CN114049704B - Door lock control method and device, electronic equipment and storage medium - Google Patents
Door lock control method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114049704B CN114049704B CN202111297699.9A CN202111297699A CN114049704B CN 114049704 B CN114049704 B CN 114049704B CN 202111297699 A CN202111297699 A CN 202111297699A CN 114049704 B CN114049704 B CN 114049704B
- Authority
- CN
- China
- Prior art keywords
- door lock
- bluetooth
- mobile terminal
- control
- page
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the disclosure relates to a door lock control method, a door lock control device, an electronic device and a storage medium, wherein the method is applied to a Bluetooth mobile terminal and comprises the following steps: broadcasting Bluetooth information, wherein the Bluetooth information is used for determining whether the Bluetooth mobile terminal has a control authority for the door lock; under the condition that the Bluetooth mobile terminal has the control authority, a door lock control page is presented; acquiring a verification key for the door lock through the door lock control page; and if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key. According to the method, the door lock is controlled through the Bluetooth mobile terminal, and the non-contact control of the door lock is facilitated.
Description
Technical Field
The disclosed embodiments relate to the field of door locks, and in particular, to a door lock control method and apparatus, an electronic device, and a storage medium.
Background
The existing intelligent door lock in the market basically depends on a password, a fingerprint, a finger vein, a magnetic card and the like to carry out local contact type operation on the intelligent door lock so as to obtain the door opening permission.
However, the above door opening method has certain limitations on the cost, appearance, etc. of the smart door lock. Moreover, the user is required to directly or indirectly contact the door lock to realize the control operations of opening and closing the door lock.
Disclosure of Invention
In view of the above, in order to solve some or all of the above technical problems, embodiments of the present disclosure provide a door lock control method, device, electronic device, and storage medium.
In a first aspect, an embodiment of the present disclosure provides a door lock control method, where the method is applied to a bluetooth mobile terminal, and the method includes:
broadcasting Bluetooth information, wherein the Bluetooth information is used for determining whether the Bluetooth mobile terminal has a control authority for the door lock;
under the condition that the Bluetooth mobile terminal has the control authority, a door lock control page is presented;
acquiring an authentication key for the door lock through the door lock control page;
and if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
Optionally, in a method according to any embodiment of the present disclosure, the obtaining, through the door lock control page, an authentication key for the door lock includes:
acquiring a verification key which is input to the door lock control page and aims at the door lock; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
Optionally, in a method according to any embodiment of the present disclosure, it is determined whether the bluetooth mobile terminal has the control authority by:
determining whether a Bluetooth identifier identical to the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in the method of any embodiment of the present disclosure, the method further includes at least one of:
presenting a preset identity authentication page under the condition that the identity authentication operation triggered by the door lock control page is detected;
presenting a preset door lock control authority setting page under the condition that the authority setting operation triggered by the door lock control page is detected;
presenting a preset door lock setting information query page under the condition of detecting the information query operation triggered by the door lock control page;
and presenting a preset program upgrading page under the condition of detecting the program upgrading operation triggered by the door lock control page.
In a second aspect, an embodiment of the present disclosure provides a door lock control method, where the method is applied to a bluetooth door lock, and the method includes:
acquiring Bluetooth information broadcasted by a Bluetooth mobile terminal;
determining whether the Bluetooth information indicates that the Bluetooth mobile terminal has a control authority for the door lock;
under the condition that the Bluetooth mobile terminal has the control authority, sending information for indicating the Bluetooth mobile terminal to present a door lock control page to the Bluetooth mobile terminal;
acquiring an authentication key for the door lock through the door lock control page;
and if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
Optionally, in the method according to any embodiment of the present disclosure, the determining whether the bluetooth information indicates that the bluetooth mobile terminal has a control right for the door lock includes:
determining whether a Bluetooth identifier identical to the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identifier set comprises the Bluetooth identifier which is the same as the Bluetooth identifier included by the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in a method according to any embodiment of the present disclosure, the acquiring, through the door lock control page, an authentication key for the door lock includes:
acquiring a verification key which is input to the door lock control page and aims at the door lock; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
In a third aspect, an embodiment of the present disclosure provides a door lock control device, where the door lock control device is disposed in a bluetooth mobile terminal, and the door lock control device includes:
a broadcasting unit configured to broadcast bluetooth information, wherein the bluetooth information is used to determine whether the bluetooth mobile terminal has a control authority for the door lock;
a first presenting unit configured to present a door lock control page in case that the bluetooth mobile terminal has the control authority;
a first acquisition unit configured to acquire an authentication key for the door lock through the door lock control page;
a first control unit configured to control the door lock based on the authentication key if the bluetooth mobile terminal is within a predetermined door lock control range.
Optionally, in an apparatus according to any embodiment of the present disclosure, the first obtaining unit is further configured to:
acquiring a verification key aiming at the door lock, which is input to the door lock control page; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
Optionally, in the apparatus according to any embodiment of the present disclosure, it is determined whether the bluetooth mobile terminal has the control authority by:
determining whether a Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in an apparatus according to any embodiment of the present disclosure, the apparatus further includes at least one of:
a second presentation unit configured to present a preset authentication page in a case where an authentication operation triggered by the door lock control page is detected;
a third presentation unit configured to present a preset door lock control authority setting page in a case where an authority setting operation triggered by the door lock control page is detected;
a fourth presentation unit configured to present a preset door lock setting information inquiry page in a case where an information inquiry operation triggered by the door lock control page is detected;
and the fifth presenting unit is configured to present a preset program upgrading page under the condition that the program upgrading operation triggered by the door lock control page is detected.
In a fourth aspect, the present disclosure provides a door lock control device, where the device is disposed on a bluetooth door lock, and the device includes:
a second acquisition unit configured to acquire bluetooth information broadcast by a bluetooth mobile terminal;
a determining unit configured to determine whether the bluetooth information indicates that the bluetooth mobile terminal has a control authority for the door lock;
a sending unit configured to send information for instructing the bluetooth mobile terminal to present a door lock control page to the bluetooth mobile terminal in case that the bluetooth mobile terminal has the control authority;
a third acquisition unit configured to acquire an authentication key for the door lock through the door lock control page;
and a second control unit configured to control the door lock based on the authentication key if the bluetooth mobile terminal is within a predetermined door lock control range.
Optionally, in the apparatus according to any embodiment of the present disclosure, the determining unit is further configured to:
determining whether a Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in an apparatus according to any embodiment of the present disclosure, the acquiring unit is further configured to:
acquiring a verification key which is input to the door lock control page and aims at the door lock; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
In a fifth aspect, an embodiment of the present disclosure provides an electronic device, including:
a memory for storing a computer program;
and a processor configured to execute the computer program stored in the memory, and when the computer program is executed, the method according to any embodiment of the door lock control method according to the first aspect or the second aspect of the present disclosure is implemented.
In a sixth aspect, the disclosed embodiments provide a computer readable medium, where the computer program, when executed by a processor, implements the method of any of the embodiments of the door lock control method of the first or second aspect.
In a seventh aspect, the disclosed embodiments provide a computer program, which includes computer readable code, when the computer readable code is run on a device, causes a processor in the device to execute instructions for implementing the steps in the method according to any one of the embodiments of the door lock control method of the first or second aspect.
The door lock control method provided by the embodiment of the disclosure is applied to a bluetooth mobile terminal, and can be used for broadcasting bluetooth information, wherein the bluetooth information is used for determining whether the bluetooth mobile terminal has a control authority for the door lock, then, under the condition that the bluetooth mobile terminal has the control authority, a door lock control page is presented, then, through the door lock control page, an authentication key for the door lock is acquired, and finally, if the bluetooth mobile terminal is within a predetermined door lock control range, the door lock is controlled based on the authentication key. According to the method, the door lock is controlled through the Bluetooth mobile terminal, and the non-contact control of the door lock is facilitated.
Another door lock control method provided by the embodiment of the disclosure is applied to a bluetooth door lock, and may be implemented by acquiring bluetooth information broadcast by a bluetooth mobile terminal, then determining whether the bluetooth information indicates that the bluetooth mobile terminal has a control authority for the door lock, then sending information for indicating that the bluetooth mobile terminal presents a door lock control page to the bluetooth mobile terminal when the bluetooth mobile terminal has the control authority, then acquiring an authentication key for the door lock through the door lock control page, and finally controlling the door lock based on the authentication key if the bluetooth mobile terminal is within a predetermined door lock control range. According to the method, the door lock is controlled through the Bluetooth mobile terminal, and the door lock is favorably controlled in a non-contact manner.
Drawings
Fig. 1 is a schematic flow chart of a door lock control method according to an embodiment of the present disclosure;
fig. 2A is a schematic flowchart of another door lock control method according to an embodiment of the disclosure;
fig. 2B is a schematic flowchart of another door lock control method according to an embodiment of the disclosure;
fig. 3 is a schematic flow chart illustrating a further door lock control method according to an embodiment of the disclosure;
fig. 4A is a schematic structural diagram of a door lock control device according to an embodiment of the present disclosure;
fig. 4B is a schematic structural diagram of another door lock control device according to the embodiment of the disclosure;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of parts and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
It will be understood by those within the art that the terms "first," "second," and the like in the embodiments of the present disclosure are used merely to distinguish one object, step, device, or module from another object, and do not denote any particular technical meaning or logical order therebetween.
It is also understood that in embodiments of the present disclosure, "a plurality" may refer to two or more and "at least one" may refer to one, two or more.
It is also to be understood that any reference to any component, data, or structure in the embodiments of the disclosure, may be generally understood as one or more, unless explicitly defined otherwise or stated otherwise.
In addition, the term "and/or" in the present disclosure is only one kind of association relationship describing an associated object, and means that three kinds of relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" in the present disclosure generally indicates that the former and latter associated objects are in an "or" relationship.
It should also be understood that the description of the various embodiments of the present disclosure emphasizes the differences between the various embodiments, and the same or similar parts may be referred to each other, so that the descriptions thereof are omitted for brevity.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be discussed further in subsequent figures.
It should be noted that, in the present disclosure, the embodiments and the features of the embodiments may be combined with each other without conflict. For the purpose of facilitating an understanding of the embodiments of the present disclosure, the present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with the embodiments. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
Fig. 1 is a schematic flowchart of a door lock control method provided in an embodiment of the present disclosure, as shown in fig. 1, the method is applied to a bluetooth mobile terminal, and the method specifically includes:
101. and broadcasting the Bluetooth information.
In the embodiment of the present disclosure, the execution subject (i.e., the bluetooth mobile terminal) of the door lock control method may broadcast the bluetooth information.
The Bluetooth information is used for determining whether the Bluetooth mobile terminal has the control authority for the door lock.
The bluetooth mobile terminal may be any mobile terminal having a bluetooth function. As an example, the bluetooth mobile terminal may be a bluetooth mobile phone, a computer having a bluetooth function, and the like.
In some optional implementations of this embodiment, it may be determined whether the bluetooth mobile terminal has the control right by:
firstly, whether the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification contained in the Bluetooth information is determined.
And the terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock. For example, the door lock or an electronic device (e.g., a server) communicatively connected to the door lock may store the preset bluetooth identifier set. Therefore, after the door lock scans the Bluetooth information broadcasted by the Bluetooth mobile terminal, the Bluetooth identification in the scanned Bluetooth information can be extracted to judge whether the Bluetooth identification which is the same as the scanned Bluetooth identification is included in the preset Bluetooth identification set.
And then, if the preset Bluetooth identifier set comprises the Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, if the preset bluetooth identifier set does not include a bluetooth identifier that is the same as the bluetooth identifier included in the bluetooth information, it is determined that the bluetooth information indicates that the bluetooth mobile terminal does not have the control authority for the door lock.
