Intelligent door lock unlocking system, method and device and medium

A smart door lock and door lock technology, applied to instruments, time registers, individual input port/output port registers, etc., can solve the problem of low security of smart door locks, improve security and reduce duplication Possibility, the effect of increasing difficulty

Active Publication Date: 2020-03-31
GREE ELECTRIC APPLIANCES INC +1
View PDF15 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an intelligent door lock unlocking system, method, device and medium, which are used to solve the problem of low security of intelligent door locks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent door lock unlocking system, method and device and medium
  • Intelligent door lock unlocking system, method and device and medium
  • Intelligent door lock unlocking system, method and device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0117] Embodiment 1 of the present invention provides an intelligent door lock unlocking system. The structural diagram of the system can be as follows figure 1 As shown, including the first mobile terminal 11 and the smart door lock 12, the first mobile terminal 11 uses the bound first client 111 to communicate with the smart door lock 12 through the local area network, and the first mobile terminal 11 and the smart door lock 12 bindings, of which:

[0118] The first client 111 is used to receive and generate an unlock data request in the administrator mode and send it to the smart door lock. The generated unlock data request carries the first terminal identifier of the first mobile terminal and / or the ID of at least one second mobile terminal. Second terminal identification;

[0119] The smart door lock 12 is used to generate a data packet corresponding to the first terminal identification and / or a data packet corresponding to each second terminal identification according t...

Embodiment 2

[0148] Embodiment 2 of the present invention provides a method for unlocking a smart door lock. The method is applied to a first client bound to a first mobile terminal. The first client communicates with the smart door lock through a local area network, and the first mobile terminal communicates with the Smart door lock binding, the steps of the method can be as follows figure 2 shown, including:

[0149] Step 101, receiving a request to generate unlock data.

[0150] In this step, the first client may receive a request for generating unlock data sent by the user in the administrator mode. The request for generating unlock data may carry the first terminal identifier of the first mobile terminal and / or the second terminal identifier of at least one second mobile terminal.

[0151] Step 102, sending a request for generating unlock data.

[0152] In this step, the first client may send a request to generate unlock data to the smart door lock, so that in the administrator mo...

Embodiment 3

[0170] Embodiment 3 of the present invention provides a method for unlocking a smart door lock. The method is applied to a second client bound to a second mobile terminal. The second client communicates with the smart door lock through a local area network. The steps of the method can be Such as image 3 shown, including:

[0171] Step 201, receiving a request to add a virtual card.

[0172] In this step, the second client may receive a request for adding a virtual card sent by the user. At this point, the second client may be in a non-administrator mode.

[0173] Step 202, sending a corresponding request to the smart door lock.

[0174] In this step, the second client may send a corresponding virtual card addition request to the smart door lock according to the received virtual card addition request, and the corresponding virtual card addition request carries the second terminal identifier of the second mobile terminal.

[0175] Step 203, receiving the data packet.

[01...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an intelligent door lock unlocking system, method and device and a medium. According to the scheme provided by the embodiment of the invention, the unlocking data can be generated by the intelligent door lock and directly stored in the mobile terminal. The unlocking data in the mobile terminal cannot be read by a card reader, so that the possibility that the unlocking datais copied is reduced. The unlocking data do not need to be written into the IC card, the problems that the unlocking data of the intelligent door lock are stored in the IC card, the unlocking data inthe IC card are easily read by a card reader, and the IC card is cracked and copied are solved fundamentally, and the safety of the intelligent door lock is improved.

Description

technical field [0001] The present invention relates to the technical field of intelligent door locks, in particular to an intelligent door lock unlocking system, method, device and medium. Background technique [0002] With the continuous development of science and technology, integrated circuit (IC) cards (subsequently referred to as IC cards) with near-field communication (NFC) functions have been widely used in various smart door lock unlocking scenarios, for example, various Household smart door locks, hotel room smart door locks and dormitory access control smart door locks, etc. [0003] IC card encryption methods are different in different scenarios. For example, the encryption level of IC cards used in scenarios such as hotel room smart door locks and dormitory access control smart door locks is relatively low. IC card encryption level is relatively high. [0004] Due to the continuous improvement of the current cracking technology, the use of IC cards has a relat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G07C9/27
CPCG07C9/00309G07C9/00571
Inventor 黄宇李绍斌唐杰陈道远杨苗
Owner GREE ELECTRIC APPLIANCES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products