different from password in the lock, and the Intelligent lock controller is considered that invalid unlocking is close
Code, then continue to close the smart lock.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, hand is controlled in first binding, in this
It is bluetooth data communication interconnection that machine sets up the interconnection that communicates with the Intelligent lock controller.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, the handset identity information includes middle control
The mobile phone IMEI code of mobile phone, the smart lock identification information include Intelligent lock controller in Intelligent lock controller MAC Address and/
Or the UUID of bluetooth service.
, should when using when generating password in another embodiment of the method for securely unlocking of intelligent lock system of the present invention
Middle control mobile phone is controlled using the handset identity information and the smart lock identification information of storage generation unlocking cipher, and the smart lock
Device is using during password, generation of control mobile phone is unlocked in this in the smart lock identification information and the handset identity information of storage generation lock
The process of password also includes adding the dynamic unlocking cipher of the mobile phone time information formation in control mobile phone in this, the intelligent lock control
The process of password is also included adding in the lock of the Intelligent lock controller in the dynamic lock of temporal information formation in device generation lock processed
Password.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, control mobile phone and the intelligent lock control in this
Device processed is set up after communication interconnection, in addition to during by controlling the mobile phone time information of mobile phone in this with the lock in the Intelligent lock controller
Between information correction it is identical.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, when in the mobile phone time information and lock
Between information include year, month, day, when and point.
, should when utilizing in password authentification in another embodiment of the method for securely unlocking of intelligent lock system of the present invention
When password is verified in the dynamic lock that the dynamic unlocking cipher of middle control mobile phone generation is generated with the Intelligent lock controller, by
Mobile phone is controlled in this and generates dynamic unlocking cipher to password progress contrast verification in the dynamic unlocking cipher and the dynamic lock
Between be provided with maximum time interval.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, generation password and password authentification it
Between, when being unlocked using the dynamic unlocking cipher that mobile phone generation is controlled in this, in addition to mobile phone being somebody's turn to do generation is controlled in this
Dynamic unlocking cipher is sent to user mobile phone by short message or network data, and user is obtained using the user mobile phone and dynamically opened
Lock cipher.
In another embodiment of the method for securely unlocking of intelligent lock system of the present invention, password in the unlocking cipher and the lock
It is at least 6 passwords.
A kind of another embodiment of the method for securely unlocking of intelligent lock system, will control mobile phone and the smart lock is accessed in this
To cloud platform, the status information one-way transmission of the smart lock to the cloud platform, the cloud platform sends out the status information of the smart lock
Give and mobile phone is controlled in this, mobile phone is controlled in this smart lock is monitored according to the status information of the smart lock of reception.
The beneficial effects of the invention are as follows:Bound for the first time with smart lock by middle control mobile phone, middle control mobile phone stores smart lock
Identification information, the Intelligent lock controller of smart lock stores the handset identity information of the middle control mobile phone of binding, is being ready for out
During lock, middle control mobile phone independently generates unlocking cipher, intelligence according to the smart lock identification information of the handset identity information of itself and storage
Can lock controller according to the handset identity information and the smart lock identification information of itself of the middle control mobile phone bound therewith of storage
Password in lock is independently generated, when unlocking, the unlocking cipher of middle control mobile phone generation smart lock is input to, Intelligent lock controller will
Password carries out contrast verification in the lock that the unlocking cipher is generated with it, and unlocking cipher is identical with password in lock, then smart lock is controlled
Device is unlocked, if unlocking cipher is different from password in lock, continues to close smart lock.A kind of method of securely unlocking of the present invention
Scheme, unlocking cipher and lock in password be all respectively by it is middle control mobile phone and Intelligent lock controller independently calculate generation, middle control hand
Machine and smart lock need not all access public network and carry out generation password, it is not required that generate and issue by cloud platform and be interim close
Code storage is to Intelligent lock controller and is issued on middle control mobile phone, therefore whole process is all that actual use person is initiated with using,
Third-party platform and network is not needed to participate in, it is ensured that the safety and reliability of unlocking, while decreasing the cost of user.
The scheme of another method of securely unlocking is to set unlocking cipher by middle control mobile phone, and is transferred to smart lock, is opened using this
Lock cipher is unlocked, be also only it is middle control mobile phone and smart lock between participate in, again without by cloud platform generation and under
The storage of hair temporary password is to Intelligent lock controller and is issued on middle control mobile phone, it is not necessary to which third-party platform and network are participated in, and are protected
The safety and reliability unlocked is demonstrate,proved.The securely unlocking process of the present invention is no longer limited by the constraint of technology provider remote control
System.The method of securely unlocking of the present invention ensure that personal safety and the property safety of user, it is ensured that the interests of user.
It is further preferred that middle control mobile phone generation unlocking cipher controls the mobile phone time information of mobile phone, intelligent lock control in adding
Password adds temporal information in the lock of Intelligent lock controller in device generation lock processed, because the middle mobile phone and Intelligent lock controller controlled all is
The generation of password in unlocking cipher and lock is independently carried out in the same time, ensure that unlocking cipher and password in lock are accurate
Correspondence, and because in the different periods, the unlocking cipher that middle control mobile phone is produced is different, it is ensured that middle control mobile phone is produced
Unlocking cipher change over time be dynamic change, further ensure the security of unlocking.
It is further preferred that temporal information in the lock of the mobile phone time information of middle control mobile phone and Intelligent lock controller is carried out
Correction, makes two times identical consistent, it is ensured that the accuracy of the unlocking cipher of generation and password in lock.
It is further preferred that middle control mobile phone carries out communication interconnection with Intelligent lock controller by bluetooth data communication, it is not required to
Want external network to participate in, further ensure the security of unlocking.
It is further preferred that handset identity information includes IMEI code, smart lock identification information includes the UUID of bluetooth service
And/or the MAC Address of Intelligent lock controller, because above-mentioned information all has uniqueness, so ensure that the unlocking of generation is close
Password is unique in code and lock.
It is further preferred that password is at least 6 passwords in unlocking cipher and lock, preferably 10 passwords are added
The safety coefficient of password in unlocking cipher and lock.
It is further preferred that smart lock can also be unlocked by fingerprint typing, the securely unlocking side of smart lock can be made
Method security is further enhanced, and further ensures the reliability of method for unlocking.
Brief description of the drawings
Fig. 1 is the flow chart of the method for securely unlocking embodiment of the intelligent lock system of the present invention;
Fig. 2 be the intelligent lock system of the present invention method of securely unlocking embodiment in the interconnection that communicated with smart lock of control mobile phone show
It is intended to;
Fig. 3 is the composition frame chart of safety intelligent lock.
Embodiment
Embodiments of the present invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning
Same or similar element or element with same or like function are represented to same or similar label eventually.Below by ginseng
The embodiment for examining accompanying drawing description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are it is understood that the correlation module and its function of realization that are related in the present invention
It is that computer software programs conventional in the prior art are carried in device, device or the system of hardware after improvement and its composition
It is not that computer software programs of the prior art or relevant agreement are improved or relevant agreement is achieved that.For example,
Computer hardware system after improvement still can realize the spy of the hardware system by loading existing operation system of software
Determine function.It is understood, therefore, that the innovation of the present invention is the improvement to hardware module in the prior art and its company
Syntagmatic is connect, rather than is only the improvement to realizing the software carried about function or agreement in hardware module.
Those skilled in the art of the present technique are it is understood that the correlation module mentioned in the present invention is performed for the application
Described in one or more of hardware device in step in operation, method, flow, measure, scheme.The hardware device can
Purpose needed for thinking and specially design and manufacture, or can also use known device in all-purpose computer or it is known its
His hardware device.The all-purpose computer is activated or reconstructed with having the procedure selection being stored in it.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " one " used herein, " one
It is individual ", " described " and "the" may also comprise plural form.It is to be further understood that what is used in the specification of the present invention arranges
Diction " comprising " refer to there is the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or combinations thereof.It should be understood that when we claim
Element is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also deposit
In intermediary element.In addition, " connection " used herein or " coupling " can include wireless connection or coupling.Wording used herein
"and/or" includes one or more associated any cells for listing item and all combined.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology) with the general understanding identical meaning with the those of ordinary skill in art of the present invention.Should also
Understand, those terms defined in such as general dictionary, which should be understood that, to be had and the meaning in the context of prior art
The consistent meaning of justice, and unless defined as here, will not be explained with idealization or excessively formal implication.
The embodiment to the method for securely unlocking of the intelligent lock system of the present invention is described in detail below.
As depicted in figs. 1 and 2, the embodiment of intelligent lock system method of securely unlocking of the invention, the intelligent lock system bag
Smart lock 1 and middle control mobile phone 2 are included, the smart lock includes Intelligent lock controller.Here, middle control mobile phone 2 refers to carry out smart lock 1
The mobile phone of unlocking control.Method of securely unlocking comprises the following steps:
S1:First binding, before being applied to smart lock 1, the middle control mobile phone 2 that first needs are unlocked and intelligence
Lock 1 is bound for the first time, the purpose bound for the first time, is sought to control mobile phone 2 in this to bind and is carried out unlocking control to the smart lock 1
The device of system., it is necessary to middle control mobile phone 2 be carried out into communication interconnection with smart lock 1, middle control mobile phone 2 is recognized and stored during first binding
The smart lock identification information of smart lock 1, Intelligent lock controller recognizes and stores the handset identity letter for the middle control mobile phone 2 bound therewith
Breath.
The present embodiment preferably, carries out communicating mutually between middle control mobile phone 2 and smart lock 1 using blue-teeth data connected mode
Connection.Blue-teeth data connected mode need not access public network, and the equipment of only two interconnections is participated in, i.e., in middle control mobile phone
Data are transmitted between 2 and smart lock 1, it is ensured that the security of data transfer.
The present embodiment generally has it is further preferred that handset identity information is primarily referred to as the identification information of interior of mobile phone
Uniqueness, includes the mobile phone IMEI code of middle control mobile phone, IMEI (International Mobile Equipment Identity)
Code is the abbreviation of International Mobile Equipment Identity code, " the electronics string number " being made up of 15 bit digitals, it and every cell phone one
One correspondence, and every cell phone IMEI code is that the whole world is unique.Smart lock identification information is primarily referred to as inside smart lock
Identification information, generally also with uniqueness, the UUID of MAC Address and/or bluetooth service comprising Intelligent lock controller.Its
In, the MAC Address of Intelligent lock controller, the MAC Address is also hardware address, and length is generally 48 bits, by the number of 16 systems
Word is constituted, and is divided into first 24 and latter 24.First 24 are called tissue unique identifier (Organizationally Unique
Identifier, i.e. OUI), it is the code distributed by IEEE registration management mechanism to different manufacturers, has distinguished different factories
Family.24 are distributed by producer oneself afterwards, referred to as extended identifier (having uniqueness).Therefore, each smart lock is controlled
The MAC Address of device is all unique, and the MAC Address of the Intelligent lock controller is usual with one two when smart lock 1 dispatches from the factory
The mode of dimension code is shown on smart lock 1.The UUID of bluetooth service is " Universally Unique Identifier " letter
Claim, the meaning of general unique identifier.There is general, independent, unique UUID to correspond to therewith for each bluetooth service.Therefore
The UUID of the bluetooth service is also unique, in same time, same place, it is impossible to have two identical UUID marks not
With service.
It is above-mentioned to there are two kinds of situations during middle control mobile phone 2 is bound with smart lock 1:
The first situation is, before the smart lock 1 is bound for the first time with middle control mobile phone 2 for the first time after dispatching from the factory, the intelligence
There is no any handset identity information in lock 1.The first binding method of such case is:Middle control mobile phone 2 and the Bluetooth communication of smart lock 1
After connection, the two carries out information exchange, and middle control mobile phone 2 finds do not have any handset identity information in the smart lock 1, and prompting is just
It is secondary to use, the software with encryption function on mobile phone 2 by setting is controlled in this, behaviour is encrypted in the binding to the smart lock 1
Make, the method for encryption can be password encryption or encrypting fingerprint, can be to prevent other mobile phones arbitrarily tying up to the smart lock 1
It is fixed.The MAC Address for the Intelligent lock controller that middle control mobile phone 2 obtains and stores smart lock 1, while middle control mobile phone 2 is obtained and stored
The UUID of this bluetooth service.The mobile phone IMEI code of control mobile phone 2 during smart lock 1 is obtained and stored, and this bluetooth service
UUID.The first binding of mobile phone 2 and smart lock 1 is controlled in completion.
Second of situation is that smart lock 1 had bound other mobile phones, therefore the smart lock is in other hands that are stored with before
The handset identity information of machine, when needs change the middle control hands that the unlock middle control mobile phone used or newly-increased other unlockings are used
Machine, it is also desirable to bound for the middle control mobile phone or newly-increased middle control mobile phone being modified.
The first binding method of control mobile phone is in change, it would be desirable to which the middle control mobile phone 2 of binding carries out bluetooth with smart lock 1 and led to
After letter connection, now, the middle control mobile phone 2 bound can point out to have had users, the middle control mobile phone 2 now bound
It must could continue to bind by an encryption identification information and mobile phone 2 is controlled in this, the encryption identification information, which is input to, needs binding
Middle control mobile phone 2 after, can show the information for the other mobile phones bound in the middle control mobile phone 2 bound, carry out
The handset identity information that has existed of selection change in the middle control mobile phone 2 of binding, the middle control mobile phone 2 bound is by smart lock 1
In the handset identity information deletion that has existed, the middle control mobile phone 2 bound obtains and stores the Quick Response Code of smart lock 1 and wrapped
The MAC Address of the Intelligent lock controller contained, while the middle control mobile phone 2 bound obtains and stores this bluetooth service
UUID.Smart lock 1 reacquires and stored the mobile phone IMEI code that mobile phone 2 is controlled in this, and this time UUID of bluetooth service.Complete
The first binding of the middle control mobile phone 2 being modified and smart lock 1.
The newly-increased first binding method for unlocking the middle control mobile phone used is to carry out newly-increased middle control mobile phone 2 with smart lock 1
After Bluetooth communication connection, now, newly-increased middle control mobile phone 2 can point out to have had users, and newly-increased middle control mobile phone 2 is equally
Need an encryption identification information to continue binding, the encryption identification information is input to after newly-increased middle control mobile phone 2, new
The information for the middle control mobile phone bound can be shown on the middle control mobile phone 2 increased, selects newly-increased in newly-increased middle control mobile phone 2,
Newly-increased middle control mobile phone 2 obtains and stored the MAC Address for the Intelligent lock controller that the Quick Response Code of smart lock 1 is included, with stylish
The middle control mobile phone 2 increased obtains and stores the UUID of this bluetooth service.Smart lock 1 obtains and stores newly-increased middle control mobile phone 2
Mobile phone IMEI code, and this time UUID of bluetooth service.Thus, newly-increased middle control mobile phone 2 is completed to tie up with the first of smart lock 1
It is fixed.By the first binding method of the above-mentioned newly-increased middle control mobile phone used of unlocking, controlled in can storing at least two in smart lock 1
The handset identity information of mobile phone so that smart lock 1 controls mobile phone in being controlled by least two.And each middle control mobile phone and intelligence
Binding and follow-up unlocking step between lock 1 are all separate, and contact is not produced each other.
S2:Password is generated, after the binding of middle control mobile phone 2 and smart lock 1 is completed, a kind of mode of generation password is, middle control
Mobile phone 2 can utilize handset identity information and the smart lock identification information of storage generation unlocking cipher, the intelligent lock control of smart lock 1
Device processed can utilize password in smart lock identification information and the handset identity information of storage generation lock.
Specifically, middle control mobile phone 2 using itself mobile phone IMEI code and above-mentioned storage Intelligent lock controller MAC
The UUID of location and bluetooth service resolves generation unlocking cipher;MAC Address of the Intelligent lock controller using itself, bluetooth service
The IMEI code of UUID and the mobile phone of above-mentioned storage resolves password in generation lock.Due in middle control mobile phone 2 and Intelligent lock controller
Password generating algorithm be identical, the two is encrypted as key and counted using handset identity information and smart lock identification information
Calculate, in the case where not considering other factors, at this time point of unlocking, password should in the unlocking cipher generated respectively and lock
It is identical.Here, when generating password in unlocking cipher and lock, the MAC Address of Intelligent lock controller and bluetooth service
UUID can be combined and use, you can so that the MAC Address of Intelligent lock controller or the UUID of bluetooth service is used alone, or
Can also be simultaneously using the MAC Address and the UUID of bluetooth service of Intelligent lock controller.
Password can be static password in above-mentioned unlocking cipher and lock, and generating process is:
For middle control mobile phone 2, when above-mentioned middle control mobile phone 2 is bound for the first time with smart lock 1, central control mobile phone 2
When obtaining and storing the smart lock identification information of smart lock 1, using itself mobile phone IMEI code and above-mentioned storage intelligent lock control
All numerals that the MAC Address of device processed and the UUID of bluetooth service these three information are included carry out a permutation and combination, or
The all numerals included using above three information carry out a logical operation with a pseudo-random sequence, and such as XOR is transported
Calculate, corresponding permutation and combination result or operation result are used as a static unlocking cipher.
For smart lock 1, smart lock 1 with middle control mobile phone 2 when being bound, while obtaining and controlling mobile phone in storing
2 handset identity information, immediately using the computational methods as middle control mobile phone 2, utilizes the MAC Address of itself, bluetooth service
UUID and all numerals for being included of the IMEI code of mobile phone of above-mentioned storage these three information carry out a permutation and combination, or
It is that all numerals included using three information carry out a logic XOR with a pseudo-random sequence, it is corresponding to be somebody's turn to do
Permutation and combination result or operation result are stored in Intelligent lock controller as password in a static lock.
Password can be changeless in this static unlocking cipher and static lock, always by the middle control He of mobile phone 2
Smart lock 1 is used;Or control mobile phone 2 week about in can also using or re-start within one month and once tied up again with smart lock 1
It is fixed, regenerate password in the static lock of static unlocking cipher and matching.The process for re-starting binding is controlled according in change
The first binding method of mobile phone is operated, and will not be repeated here.
In other embodiments, generation password of the invention in addition to those mentioned earlier, can also pass through middle control mobile phone 2
Fixed unlocking cipher, the unlocking cipher of such as stationary digital are set.The unlocking cipher set by middle control mobile phone 2 can be write
Enter in Intelligent lock controller as password in lock.In this process, handset identity information and smart lock identification information are not involved in out
The generation of password in lock cipher and lock, is intended only as the identity information that middle control mobile phone 2 and smart lock 1 are bound, middle control mobile phone 2
Obtain just to bind the smart lock 1 after smart lock identification information and the smart lock of unlocking control can be carried out to it, and smart lock 1
Obtain the mobile phone that just control mobile phone 2 in this is bound after handset identity information and controlled by its unlocking.In this manner, smart lock
Lock in password can only be configured by middle control mobile phone 2 in binding procedure, and can not be entered the keyboard of itself by smart lock 1
Row sets or deleted, and thus avoid artificial malice and password in fixed lock is pre-set to smart lock.
Equally, the unlocking cipher that another is fixed, i.e. finger-print cipher can also be set by middle control mobile phone, are referred to as here
For unlocking finger-print cipher, the unlocking finger-print cipher can be write and finger-print cipher in lock is used as in Intelligent lock controller.Here open
Finger-print cipher is locked, fingerprint is exactly entered into middle control mobile phone 2 and is used as unlocking cipher.Equally, in this process, handset identity information
The generation of finger-print cipher in unlocking finger-print cipher and lock is not involved in smart lock identification information, middle control mobile phone 2 and intelligence is intended only as
1 identity information bound can be locked.In this manner, finger-print cipher can only be existed by middle control mobile phone 2 in the lock of smart lock 1
It is configured in binding procedure, and can not be configured or delete by the Fingerprint Identification Unit of of smart lock 1 itself, that is to say, that
Any setting or modification that can not be completed by the man-machine interface operation to smart lock 1 itself to its inner cipher are operated, and all must
Must be operated and managed on the middle control mobile phone 2 bound.
Both modes, simplify the mode of password generation above, while also enhancing middle control mobile phone 2 to smart lock 1
Safety management function.
Password can also be dynamic password in above-mentioned unlocking cipher and lock, be using the beneficial effect of dynamic password,
The unlocking cipher used during unlocking can be changed over time and dynamic is changed, and add the security of unlocking.
The dynamic password generating process is exemplified below.This be accomplished by by it is middle control mobile phone 2 mobile phone time information with
Temporal information is corrected in the lock of the Intelligent lock controller of smart lock 1, to control the mobile phone time information and intelligence of mobile phone 2 in guarantee
Temporal information is identical in the lock for the Intelligent lock controller that 1 can be locked.Trimming process is to have a clock inside Intelligent lock controller,
If Intelligent lock controller accesses public network by modes such as WiFi, self time adjustment can be carried out.If do not accessed
Public network, middle control mobile phone 2 is set up after the interconnection that communicates with the Intelligent lock controller of smart lock 1, by the mobile phone time of middle control mobile phone 2
Information is identical with temporal information correction in the lock in Intelligent lock controller.The correction can control mobile phone 2 at regular intervals by middle,
Such as 2 days, one week or 15 days are corrected by Bluetooth communication.
After middle control mobile phone 2 and smart lock 1 binding is completed, middle control mobile phone 2 is using the computational methods of permutation and combination by hand
These four letters of machine IMEI code, the MAC Address of the Intelligent lock controller of above-mentioned storage, the UUID of bluetooth service and mobile phone time information
The included all numerals of breath carry out permutation and combination or carried out with a pseudo-random sequence after a logical operation, and generation is unlocked
Password, or middle control mobile phone recognize current uncaging time respectively with Intelligent lock controller, are distinguished according to current uncaging time
To mobile phone IMEI code, the MAC Address of the Intelligent lock controller of above-mentioned storage, bluetooth service UUID be combined correspondence generation open
Password in lock cipher and lock.Because mobile phone time information is dynamic change, therefore the unlocking cipher of generation is also dynamic change
's.Equally, smart lock 1 utilizes password in password in the lock with middle control mobile phone 2 identical computational methods generation, the lock to be also dynamic
Change.But because the time of smart lock 1 and middle control mobile phone 2 is dynamic change, the two can have certain deviation or error,
Should be by the deviation or control errors in rational scope, therefore be also required to every after a period of time, to smart lock 1 and middle control hand
The time of machine 2 is corrected.
Because password all passes through in the Intelligent lock controller generation lock of middle control mobile phone 2 generation unlocking cipher and smart lock 1
Identical algorithm and be complete independently, in generation unlocking cipher and lock during password, middle control mobile phone 2 and smart lock 1
Between there is no any information exchange, while also without the participation of network, it is ensured that the security of password.
In addition, password in the unlocking cipher time to time change that middle control mobile phone 2 is produced, the lock that Intelligent lock controller is produced
Time to time change, it is ensured that two kinds of passwords are all changed over time and dynamic changes, and further ensure the security of unlocking;Again
Secondary, if unlocking cipher is not used in cryptographic validity, the unlocking cipher will fail, and middle control mobile phone 2 needs to regenerate
New unlocking cipher, it is ensured that the unlocking cipher is not in situation about being usurped by other people or equipment, is further increased out
The security of lock.
Password in the further preferred ground of embodiments of the invention, unlocking cipher as needed and lock, is arranged to 6 and 6
Password more than position, preferably could be arranged to 10 passwords, by increasing capacitance it is possible to increase the safety coefficient of password.
S3:Password authentification, is input to smart lock 1, the intelligence by the above-mentioned unlocking cipher for being generated or being set by middle control mobile phone 2
Password in the unlocking cipher of input and above-mentioned lock is carried out contrast verification by the Intelligent lock controller of lock 1.
In step S3, unlocking cipher is input into the mode of smart lock 1 can use by the keyboard on smart lock 1
11 inputs.
Embodiments of the invention are it is further preferred that between step S2 and step S3, in addition to step S2-1, middle control hand
The dynamic unlocking cipher of generation is sent to user mobile phone by machine 2 by short message or network data, and user is according to the user mobile phone
Obtain dynamic unlocking cipher.Such as, carried out with the smart lock 1 when the cellphone subscriber that bound needs to unlock when not being, it is necessary to
Password request is sent to the middle control mobile phone 2 bound, the dynamic unlocking generated by middle control mobile phone 2 according to password request
Password simultaneously be sent to by way of short message need unlock user mobile phone, now user mobile phone have received dynamically unlock it is close
Code, can be input to smart lock 1 by the dynamic unlocking cipher and be unlocked, and increase the convenience and peace of the entrance of casual user
Quan Xing.
When producing dynamic password for adding temporal information in the password generating process in unlocking cipher and lock, middle control
Mobile phone 2 is generated after dynamic unlocking cipher, and user inputs the dynamic unlocking cipher to smart lock 1, and smart lock 1 receives the dynamic
Unlocking cipher while the also password in the dynamic lock of dynamic calculation smart lock 1.Obviously, middle control mobile phone 2 is generated dynamically
The mobile phone time information that unlocking cipher is utilized, temporal information in the lock that password is utilized in dynamic lock is generated with smart lock 1
And differ, or temporal information will be later than the mobile phone time information that middle control mobile phone 2 is utilized in the lock that utilizes of smart lock 1.Therefore,
To password in the dynamic unlocking cipher and dynamic lock should set between contrast verification generating dynamic unlocking cipher
A maximum time interval is equipped with, in the time interval, the dynamic unlocking cipher and dynamic lock of generation is ensure that
Interior password is identical, otherwise beyond the time interval, and two passwords can be different.The such as time interval is 3 minutes, that is to say, that raw
Time into dynamic unlocking cipher can not be 3 minutes earlier than password in the dynamic lock of generation, and middle control mobile phone 2 generates dynamic in other words
Unlocking cipher after, to be unlocked in 3 minutes, otherwise the dynamic unlocking cipher is timed out.Therefore, by middle control mobile phone 2
Generate dynamic unlocking cipher and generate the time interval that password in dynamic lock is provided with maximum to smart lock, the time interval is excellent
Elect as 3 minutes.
It is preferred that, mobile phone time information, and lock in temporal information be accurate to year, month, day, when and point.
S4:Unlock and respond, when password is identical in lock of the unlocking cipher inputted in step S3 with Intelligent lock controller, intelligence
Energy lock controller is considered effective unlocking cipher, then opens the smart lock 1, if password is not in the unlocking cipher and the lock of input
Together, then Intelligent lock controller is considered invalid unlocking cipher, then continues to close the smart lock 1.
It is further preferred that in embodiments of the invention, above-mentioned middle control mobile phone 2 can also be added when generating unlocking cipher
The finger print information of typing.The process of middle control mobile phone 2 generation unlocking cipher is that middle control mobile phone 2 first changes the finger print information of typing
Into digital information, middle control mobile phone 2 utilizes the mobile phone IMEI code of itself, the MAC Address of the Intelligent lock controller of storage, bluetooth service
UUID and the typing fingerprint digital information pass through an algorithm resolve generation unlocking cipher;The smart lock control of smart lock 1
Fingerprint in effective lock of storage is converted into digital information by device in advance, using the MAC Address of itself, the UUID of bluetooth service, is deposited
The IMEI code of the mobile phone of storage and the digital information of effective fingerprint of the conversion are used to resolve with middle control mobile phone 2 identical algorithm and given birth to
Password in into lock.Password adds the digital information of fingerprint in the unlocking cipher and lock, further ensures the security of unlocking.
Certainly, among these can also include add mobile phone time information and lock in temporal information, generate respectively dynamic unlocking cipher and
Password in lock.
The method for unlocking of the embodiment of the present invention further, can also be applied to based on cloud platform by embodiments of the invention
Intelligent lock system in, i.e., in control mobile phone 2 and smart lock 1 be linked into cloud platform, but place unlike the prior art is
The cloud platform does not provide unlocking service function, but uses the method for unlocking in the embodiment of the present invention.Further improvements
It is, smart lock 1 can access cloud platform by WIFI, ZIGBEE, wireless module etc., and the work state information of smart lock 1 can
To be sent to middle control mobile phone 2 by cloud platform, middle control mobile phone 2 is alerted according to the status information of reception.Supervised on middle control mobile phone 2
The warning information of smart lock 1 is measured, such as:Men Wei is shut, and door is prized, the low information of battery electric quantity, is further ensured that smart lock 1
Safety and reliability.
Based on above-mentioned same design, still further provides a kind of safety intelligent lock.
The safety intelligent lock generates unlocking cipher by middle control mobile phone, and the safety intelligent lock includes Intelligent lock controller and opened
Keyboard.Fig. 3 is the composition frame chart of the Intelligent lock controller of the safety intelligent lock, wherein, Intelligent lock controller 31 include with
The cipher key communication module 312 of CPU311 electrical connections, the handset identity information of middle control mobile phone 2 is inputted by cipher key communication module 312
To Intelligent lock controller 31, Intelligent lock controller 31 utilizes the smart lock identification information of itself and the life of the handset identity information of input
Password in into lock;Smart lock identification information is input to middle control mobile phone 2, or smart lock identification letter by cipher key communication module 312
Breath scans input in Quick Response Code form by middle control mobile phone 2, and middle control mobile phone 2 utilizes handset identity information and the smart lock of input
Identification information generates unlocking cipher.
Here, CPU311 is the core processor of Intelligent lock controller 31, in lock in the generation of password, unlocking cipher and lock
The processes such as the checking of password are all to be handled to complete by CPU311.
Password is all that middle control mobile phone 2 is given birth to independent calculate of smart lock 1 in the safety intelligent lock of the present invention, unlocking cipher and lock
Into, middle control mobile phone 2 and smart lock 1 all access network need not carry out networking again, it is not required that flat by smart lock cloud service
Platform generates and issued temporary password storage to smart lock 1 and is issued on middle control mobile phone 2, therefore whole process is all actual use
Person is initiated with using, it is not necessary to which third-party platform and network are participated in, it is ensured that the safety and reliability of smart lock, and then are ensured
The personal safety of user and property safety, it is ensured that the interests of user.
Here, it is relevant with the first binding described in Fig. 1 and generation password, the cipher key communication mould in Intelligent lock controller 31
Block 312 is that the module for communicate and interconnecting is set up between middle control mobile phone 2 and smart lock 1, it is preferred that the cipher key communication module 312 is
Bluetooth module or infrared communication module.Middle control mobile phone 2 is generally also integrated with the interfaces such as bluetooth, infrared communication, therefore,
Interacting for identification information is can be carried out with the blue tooth interface of middle control mobile phone 2 using the bluetooth module of Intelligent lock controller, is realized
The function of binding for the first time.In addition, Intelligent lock controller 31 is received after handset identity information by cipher key communication module 312, by hand
Machine identification information is input to CPU311, by CPU311 according to the smart lock identification information of Intelligent lock controller 31 and the mobile phone of input
Password in identification information generation lock.
It is preferred that, the handset identity information of middle control mobile phone includes the mobile phone IMEI code of middle control mobile phone;Smart lock identification information
The bluetooth service UUID codes and/or the mac address information of Intelligent lock controller provided including the bluetooth module.
It is further preferred that middle control mobile phone 2 generation unlocking cipher also includes adding mobile phone time information, Intelligent lock controller
Password also includes adding temporal information in lock in 31 generation locks.Further, since the mobile phone time information and smart lock of middle control mobile phone 2
Temporal information is two independent temporal informations in lock in 1, can there is error each other, be therefore, it can middle control mobile phone 2
The mobile phone time information of generation is input to Intelligent lock controller by cipher key communication module 312, and temporal information in the lock is entered
Row correction.
It is preferred that, the above-mentioned mobile phone time information for being used to generate unlocking cipher, and for generating in lock in the lock of password
Temporal information include year, month, day, when and point.
When generating password in unlocking cipher and lock, temporal information in corresponding mobile phone time information and lock is separately added into,
Uncaging time be accurate to year, month, day, when and point, it is ensured that unlocking cipher change over time and dynamic change, further ensure
The security of smart lock;Again, if unlocking cipher in cryptographic validity be not used, the unlocking cipher will fail, it is necessary to
Regenerate new unlocking cipher, it is ensured that the unlocking cipher is not in situation about being usurped by other people or equipment, further
Add the security of unlocking.
It is preferred that, password is at least 6 passwords in unlocking cipher and lock, for example, password is in unlocking cipher and lock
10 passwords.
Utilize temporal information generation in above-mentioned handset identity information, smart lock identification information and mobile phone time information and lock
The method of password refers to the description generated in Fig. 1 to password in unlocking cipher and lock, and here is omitted.
It is further preferred that in figure 3, Intelligent lock controller 31 also includes the monitoring communication module electrically connected with CPU311
313, monitoring communication module 313 and the cloud platform of safety intelligent lock 31 are interconnected, and the status information of safety intelligent lock is communicated by monitoring
Module 313 is transferred to the cloud platform.
It is preferred that, monitoring communication module 313 includes network communication module or ZIGBEE communication modules.Herein, network service
Module is primarily referred to as having access to the communication module of public network, such as wireless WiFi communication module, wireless network card, wired network adapter
Deng.ZIGBEE communication modules are also a kind of broadband wireless communications access node module, can also be real using ZIGBEE communication modules
Now access the purpose of public network.
, can't be public because of safety intelligent lock is accessed after Intelligent lock controller 31 includes monitoring communication module 313
Network and influence security because above-mentioned method for unlocking not therefore and change.And further, the state letter of safety intelligent lock
Breath, including unlocking, normally closure, the status information such as opening, illegal opening and/or battery electric quantity, then can pass through and monitor communication
Module 313 is transferred to public network and cloud service platform, it is possible thereby to middle control mobile phone further is given by these status information feedbacks,
Middle control mobile phone is monitored to the state of safety intelligent lock, it is further provided the safety of this safety intelligent lock
Property.
It is further preferred that as shown in figure 3, Intelligent lock controller 31 also includes the Fingerprint Identification Unit electrically connected with CPU
314, middle control mobile phone generation unlocking cipher need to further comprise the mobile fingerprint information of middle control mobile phone scanning, Intelligent lock controller 31
Password need to further comprise that Fingerprint Identification Unit 314 receives the door lock finger print information of identification in generation lock.
Here, the information needed for centering control mobile phone generation unlocking cipher is further expanded, except including before
Handset identity information, smart lock identification information, mobile phone time information, in addition to mobile fingerprint information.The mobile fingerprint information
It is to be inputted by the finger scan function of middle control mobile phone.Equally, the letter in lock needed for password is generated to safety intelligent lock
Breath is also further expanded, except temporal information in the handset identity information including before, smart lock identification information, lock,
Also include door lock finger print information.The door lock finger print information, the finger print information for receiving user is scanned by the Fingerprint Identification Unit 314.By
This is visible, so that guarantee normal unlocking, it is necessary to mobile fingerprint information is identical with door lock finger print information to can guarantee that unlocking
Password is identical with password in lock.In actual use, many personal finger print informations of storage can be scanned in middle control mobile phone, as to be selected
Mobile fingerprint information, when wherein someone unlocks, the finger print information of the people can be called as current in middle control mobile phone
Generate the mobile fingerprint information of unlocking cipher, at the same the people also by the Fingerprint Identification Unit 314 of safety intelligent lock to safe and intelligent
Lock inputs its finger print information, as the door lock finger print information of password in generation lock, it is possible thereby to ensure by the people to be pacified
Standard-sized sheet is locked, and further enhancing the security reliability of safety intelligent lock.
In addition, Fingerprint Identification Unit 314, which is also used as middle control mobile phone, generates another unlocking finger-print cipher fixed
Instrument.Here unlock finger-print cipher, fingerprint is exactly entered into middle control mobile phone and is used as unlocking cipher.Then middle mobile phone of controlling is by typing
Finger print information be transferred to Intelligent lock controller, Intelligent lock controller is used as finger-print cipher in lock.In this manner, smart lock
Lock in finger-print cipher can only be configured by middle control mobile phone in binding procedure, and the fingerprint of smart lock in itself can not be passed through
Identifier is configured or deleted, that is to say, that can not be by completing the man-machine interface operation of smart lock in itself to its inside
Any setting or modification operation of password, it is necessary to operated and managed on the middle control mobile phone bound.
The safety intelligent lock shown in Fig. 3 is illustrated above, due to being based on same with above-mentioned method of securely unlocking
Design, related content can be referred to, and here is omitted.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure transformation that bright specification and accompanying drawing content are made, or other related technical fields are directly or indirectly used in,
It is included within the scope of the present invention.
Claims (10)
1. a kind of method of securely unlocking of intelligent lock system, the intelligent lock system includes smart lock and middle control mobile phone, the intelligence
Can lock includes Intelligent lock controller, it is characterised in that the method for securely unlocking comprises the following steps:
First binding, the middle control mobile phone sets up the interconnection that communicates with the Intelligent lock controller, and the middle control handset identity is simultaneously deposited
The smart lock identification information of the Intelligent lock controller is stored up, the Intelligent lock controller recognizes and stores the hand of the middle control mobile phone
Machine identification information;
Password is generated, the middle control mobile phone is opened using the handset identity information and the generation of the smart lock identification information of storage
Lock cipher, the Intelligent lock controller is using in the smart lock identification information and the handset identity information of storage generation lock
Password;Or, by it is described it is middle control mobile phone set unlocking cipher, and by the unlocking cipher of setting by it is described it is middle control mobile phone with
The communication connection that the Intelligent lock controller has been set up, is transferred in the Intelligent lock controller as password in corresponding lock;
Password authentification, during unlocking, the unlocking cipher is inputted to the smart lock, and the Intelligent lock controller of the smart lock is by institute
The unlocking cipher and password in the lock for stating input carry out contrast verification;
Unlock and respond, if the unlocking cipher is identical with password in the lock, the Intelligent lock controller is considered effective unlocking
Password, then open the smart lock, if the unlocking cipher is different from password in the lock, the Intelligent lock controller is considered
Invalid unlocking cipher, then continue to close the smart lock.
2. method of securely unlocking according to claim 1, it is characterised in that in first binding, the middle control mobile phone with
It is bluetooth data communication interconnection that the Intelligent lock controller, which sets up communication interconnection,.
3. method of securely unlocking according to claim 2, it is characterised in that the handset identity information includes middle control mobile phone
Mobile phone IMEI code, the smart lock identification information include Intelligent lock controller in Intelligent lock controller MAC Address and/or
The UUID of bluetooth service.
4. the method for securely unlocking according to claims 1 to 3 any claim, it is characterised in that when generating password,
When using it is described it is middle control mobile phone using the handset identity information and storage the smart lock identification information generate unlocking cipher,
And the Intelligent lock controller utilizes password in the smart lock identification information and the handset identity information of storage generation lock
When, the process of the middle control mobile phone generation unlocking cipher also includes the mobile phone time information formation added in the middle control mobile phone
The process of password also includes adding the Intelligent lock controller in dynamic unlocking cipher, the Intelligent lock controller generation lock
Password in the dynamic lock of temporal information formation in lock.
5. method of securely unlocking according to claim 4, it is characterised in that the middle control mobile phone is controlled with the smart lock
Device is set up after communication interconnection, in addition to by the lock in the mobile phone time information and the Intelligent lock controller of the middle control mobile phone
Temporal information correction is identical.
6. method of securely unlocking according to claim 5, it is characterised in that time letter in the mobile phone time information and lock
Breath include year, month, day, when and point.
7. method of securely unlocking according to claim 5, it is characterised in that in password authentification, when controlling mobile phone in utilization
When password is verified in the dynamic lock that the dynamic unlocking cipher of generation is generated with the Intelligent lock controller, in described
Control mobile phone and generate dynamic unlocking cipher to password progress contrast verification in the dynamic unlocking cipher and the dynamic lock
Between be provided with maximum time interval.
8. method of securely unlocking according to claim 7, it is characterised in that between generation password and password authentification, when
When the dynamic unlocking cipher that mobile phone generation is controlled in is unlocked, in addition to the middle mobile phone of controlling is by the dynamic of generation
Unlocking cipher user mobile phone is sent to by short message or network data, user obtains dynamic unlock using the user mobile phone
Password.
9. method of securely unlocking according to claim 8, it is characterised in that password is equal in the unlocking cipher and the lock
It is at least 6 passwords.
10. method of securely unlocking according to claim 1, it is characterised in that by the middle control mobile phone and the smart lock
It is linked into cloud platform, the status information one-way transmission of the smart lock to the cloud platform, the cloud platform is by the smart lock
Status information be sent to middle control mobile phone, the middle control mobile phone is according to the status information of the smart lock of reception to the intelligence
Lock is monitored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710305357.4A CN107146307B (en) | 2017-05-03 | 2017-05-03 | A kind of method of securely unlocking of intelligent lock system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710305357.4A CN107146307B (en) | 2017-05-03 | 2017-05-03 | A kind of method of securely unlocking of intelligent lock system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107146307A true CN107146307A (en) | 2017-09-08 |
CN107146307B CN107146307B (en) | 2018-05-25 |
Family
ID=59774530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710305357.4A Active CN107146307B (en) | 2017-05-03 | 2017-05-03 | A kind of method of securely unlocking of intelligent lock system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107146307B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107680211A (en) * | 2017-09-22 | 2018-02-09 | 重庆市达林顿科技发展有限公司 | Intelligent unlocking device based on arrowband technology of Internet of things |
CN108711209A (en) * | 2018-07-19 | 2018-10-26 | 江苏恒宝智能系统技术有限公司 | dynamic password generation and verification method and system |
CN109410402A (en) * | 2018-11-09 | 2019-03-01 | 杭州力谱科技有限公司 | A kind of building gate control system |
CN109636970A (en) * | 2018-12-07 | 2019-04-16 | 李自力 | Dynamic puzzle-lock and its locking method |
CN109889596A (en) * | 2018-12-29 | 2019-06-14 | 珠海汇金科技股份有限公司 | Smart lock binding method, smart lock and smart lock binding system |
CN109914933A (en) * | 2019-04-01 | 2019-06-21 | 河南传通电子科技有限公司 | A kind of intelligent well cover monitoring management system based on Internet of Things |
CN109914934A (en) * | 2019-04-01 | 2019-06-21 | 河南传通电子科技有限公司 | A kind of intelligent case monitoring management system based on Internet of Things |
CN110070656A (en) * | 2019-05-07 | 2019-07-30 | 中国电子信息产业集团有限公司第六研究所 | Secrecy box and method for unlocking |
CN110176091A (en) * | 2019-05-15 | 2019-08-27 | 广东科徕尼智能科技有限公司 | A method of smart lock safety is improved by mobile terminal device code |
CN110853191A (en) * | 2019-11-12 | 2020-02-28 | 珠海格力电器股份有限公司 | Intelligent door lock unlocking method, equipment and medium |
CN110890958A (en) * | 2019-10-16 | 2020-03-17 | 蔚复来(浙江)科技股份有限公司 | Method for generating and verifying offline remote temporary password |
CN111145400A (en) * | 2020-02-25 | 2020-05-12 | 佛山市翰文裕城智能科技有限公司 | Safe and simple low-power-consumption Bluetooth lock and control method thereof |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109448171A (en) * | 2018-09-27 | 2019-03-08 | 深圳市迈悍德实业有限公司 | A kind of method and smart lock of unlocking |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204883882U (en) * | 2015-07-06 | 2015-12-16 | 深圳市浩卓科技有限公司 | Fingerprint lock system and lock |
US20160055694A1 (en) * | 2014-08-20 | 2016-02-25 | Gate Labs Inc. | Access management and resource sharing system based on biometric identity |
CN106097494A (en) * | 2016-06-03 | 2016-11-09 | 北京小米移动软件有限公司 | The method for unlocking of smart lock and device |
CN106355717A (en) * | 2016-09-05 | 2017-01-25 | 惠州Tcl移动通信有限公司 | Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication) |
-
2017
- 2017-05-03 CN CN201710305357.4A patent/CN107146307B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160055694A1 (en) * | 2014-08-20 | 2016-02-25 | Gate Labs Inc. | Access management and resource sharing system based on biometric identity |
CN204883882U (en) * | 2015-07-06 | 2015-12-16 | 深圳市浩卓科技有限公司 | Fingerprint lock system and lock |
CN106097494A (en) * | 2016-06-03 | 2016-11-09 | 北京小米移动软件有限公司 | The method for unlocking of smart lock and device |
CN106355717A (en) * | 2016-09-05 | 2017-01-25 | 惠州Tcl移动通信有限公司 | Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107680211A (en) * | 2017-09-22 | 2018-02-09 | 重庆市达林顿科技发展有限公司 | Intelligent unlocking device based on arrowband technology of Internet of things |
CN108711209A (en) * | 2018-07-19 | 2018-10-26 | 江苏恒宝智能系统技术有限公司 | dynamic password generation and verification method and system |
CN109410402B (en) * | 2018-11-09 | 2020-11-17 | 王锐 | Building access control system |
CN109410402A (en) * | 2018-11-09 | 2019-03-01 | 杭州力谱科技有限公司 | A kind of building gate control system |
CN109636970A (en) * | 2018-12-07 | 2019-04-16 | 李自力 | Dynamic puzzle-lock and its locking method |
CN109889596A (en) * | 2018-12-29 | 2019-06-14 | 珠海汇金科技股份有限公司 | Smart lock binding method, smart lock and smart lock binding system |
CN109914934A (en) * | 2019-04-01 | 2019-06-21 | 河南传通电子科技有限公司 | A kind of intelligent case monitoring management system based on Internet of Things |
CN109914933A (en) * | 2019-04-01 | 2019-06-21 | 河南传通电子科技有限公司 | A kind of intelligent well cover monitoring management system based on Internet of Things |
CN109914933B (en) * | 2019-04-01 | 2021-02-19 | 河南传通电子科技有限公司 | Intelligent well lid monitoring management system based on Internet of things |
CN110070656A (en) * | 2019-05-07 | 2019-07-30 | 中国电子信息产业集团有限公司第六研究所 | Secrecy box and method for unlocking |
CN110070656B (en) * | 2019-05-07 | 2021-04-06 | 中国电子信息产业集团有限公司第六研究所 | Security box and unlocking method |
CN110176091A (en) * | 2019-05-15 | 2019-08-27 | 广东科徕尼智能科技有限公司 | A method of smart lock safety is improved by mobile terminal device code |
CN110890958A (en) * | 2019-10-16 | 2020-03-17 | 蔚复来(浙江)科技股份有限公司 | Method for generating and verifying offline remote temporary password |
CN110890958B (en) * | 2019-10-16 | 2023-09-12 | 蔚复来(浙江)科技股份有限公司 | Offline remote temporary password generation method and verification method |
CN110853191A (en) * | 2019-11-12 | 2020-02-28 | 珠海格力电器股份有限公司 | Intelligent door lock unlocking method, equipment and medium |
CN111145400A (en) * | 2020-02-25 | 2020-05-12 | 佛山市翰文裕城智能科技有限公司 | Safe and simple low-power-consumption Bluetooth lock and control method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN107146307B (en) | 2018-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106971442B (en) | A kind of safe and intelligent lock system | |
CN107146307B (en) | A kind of method of securely unlocking of intelligent lock system | |
US11120656B2 (en) | Methods and systems for offline verification code generation based on smart door lock system | |
CN105279832B (en) | Intelligent door lock system and its control method | |
CN207409010U (en) | The newer temporary password access control system of encryption parameter dynamic | |
CN105654580B (en) | Access control method and system, electronic lock, management and visitor's terminal | |
CN107274532A (en) | The temporary password gate control system that encryption parameter dynamically updates | |
US20180359635A1 (en) | Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices | |
CN109905235A (en) | A kind of smart lock unlocking method, smart lock, terminal, server and system | |
EP2320388A1 (en) | Security system | |
CN106340104B (en) | A kind of coded lock, coded lock control system and method | |
CN108449177A (en) | The use control method and system of temporary password | |
CN106375091A (en) | communication link established to user apparatus via an access control device | |
CN110098923A (en) | A kind of method and apparatus of generation and verifying temporary password | |
KR102301478B1 (en) | Smart lock device, lock management system including the device, and lock management method using the system | |
CN105869246A (en) | Intelligent unlocking system and method thereof | |
CN206961200U (en) | A kind of safe and intelligent lock system | |
CN109035515A (en) | The control method and door-locking system of smart lock | |
US20170084100A1 (en) | Locking control device, locking control system, and locking control method | |
CN107154847A (en) | Towards the method for generating cipher code, verification method and its smart machine of offline environment | |
CN112734989B (en) | Bluetooth key distribution method for intelligent door lock | |
CN106912046A (en) | One-pass key card and vehicle pairs | |
CN108460862A (en) | The method and electric lockset, lock system having with palmprint authentication and Mobile phone control lock | |
CN106846573A (en) | The method and corresponding electronic lock of electronic lock are opened when without linking Internet | |
CN107958513A (en) | A kind of offline authorization method and system of electronic lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |