Lock control method, device and system, storage medium and electronic equipment
A control method and lock technology, applied in the computer field, can solve problems such as unsafe remote unlocking, achieve the effects of solving unsafe remote unlocking, expanding applicable scenarios, and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] The method embodiment provided in Embodiment 1 of the present application may be executed in a home gateway, a computer, a router, a smart speaker, or a similar computing device. Take running on a smart speaker as an example, figure 1 It is a block diagram of the hardware structure of a smart speaker according to the embodiment of the present invention. Such as figure 1 As shown, the smart speaker 10 may include one or more ( figure 1 Only one is shown in the figure) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. Optionally, the above-mentioned smart speaker also A transmission device 106 for communication functions as well as input and output devices 108 may be included. Those of ordinary skill in the art can understand that, figure 1 The structure shown is only for illustration, and it does not limit the structure of the smart...
Embodiment 2
[0079] In this embodiment, a lock control device and system are also provided, which are used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0080] Figure 6 is a structural block diagram of a lock control device according to an embodiment of the present invention, such as Figure 6 As shown, the device includes: a receiving module 60, an acquisition module 62, a generating module 64, and a sending module 66, wherein,
[0081] A receiving module 60, configured to receive a visitor notification message sent by the lockset;
[0082] A collection module 62, configu...
Embodiment 3
[0098] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.
[0099] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0100] S1, receiving a visitor notification message sent by the lock;
[0101] S2. Collect the first unlock key audio, where the unlock key audio carries unlock verification information;
[0102] S3. Generate an unlock instruction according to the voiceprint feature information of the first unlock key audio and the unlock verification information;
[0103] S4. Send the unlock instruction to the lock.
[0104] Optionally, in this embodiment, the above-mentioned storage medium may include but not limited to: U disk, read-only memory (Read-Only Memory, ROM for short), random access memory (Rand...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com