In other optional implementation manners of this embodiment, it may also be determined whether the bluetooth mobile terminal has the control right by:
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included by the Bluetooth information, and the Bluetooth information indicates that the distance between the Bluetooth mobile terminal and the door lock belongs to the target distance range, determining that the Bluetooth mobile terminal has the control authority.
And the terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has control authority for the door lock. The target distance range may be a distance range set by the bluetooth mobile terminal, or a distance range determined based on the time when the bluetooth information broadcast by the bluetooth mobile terminal is scanned in the history record and the time when the bluetooth mobile terminal is unlocked.
In some cases, the target distance range does not include 0 meters. Thereby, contactless control of the door lock can be achieved. If the distance between the Bluetooth mobile terminal and the door lock is 0 meter (namely, the Bluetooth mobile terminal and the door lock are in contact), it can be determined that the Bluetooth mobile terminal does not currently have the control authority for the door lock. When the distance between the Bluetooth mobile terminal and the door lock is 0 meter, the fact that a user using the Bluetooth mobile terminal is not familiar with the use mode of the door lock is shown, and the probability that the user belongs to an unfamiliar person is high.
102. And under the condition that the Bluetooth mobile terminal has the control authority, presenting a door lock control page.
In this disclosure, in a case that the door lock or the electronic device communicatively connected to the door lock determines that the bluetooth mobile terminal has the control authority, the execution main body may present a door lock control page.
Wherein, the control page of the door lock can realize the control of the door lock.
In some optional implementations of this embodiment, the executing body may further perform at least one of the following operations:
presenting a preset identity authentication page under the condition that the identity authentication operation triggered by the door lock control page is detected;
presenting a preset door lock control authority setting page under the condition that the authority setting operation triggered by the door lock control page is detected;
presenting a preset door lock setting information query page under the condition of detecting the information query operation triggered by the door lock control page;
and presenting a preset program upgrading page under the condition of detecting the program upgrading operation triggered by the door lock control page.
The identity authentication page can be used for inputting passwords and authenticating the passwords. If the password is verified, the door lock may be controlled, for example, opened or closed.
The door lock control authority setting page can be used for setting the operation authority of the door lock. For example, the password of the door lock may be modified, added, deleted, etc., and the identifier of the bluetooth mobile terminal having the control authority may also be added or deleted, so as to control the control authority of other bluetooth mobile terminals on the door lock.
The door lock setting information inquiry page can be used for inquiring the password of the door lock and the identification of the Bluetooth mobile terminal with the control authority.
The program upgrading page can be used for upgrading programs (such as the door lock control method)
103. And acquiring an authentication key aiming at the door lock through the door lock control page.
In this disclosure, the execution main body may obtain an authentication key for the door lock through the door lock control page.
In some optional implementations of this embodiment, the executing entity may execute the step 103 in a following manner, so as to obtain, through the door lock control page, an authentication key for the door lock:
and acquiring a verification key aiming at the door lock, which is input to the door lock control page.
104. And if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
In this disclosure, if the bluetooth mobile terminal is located within a predetermined door lock control range, the door lock may be controlled based on the verification key. For example, if the above-described authentication key coincides with a key for opening or closing the door lock, the door lock may be controlled to be opened or closed.
The door lock control range can be a distance range set by the Bluetooth mobile terminal, or a distance range determined by the time when the Bluetooth information broadcasted by the Bluetooth mobile terminal is scanned and the time when the door lock is unlocked by the Bluetooth mobile terminal in the history record.
In some cases, the door lock control range does not include 0 meters. Thereby, contactless control of the door lock can be achieved.
The door lock control method provided by the embodiment of the disclosure is applied to a bluetooth mobile terminal, and can be used for broadcasting bluetooth information, wherein the bluetooth information is used for determining whether the bluetooth mobile terminal has a control authority for the door lock, then, under the condition that the bluetooth mobile terminal has the control authority, a door lock control page is presented, then, through the door lock control page, an authentication key for the door lock is acquired, and finally, if the bluetooth mobile terminal is within a predetermined door lock control range, the door lock is controlled based on the authentication key. According to the method, the door lock is controlled through the Bluetooth mobile terminal, and the non-contact control of the door lock is facilitated.
Fig. 2A is a schematic flowchart of another door lock control method provided in the embodiment of the present disclosure, as shown in fig. 2A, the method is applied to a bluetooth mobile terminal, and the method specifically includes:
201. and broadcasting the Bluetooth information. The Bluetooth information is used for determining whether the Bluetooth mobile terminal has the control authority for the door lock.
202. And under the condition that the Bluetooth mobile terminal has the control authority, presenting a door lock control page.
203. And acquiring a default verification key aiming at the door lock from the door lock control page.
In this embodiment of the present disclosure, an execution subject (that is, a bluetooth mobile terminal) of the door lock control method may obtain a default authentication key for the door lock from the door lock control page.
The default authentication key may be set by a user using the bluetooth mobile terminal and stored in the bluetooth mobile terminal.
As an example, the user may set the above-mentioned default authentication key through an application of the bluetooth mobile terminal. Therefore, in the process of using the Bluetooth mobile terminal to approach the door lock, the Bluetooth mobile terminal can automatically pop up an interface comprising a default verification key, the default verification key is sent to the door lock through the application program to judge the validity of the password, and if the intelligent door lock passes the judgment, the door is opened immediately. The control mode improves the use convenience of the door lock.
204. And if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
In the embodiment of the disclosure, a default authentication key can be set through the bluetooth mobile terminal, and thus, the bluetooth mobile terminal can directly send the default authentication key to perform password authentication, thereby improving the efficiency of door lock control.
Fig. 2B is a schematic flow chart of another door lock control method according to the embodiment of the present disclosure. The method can be applied to the application scene of the intelligent door lock. Above-mentioned intelligent lock can have the bluetooth function. The Bluetooth mobile terminal can be opened and closed through an application program installed on the Bluetooth mobile terminal. The following exemplary description is made here with a bluetooth mobile terminal as a mobile phone. As shown in fig. 2B, the method specifically includes:
first, the user may use an application installed on the mobile phone (e.g., for executing the door lock control method) to select the smart door lock for pairing. The mobile phone keeps the Bluetooth function open in the process of pairing the application program and the intelligent door lock, and the Bluetooth information of the mobile phone can be sent to the intelligent door lock through the application program. After receiving the bluetooth information, the smart door lock compares the bluetooth information (for example, determines whether a bluetooth identifier identical to the bluetooth identifier included in the bluetooth information is included in a preset bluetooth identifier set to implement comparison), and verifies whether the secret key is correct to authenticate whether the user has the door lock administrator right. If the verification is passed, the Bluetooth information of the mobile phone is stored for identifying and connecting the short-range Bluetooth of the mobile phone of the user.
Here, the number of administrators of one type is generally 1 for the smart door lock, and the first user to add a pair is the administrator. The intelligent door lock is paired with a mobile phone user from an initial state, after the pairing is successful, user information is stored, user identification is automatically set from 0, one piece of mobile phone user information corresponds to one piece of user identification and is stored, and the default identification is 0, so that an administrator is provided. Wherein, the door lock administrator authority can include: deleting, adding and setting common users all need verification and approval of an administrator to be operated successfully, and the operation is equivalent to a home owner. When the mobile phone of the user with the administrator authority approaches the door lock, the application program interface automatically popped up is displayed with the complete operation function as shown in the attached figure 3, the password modification, addition, deletion and other settings of all the users under the family bound by the door lock can be set, and the use records of all the users under the family bound by the door lock can be inquired, namely the mobile phone has the maximum authority of currently controlling the door lock. After the ordinary user is successfully added, only a simple identity information verification interface (namely, an unlocking function) and an information query interface of the related use record of the user are used.
And then, the mobile phone is used to approach the intelligent door lock, the mobile phone broadcasts Bluetooth information, the intelligent door lock automatically scans and identifies the peripheral Bluetooth information, and whether the mobile phone corresponding to the scanned Bluetooth information is bound or not is judged. If the intelligent door lock is bound, a verification success message can be automatically sent to the bound mobile phone, and the intelligent door lock and the mobile phone are automatically connected through the Bluetooth information.
Then, after the mobile phone receives the message that the intelligent door lock is successfully bound, the application program pops up an operation selection interface (namely the door lock control page), the selection operations of 'identity verification', 'common setting' and 'information inquiry' can be carried out, and a corresponding operation interface can be accessed by selecting any function, so that detailed function operation control is carried out on the intelligent door lock. The application program can send the corresponding operation command to the intelligent door lock through Bluetooth encryption, and the intelligent door lock judges and stores the operation command.
Subsequently, the user clicks "authentication" of the application program, and may enter the password input interface (i.e., the authentication page described above) to perform password authentication. And clicking the 'common setting' of the application program, entering a function setting interface (namely the door lock control authority setting page), operating the intelligent door lock function, issuing the temporary password, deleting the password and the like. Clicking the 'information query' of the application program can enter a door lock setting information query and firmware upgrade interface (namely the door lock setting information query page and the program upgrade page).
In addition, the user can set a default pop-up window when the smart door lock is controlled in a short-range mode through the application program, for example, the default pop-up window is set to be a password input interface (namely, the door lock control page) for verifying unlocking authority. In the short-range induction range of the intelligent door lock, the mobile phone is close to the intelligent door lock, the mobile phone can automatically pop up a password input interface (namely the door lock control page), password information (namely the default verification key) is sent to the intelligent door lock by an application program to judge the validity of the password, the intelligent door lock judges that the door is opened immediately, and the control mode improves the convenience of the intelligent door lock.
Here, because the bluetooth scanning of lock is that the equipment of opening always and 2 seconds scanning surrounding range once, the distance of cell-phone and lock is within 10 meters generally speaking, and intelligent lock just can detect this bluetooth, for the reinforcing security, can control detection range and signal intensity, reach the condition and carry out the hookup again. In practice, the development can be performed based on a bluetooth 8762 chip, and the limitation condition of bluetooth connection can be changed by an application layer to the bluetooth broadcast parameter setting of the chip. Wherein, the bluetooth broadcast parameters may include at least one of the following: bluetooth searches for connection distance, time bluetooth continuously scans.
Finally, after the intelligent door lock is bound with the mobile phone of the user, the user can add a plurality of family members in a family, the family members in one family can select the same intelligent door lock to pair by using the application program in the mobile phone, and the door lock is controlled in a short range by using the application program installed in the mobile phone.
At present, the intelligent door lock in the market basically relies on passwords, fingerprints, finger veins, magnetic cards and the like to carry out local operation on the intelligent door lock so as to obtain the door opening authority, and the door opening mode has certain limitations on the cost, the appearance and the like of the intelligent door lock.
The door lock control method provided by the embodiment of the disclosure can solve the problem that the control of the intelligent door lock is limited to local operation or needs to be contacted, so that a user can realize short-range control of the intelligent door lock through an application program installed by a mobile phone, a function control interface can be automatically popped out, and the functional diversity of the intelligent door lock is embodied.
Fig. 3 is a schematic flow chart of a further door lock control method provided in an embodiment of the present disclosure, as shown in fig. 3, the method is applied to a bluetooth door lock, and the method includes:
301. and acquiring Bluetooth information broadcasted by the Bluetooth mobile terminal.
302. And determining whether the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority for the door lock.
303. And under the condition that the Bluetooth mobile terminal has the control authority, sending information for indicating the Bluetooth mobile terminal to present a door lock control page to the Bluetooth mobile terminal.
304. And acquiring an authentication key aiming at the door lock through the door lock control page.
305. And if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
In some optional implementation manners of this embodiment, the determining whether the bluetooth information indicates that the bluetooth mobile terminal has a control right for the door lock includes:
determining whether a Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identifier set comprises the Bluetooth identifier which is the same as the Bluetooth identifier included by the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
In some optional implementation manners of this embodiment, the obtaining, through the door lock control page, an authentication key for the door lock includes:
acquiring a verification key aiming at the door lock, which is input to the door lock control page; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
It should be noted that, besides the above-mentioned contents, each step described in the embodiment of the present disclosure may be executed by referring to steps of the door lock control method in fig. 1, fig. 2A, and fig. 2B, which may include technical features the same as or corresponding to the technical features described in the door lock control method in fig. 1, fig. 2A, and fig. 2B, so as to further achieve the technical effect of the door lock control method shown in fig. 1, fig. 2A, and fig. 2B, and specific reference is made to the description related to fig. 1, fig. 2A, and fig. 2B, which is not repeated herein for brevity.
The door lock control method provided by the embodiment of the disclosure is applied to a bluetooth door lock, and can be used for acquiring bluetooth information broadcasted by a bluetooth mobile terminal, then determining whether the bluetooth information indicates that the bluetooth mobile terminal has a control authority for the door lock, then sending information for indicating that the bluetooth mobile terminal presents a door lock control page to the bluetooth mobile terminal under the condition that the bluetooth mobile terminal has the control authority, then acquiring an authentication key for the door lock through the door lock control page, and finally controlling the door lock based on the authentication key if the bluetooth mobile terminal is within a predetermined door lock control range. According to the method, the door lock is controlled through the Bluetooth mobile terminal, and the non-contact control of the door lock is facilitated.
Fig. 4A is a schematic structural diagram of a door lock control device provided in the embodiment of the present disclosure, which specifically includes:
a broadcasting unit 401 configured to broadcast bluetooth information, wherein the bluetooth information is used to determine whether the bluetooth mobile terminal has a control authority for the door lock;
a first presenting unit 402 configured to present a door lock control page in case that the bluetooth mobile terminal has the control right;
a first obtaining unit 403 configured to obtain, through the door lock control page, an authentication key for the door lock;
a first control unit 404 configured to control the door lock based on the authentication key if the bluetooth mobile terminal is within a predetermined door lock control range.
Optionally, in an apparatus according to any embodiment of the present disclosure, the first obtaining unit 403 is further configured to:
acquiring a verification key which is input to the door lock control page and aims at the door lock; or
And acquiring a default verification key aiming at the door lock from the door lock control page.
Optionally, in the apparatus according to any embodiment of the present disclosure, it is determined whether the bluetooth mobile terminal has the control right by:
determining whether a Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in an apparatus according to any embodiment of the present disclosure, the apparatus further includes at least one of:
a second presenting unit (not shown in the figure) configured to present a preset authentication page in a case where an authentication operation triggered by the door lock control page is detected;
a third presenting unit (not shown in the figure) configured to present a preset door lock control authority setting page in a case where an authority setting operation triggered by the above-described door lock control page is detected;
a fourth presenting unit (not shown in the drawings) configured to present a preset door lock setting information inquiry page in a case where an information inquiry operation triggered by the above-mentioned door lock control page is detected;
and a fifth presenting unit (not shown in the figure) configured to present a preset program upgrade page in a case where a program upgrade operation triggered by the above-described door lock control page is detected.
The door lock control device provided in this embodiment may be the door lock control device shown in fig. 4B, and may perform all the steps of the door lock control method shown in fig. 1, fig. 2A, and fig. 2B, so as to achieve the technical effects of the door lock control method shown in fig. 1, fig. 2A, and fig. 2B, which are described with reference to fig. 1, fig. 2A, and fig. 2B for brevity, and are not described herein again.
Fig. 4B is a schematic structural diagram of a door lock control device provided in the embodiment of the present disclosure, which specifically includes:
a second obtaining unit 411 configured to obtain bluetooth information broadcast by a bluetooth mobile terminal;
a determining unit 412 configured to determine whether the bluetooth information indicates that the bluetooth mobile terminal has a control authority for the door lock;
a transmitting unit 413 configured to transmit information for instructing the bluetooth mobile terminal to present a door lock control page to the bluetooth mobile terminal in case that the bluetooth mobile terminal has the control authority;
a third obtaining unit 414 configured to obtain, through the door lock control page, an authentication key for the door lock;
a second control unit 415 configured to control the door lock based on the authentication key if the bluetooth mobile terminal is within a predetermined door lock control range.
Optionally, in an apparatus according to any embodiment of the present disclosure, the determining unit 412 is further configured to:
determining whether a Bluetooth identifier identical to the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in an apparatus according to any embodiment of the present disclosure, the third obtaining unit 414 is further configured to:
acquiring a verification key which is input to the door lock control page and aims at the door lock; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
The door lock control device provided in this embodiment may be the door lock control device shown in fig. 4B, and may perform all the steps of the door lock control method shown in fig. 3, so as to achieve the technical effect of the door lock control method shown in fig. 3, and please refer to the related description of fig. 3 for brevity, which is not described herein again.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure, where the electronic device 500 shown in fig. 5 includes: at least one processor 501, memory 502, at least one network interface 504, and other user interfaces 503. The various components in the electronic device 500 are coupled together by a bus system 505. It is understood that the bus system 505 is used to enable connection communications between these components. The bus system 505 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 505 in FIG. 5.
The user interface 503 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball (trackball), a touch pad or touch screen, etc.
It is to be understood that the memory 502 in embodiments of the present disclosure may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), enhanced Synchronous SDRAM (ESDRAM), synchlronous SDRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 502 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 502 stores elements, executable units or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 5021 and application programs 5022.
The operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application programs 5022 include various application programs such as a Media Player (Media Player), a Browser (Browser), etc., for implementing various application services. A program implementing the method of the embodiments of the present disclosure may be included in the application program 5022.
In the embodiment of the present disclosure, by calling a program or an instruction stored in the memory 502, specifically, a program or an instruction stored in the application program 5022, the processor 501 is configured to execute the method steps provided by the embodiment of the door lock control method applied to the bluetooth mobile terminal, for example, including: broadcasting Bluetooth information, wherein the Bluetooth information is used for determining whether the Bluetooth mobile terminal has a control authority for the door lock; under the condition that the Bluetooth mobile terminal has the control authority, a door lock control page is presented; acquiring an authentication key for the door lock through the door lock control page; and if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
Optionally, in a method according to any embodiment of the present disclosure, the acquiring, through the door lock control page, an authentication key for the door lock includes:
acquiring a verification key aiming at the door lock, which is input to the door lock control page; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
Optionally, in a method according to any embodiment of the present disclosure, it is determined whether the bluetooth mobile terminal has the control authority by:
determining whether a Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in the method of any embodiment of the present disclosure, the method further includes at least one of:
presenting a preset identity verification page under the condition that the identity verification operation triggered by the door lock control page is detected;
presenting a preset door lock control authority setting page under the condition that the authority setting operation triggered by the door lock control page is detected;
presenting a preset door lock setting information query page under the condition that the information query operation triggered by the door lock control page is detected;
and presenting a preset program upgrading page under the condition of detecting the program upgrading operation triggered by the door lock control page.
In other embodiments of the present disclosure, by calling the program or the instruction stored in the memory 502, specifically, the program or the instruction stored in the application 5022, the processor 501 may also be used to execute the method steps provided by the embodiment of the door lock control method applied to the bluetooth door lock, for example, including: acquiring Bluetooth information broadcasted by a Bluetooth mobile terminal; determining whether the Bluetooth information indicates that the Bluetooth mobile terminal has a control authority for the door lock; under the condition that the Bluetooth mobile terminal has the control authority, sending information for indicating the Bluetooth mobile terminal to present a door lock control page to the Bluetooth mobile terminal; acquiring a verification key for the door lock through the door lock control page; and if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
Optionally, in a method according to any embodiment of the present disclosure, the determining whether the bluetooth information indicates that the bluetooth mobile terminal has a control authority for the door lock includes:
determining whether a Bluetooth identifier identical to the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in a method according to any embodiment of the present disclosure, the acquiring, through the door lock control page, an authentication key for the door lock includes:
acquiring a verification key which is input to the door lock control page and aims at the door lock; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
The method disclosed by the embodiment of the present disclosure may be applied to the processor 501, or may be implemented by the processor 501. The processor 501 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in software form in the processor 501. The Processor 501 may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off the shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, or discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present disclosure may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present disclosure may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software elements in the decoding processor. The software elements may be located in ram, flash, rom, prom, or eprom, registers, among other storage media that are well known in the art. The storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502 and completes the steps of the method in combination with the hardware.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented in one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented by means of units performing the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
The electronic device provided in this embodiment may be the electronic device shown in fig. 5, and may execute all steps of the door lock control method shown in fig. 1 to 3, so as to achieve the technical effect of the door lock control method shown in fig. 1 to 3, and for brevity, reference is specifically made to the related descriptions of fig. 1 to 3, which are not repeated herein.
The disclosed embodiments also provide a storage medium (computer-readable storage medium). The storage medium herein stores one or more programs. Among others, storage media may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of the above kinds of memories.
When one or more programs in the storage medium are executable by one or more processors, the door lock control method executed on the electronic device side is realized.
The processor is configured to execute the door lock control program stored in the memory to implement the following steps of the door lock control method executed on the electronic device side: broadcasting Bluetooth information, wherein the Bluetooth information is used for determining whether the Bluetooth mobile terminal has a control authority for the door lock; under the condition that the Bluetooth mobile terminal has the control authority, a door lock control page is presented; acquiring a verification key for the door lock through the door lock control page; and if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
Optionally, in a method according to any embodiment of the present disclosure, the acquiring, through the door lock control page, an authentication key for the door lock includes:
acquiring a verification key aiming at the door lock, which is input to the door lock control page; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
Optionally, in the method according to any embodiment of the present disclosure, it is determined whether the bluetooth mobile terminal has the control right by:
determining whether a Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in the method of any embodiment of the present disclosure, the method further includes at least one of:
presenting a preset identity authentication page under the condition that the identity authentication operation triggered by the door lock control page is detected;
presenting a preset door lock control authority setting page under the condition that the authority setting operation triggered by the door lock control page is detected;
presenting a preset door lock setting information query page under the condition that the information query operation triggered by the door lock control page is detected;
and presenting a preset program upgrading page under the condition of detecting the program upgrading operation triggered by the door lock control page.
Alternatively, the processor may be configured to execute a door lock control program stored in the memory to implement the following steps of the door lock control method executed on the electronic device side: acquiring Bluetooth information broadcasted by a Bluetooth mobile terminal; determining whether the Bluetooth information indicates that the Bluetooth mobile terminal has a control authority for the door lock; under the condition that the Bluetooth mobile terminal has the control authority, sending information for indicating the Bluetooth mobile terminal to present a door lock control page to the Bluetooth mobile terminal; acquiring a verification key for the door lock through the door lock control page; and if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the door lock based on the verification secret key.
Optionally, in a method according to any embodiment of the present disclosure, the determining whether the bluetooth information indicates that the bluetooth mobile terminal has a control authority for the door lock includes:
determining whether a Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identifier set comprises the Bluetooth identifier which is the same as the Bluetooth identifier included by the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
Optionally, in a method according to any embodiment of the present disclosure, the obtaining, through the door lock control page, an authentication key for the door lock includes:
acquiring a verification key aiming at the door lock, which is input to the door lock control page; or alternatively
And acquiring a default verification key aiming at the door lock from the door lock control page.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments, objects, technical solutions and advantages of the present disclosure are further described in detail, it should be understood that the above-mentioned embodiments are only examples of the present disclosure, and are not intended to limit the scope of the present disclosure, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.
Claims (10)
1. A door lock control method is characterized in that the method is applied to a Bluetooth mobile terminal, and comprises the following steps:
broadcasting Bluetooth information, wherein the Bluetooth information is used for determining whether the Bluetooth mobile terminal has a control authority for the door lock, and if the Bluetooth mobile terminal is in contact with the door lock, determining that the Bluetooth mobile terminal does not have the control authority;
under the condition that the Bluetooth mobile terminal has the control authority, presenting a door lock control page;
acquiring an authentication key for the door lock through the door lock control page;
and if the Bluetooth mobile terminal is located in a predetermined door lock control range, controlling the door lock based on the verification secret key, wherein the door lock control range is determined based on the time of scanning the Bluetooth information broadcast by the Bluetooth mobile terminal in the history record and the time of unlocking through the Bluetooth mobile terminal.
2. The method of claim 1, wherein the obtaining, via the latch control page, an authentication key for the latch comprises:
acquiring a verification key for the door lock, which is input to the door lock control page; or
And acquiring a default verification key aiming at the door lock from the door lock control page.
3. The method of claim 1, wherein determining whether the Bluetooth mobile terminal has the control authority is performed by:
determining whether a Bluetooth identifier which is the same as the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set or not, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the door lock.
4. The method according to one of claims 1-3, characterized in that the method further comprises at least one of the following:
presenting a preset identity authentication page under the condition that the identity authentication operation triggered by the door lock control page is detected;
presenting a preset door lock control authority setting page under the condition that the authority setting operation triggered by the door lock control page is detected;
presenting a preset door lock setting information query page under the condition that the information query operation triggered by the door lock control page is detected;
and presenting a preset program upgrading page under the condition that the program upgrading operation triggered by the door lock control page is detected.
5. A door lock control method is characterized in that the method is applied to a Bluetooth door lock, and comprises the following steps:
acquiring Bluetooth information broadcasted by a Bluetooth mobile terminal;
determining whether the Bluetooth information indicates that the Bluetooth mobile terminal has a control authority for the Bluetooth door lock, wherein the Bluetooth mobile terminal is determined not to have the control authority if the Bluetooth mobile terminal is in contact with the door lock;
under the condition that the Bluetooth mobile terminal has the control authority, sending information for indicating the Bluetooth mobile terminal to present a door lock control page to the Bluetooth mobile terminal;
acquiring an authentication key aiming at the Bluetooth door lock through the door lock control page;
and if the Bluetooth mobile terminal is positioned in a predetermined door lock control range, controlling the Bluetooth door lock based on the verification secret key, wherein the door lock control range is determined based on the time of scanning the Bluetooth information broadcast by the Bluetooth mobile terminal in the history record and the time of unlocking through the Bluetooth mobile terminal.
6. The method of claim 5, wherein the determining whether the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock comprises:
determining whether a Bluetooth identifier identical to the Bluetooth identifier included in the Bluetooth information is included in a preset Bluetooth identifier set, wherein a terminal corresponding to the Bluetooth identifier in the preset Bluetooth identifier set has a control authority for the Bluetooth door lock;
and if the preset Bluetooth identification set comprises the Bluetooth identification which is the same as the Bluetooth identification included in the Bluetooth information, determining that the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority aiming at the Bluetooth door lock.
7. The utility model provides a door lock control device which characterized in that, the device sets up in bluetooth mobile terminal, the device includes:
a broadcasting unit configured to broadcast Bluetooth information, wherein the Bluetooth information is used to determine whether the Bluetooth mobile terminal has a control authority for the door lock, and in case that the Bluetooth mobile terminal is in contact with the door lock, the Bluetooth mobile terminal does not have the control authority;
the first presentation unit is configured to present a door lock control page under the condition that the Bluetooth mobile terminal has the control authority;
a first acquisition unit configured to acquire an authentication key for the door lock through the door lock control page;
a first control unit configured to control the door lock based on the verification key if the Bluetooth mobile terminal is located within a predetermined door lock control range, wherein the door lock control range is determined based on a time when Bluetooth information broadcasted by the Bluetooth mobile terminal is scanned in a history and a time when unlocking is performed by the Bluetooth mobile terminal.
8. The utility model provides a door lock controlling means which characterized in that, the device sets up in the bluetooth lock, the device includes:
a second acquisition unit configured to acquire Bluetooth information broadcast by a Bluetooth mobile terminal;
a determination unit configured to determine whether the Bluetooth information indicates that the Bluetooth mobile terminal has a control authority for the door lock, wherein it is determined that the Bluetooth mobile terminal does not have the control authority in a case where the Bluetooth mobile terminal is in contact with the door lock;
a sending unit configured to send information for instructing the Bluetooth mobile terminal to present a door lock control page to the Bluetooth mobile terminal in a case where the Bluetooth mobile terminal has the control authority;
a third acquisition unit configured to acquire an authentication key for the door lock through the door lock control page;
and the second control unit is configured to control the door lock based on the verification secret key if the Bluetooth mobile terminal is located in a predetermined door lock control range, wherein the door lock control range is determined based on the time of scanning the Bluetooth information broadcasted by the Bluetooth mobile terminal in the history record and the time of unlocking through the Bluetooth mobile terminal.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing a computer program stored in the memory, and when executed, implementing the method of any of the preceding claims 1-6.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of any one of the preceding claims 1 to 6.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111297699.9A CN114049704B (en) | 2021-11-03 | 2021-11-03 | Door lock control method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111297699.9A CN114049704B (en) | 2021-11-03 | 2021-11-03 | Door lock control method and device, electronic equipment and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN114049704A CN114049704A (en) | 2022-02-15 |
| CN114049704B true CN114049704B (en) | 2023-01-13 |
Family
ID=80207036
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111297699.9A Active CN114049704B (en) | 2021-11-03 | 2021-11-03 | Door lock control method and device, electronic equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114049704B (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114582057A (en) * | 2022-03-01 | 2022-06-03 | 上海番羽电子科技有限公司 | Multi-authentication intelligent access control management method and system based on bluetooth and password |
| CN115410298A (en) * | 2022-08-22 | 2022-11-29 | 珠海格力电器股份有限公司 | Door lock control method, door lock control device, intelligent door lock and storage medium |
| CN116543483A (en) * | 2023-05-27 | 2023-08-04 | 周文凤 | Gate-controlled information interaction device and interaction method thereof |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105261104A (en) * | 2015-11-24 | 2016-01-20 | 重庆理工大学 | Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system |
| CN105931330A (en) * | 2016-04-19 | 2016-09-07 | 北京奇虎科技有限公司 | Intelligent unlocking method and intelligent lock |
| CN108091009A (en) * | 2017-12-08 | 2018-05-29 | 深圳达实信息技术有限公司 | A kind of control of bluetooth access system and its application method based on narrowband Internet of Things |
| CN109472903A (en) * | 2018-11-20 | 2019-03-15 | 北京千丁互联科技有限公司 | A kind of control of bluetooth access control method and its device |
| KR102005954B1 (en) * | 2018-11-02 | 2019-08-05 | 주식회사 블루앤 | System for remote opening of communal door |
| CN110232754A (en) * | 2019-04-22 | 2019-09-13 | 深圳市昇润科技有限公司 | A kind of blue-tooth intelligence unlocking system and method |
| CN110347076A (en) * | 2019-05-22 | 2019-10-18 | 珠海格力电器股份有限公司 | Control method, control device, electronic equipment and storage medium |
| CN112907788A (en) * | 2021-01-25 | 2021-06-04 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
| CN113313864A (en) * | 2021-05-26 | 2021-08-27 | Oppo广东移动通信有限公司 | Access control method and device, wireless earphone, access control equipment and storage medium |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB9125540D0 (en) * | 1991-11-30 | 1992-01-29 | Davies John H E | Access control systems |
| CN203588400U (en) * | 2013-11-20 | 2014-05-07 | 马宁 | Door and window abnormal intrusion alarm system |
| CN111622617A (en) * | 2020-06-30 | 2020-09-04 | 李尤海 | Intelligent door lock based on fingerprint identification and unlocking method thereof |
-
2021
- 2021-11-03 CN CN202111297699.9A patent/CN114049704B/en active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105261104A (en) * | 2015-11-24 | 2016-01-20 | 重庆理工大学 | Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system |
| CN105931330A (en) * | 2016-04-19 | 2016-09-07 | 北京奇虎科技有限公司 | Intelligent unlocking method and intelligent lock |
| CN108091009A (en) * | 2017-12-08 | 2018-05-29 | 深圳达实信息技术有限公司 | A kind of control of bluetooth access system and its application method based on narrowband Internet of Things |
| KR102005954B1 (en) * | 2018-11-02 | 2019-08-05 | 주식회사 블루앤 | System for remote opening of communal door |
| CN109472903A (en) * | 2018-11-20 | 2019-03-15 | 北京千丁互联科技有限公司 | A kind of control of bluetooth access control method and its device |
| CN110232754A (en) * | 2019-04-22 | 2019-09-13 | 深圳市昇润科技有限公司 | A kind of blue-tooth intelligence unlocking system and method |
| CN110347076A (en) * | 2019-05-22 | 2019-10-18 | 珠海格力电器股份有限公司 | Control method, control device, electronic equipment and storage medium |
| CN112907788A (en) * | 2021-01-25 | 2021-06-04 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
| CN113313864A (en) * | 2021-05-26 | 2021-08-27 | Oppo广东移动通信有限公司 | Access control method and device, wireless earphone, access control equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN114049704A (en) | 2022-02-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN114049704B (en) | Door lock control method and device, electronic equipment and storage medium | |
| US20180115546A1 (en) | Information processing device, information processing system, and information processing method | |
| WO2018019243A1 (en) | Verification method, apparatus and device, and storage medium | |
| AU2016273890A1 (en) | Controlling physical access to secure areas via client devices in a networked environment | |
| CN104375836A (en) | Method and device for showing lock screen window | |
| US20150244718A1 (en) | Biometric authentication | |
| US8584222B2 (en) | Secure pin reset process | |
| CA2571811A1 (en) | User authentication for contact-less systems | |
| CN105321240A (en) | Control method and device of intelligent door lock and intelligent door control system | |
| CN110781468A (en) | An identity authentication processing method, device, electronic device and storage medium | |
| WO2020219771A1 (en) | Method and system for performing user authentication | |
| JP5200590B2 (en) | Vehicle remote control system | |
| CN111131202A (en) | Identity authentication method and system based on multiple information authentication | |
| CN112907788A (en) | Door lock control method and device, door lock and storage medium | |
| US20220309148A1 (en) | Personal Launch Code (PLC) created by an account owner and included within the creation of a device identification code defining the identity of a computing device seeking access to accounts | |
| CN111340987A (en) | Internet of things door lock communication method, device and system and computer storage medium | |
| CN116152958A (en) | Intelligent lock control method, mobile terminal, intelligent lock and readable medium | |
| WO2016078429A1 (en) | Identity recognition method and apparatus | |
| WO2016165537A1 (en) | Method for controlling intelligent terminal and apparatus for controlling intelligent terminal | |
| CN110750765B (en) | Service system, front-end page control method thereof, computer device, and storage medium | |
| CN108885654A (en) | A method and terminal for entering target application | |
| CN109067880B (en) | Remote unlocking method of shared equipment, device, equipment and storage medium thereof | |
| JP6941132B2 (en) | Input information management system | |
| CN109389720B (en) | Intelligent door lock permission processing method and device | |
| CN107679411A (en) | A kind of mobile terminal privacy processing method and mobile terminal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |