CN107564161A - Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server - Google Patents
Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server Download PDFInfo
- Publication number
- CN107564161A CN107564161A CN201710822576.XA CN201710822576A CN107564161A CN 107564161 A CN107564161 A CN 107564161A CN 201710822576 A CN201710822576 A CN 201710822576A CN 107564161 A CN107564161 A CN 107564161A
- Authority
- CN
- China
- Prior art keywords
- visitors
- passwords
- time
- unlocking
- visitor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention discloses visitor's method for unlocking and electronic lock, passwords of visitors generation method and server.Visitor's method for unlocking includes:The passwords of visitors of visitor's input is received, and obtains input time when inputting passwords of visitors;The input time is handled to obtain operation time according to preset rules;Default unlocking cipher and the operation time are combined to obtain data splitting, carrying out computing to the data splitting by default algorithm obtains verification password;Judge whether verification password is consistent with passwords of visitors;When verification password is consistent with passwords of visitors, then unlock successfully.The present invention obtains passwords of visitors using the split lock cipher of default algorithm and the combinatorial operation of time so that the real unlocking cipher of leakage is not a concern in house owner, need not more reset Password Operations, very convenient.
Description
Technical field
The present invention relates to visitor's unlocking technique of electronic lock.
Background technology
Electronic password lock, also known as electronic lock, it is that one kind (is accessed and controlled come control circuit or chip operation by Password Input
System processed), so as to the closure of control machinery switch, complete unlocking, the electronic product of locking task.Its species is a lot, there is letter
Easy circuit product, also there is the higher product of the cost performance based on chip.The wider electronic lock of application is using chip as core now
The heart, pass through what is be programmed to.
Electronic lock can use as gate inhibition.When there is visitor (relative or friend) to come to visit, but house owner stays out, and
When inconvenient horse back is gone home, house owner is also inconvenient to inform visitor unlocking cipher, and now visitor can only wait in front of the door,
Or leave away.After if house owner informs visitor's unlocking cipher, to ensure property safety, it is also necessary to password is reseted, it is comparatively laborious.Mesh
Preceding also solve house owner without relatively good method and stay out, but thinks that visitor unlocks the problem of entering wait.
The content of the invention
For overcome the deficiencies in the prior art, an object of the present invention is that providing a kind of visitor unlocks, and it can be solved
Not the problem of house owner does not have to tell visitor's real unlocking cipher.
The second object of the present invention is to provide a kind of electronic lock, and it can solve house owner and not have to tell visitor really to unlock
The problem of password.
The third object of the present invention is to provide a kind of passwords of visitors generation method, and it can solve house owner and not have to tell visitor
The problem of real unlocking cipher.
The fourth object of the present invention is to provide a kind of server, and it can solve house owner and not have to tell visitor really to unlock
The problem of password.
An object of the present invention is realized using following technical scheme:
A kind of visitor's method for unlocking, it is applied to electronic lock, and it comprises the following steps:
Step 1, the passwords of visitors for receiving visitor's input, and obtain input time when inputting passwords of visitors;
Step 2, according to preset rules the input time is handled to obtain operation time;
Step 3, default unlocking cipher and the operation time is combined to obtain data splitting, passes through default calculation
Method carries out computing to the data splitting and obtains verification password;
Step 4, judge whether verification password and passwords of visitors are consistent;
Step 5, when verification password is consistent with passwords of visitors, then unlock successfully.
Preferably, in step 2, the preset rules are:Point of the input time is read, if described point is less than or equal to
30, then input time when round backward, if the minute be more than 30, input time when round forward;
The form of the operation time is:Year-month-day-when;
In the step 4, if verification password is inconsistent with passwords of visitors, step 6 is performed;
Step 6, to the operation time when subtract 1, and return to step 3.
Preferably, when the number of run of the step 6 reaches the first preset times, then failure of unlocking.For example, first is pre-
If number is 2 times.
Preferably, it is described when the number for failure of unlocking reaches the second preset times, reject and visit in preset time
The passwords of visitors of visitor's input.For example, the second preset times are 3 times, preset time is 3 minutes.
Preferably, the default algorithm is MD5 or RC4 or Hash.
Preferably, the step 3 is replaced with following steps:By default unlocking cipher, the unique identities of the electronic lock
Identifier and the operation time are combined to obtain data splitting, and computing is carried out to the data splitting by default algorithm
Obtain verification password.
The second object of the present invention is realized using following technical scheme:
A kind of electronic lock, it includes memory and processor;
The memory, instructed for storage program;
The processor, for running described program instruction, the step of to perform visitor's method for unlocking as described above.
The third object of the present invention is realized using following technical scheme:
A kind of passwords of visitors generation method, it comprises the following steps:
Transmission time when receiving the unlocking cipher for the electronic lock that user terminal is sent and sending the unlocking cipher;
The transmission time is handled to obtain according to preset rules and calculates the time;
The unlocking cipher and the calculating time are combined to obtain data splitting, by default algorithm to described
Data splitting carries out computing and obtains passwords of visitors;
The passwords of visitors is sent to user terminal or guest.
Preferably, the preset rules are:Point of the transmission time is read, if described point is less than or equal to 30, is sent out
Send the time when round backward, if the minute be more than 30, send the time when round forward;
It is described calculate the time form be:Year-month-day-when.
Preferably, the default algorithm is MD5 or RC4 or Hash.
Preferably, it is described " to be combined to obtain data splitting by the unlocking cipher and the calculating time, by default
Algorithm to the data splitting carry out computing obtain passwords of visitors " replaced with following steps:By default unlocking cipher, described
The unique identities identifier of electronic lock and the calculating time are combined to obtain data splitting, by default algorithm to described
Data splitting carries out computing and obtains passwords of visitors.
The fourth object of the present invention is realized using following technical scheme:
A kind of server, it includes memory and processor;
The memory, instructed for storage program;
The processor, for running described program instruction, the step of to perform generation method as described above.
Compared with prior art, the beneficial effects of the present invention are:
Passwords of visitors is obtained using the split lock cipher of default algorithm and the combinatorial operation of time so that house owner is not a concern
Real unlocking cipher is revealed, need not more reset Password Operations, it is very convenient.
Brief description of the drawings
Fig. 1 is the flow chart of the passwords of visitors generation method of present pre-ferred embodiments;
Fig. 2 is the flow chart of visitor's method for unlocking of present pre-ferred embodiments;
Fig. 3 is the structural representation of the server of present pre-ferred embodiments;
Fig. 4 is the structural representation of the electronic lock of present pre-ferred embodiments.
Embodiment
Below, with reference to accompanying drawing and embodiment, the present invention is described further:
As shown in figure 1, present embodiment discloses a kind of passwords of visitors generation method, it is applied to server, the server
Can be Cloud Server or the private private name server set up.The passwords of visitors generation method comprises the following steps:
Step S1, receive user terminal send electronic lock unlocking cipher and send the unlocking cipher when transmission when
Between.The electronic lock of the present embodiment can be the electronic lock that can connect network or the electronic lock that can not connect network.
The user terminal of this step can be the intelligent terminals such as mobile phone, tablet personal computer.House owner logs in a page by user terminal,
Such as Web page or wechat public number, unlocking cipher is inputted on this page, and clicks on transmission.Server receives unlocking cipher
And transmission time when sending is clicked in acquisition.
Step S2, the transmission time is handled to obtain according to preset rules and calculates the time.
The preset rules are:Point of the transmission time is read, if described point is less than or equal to 30, sends the time
Shi Xianghou is rounded, if the minute be more than 30, send the time when round forward;It is described calculate the time form be:Year-
The moon--when.15 divide when being August in 2017 29 days 14 for example, sending the time, then the calculating time obtained through handling is 2017 8
During the moon 29 days 14.It it is 2017 8 through handling the obtained calculating time if sending the time 35 to divide when being August in 2017 29 days 14
During the moon 29 days 15.
Step S3, the unlocking cipher and the calculating time are combined to obtain data splitting, pass through default calculation
Method carries out computing to the data splitting and obtains passwords of visitors.The default algorithm is MD5 or RC4 or Hash.The present embodiment
It is preferred that use MD5.
In order to further improve security, this step (step S3) can improve and optimizate as follows:By default unlocking cipher, institute
The unique identities identifier and the calculating time for stating electronic lock are combined to obtain data splitting, by default algorithm to institute
State data splitting progress computing and obtain passwords of visitors.Wherein, the unique identities identifier of the electronic lock can be electronic lock
MCU machine code, i.e. MCUID.
Step S4, the passwords of visitors is sent to user terminal or guest.Stepped on for example, passwords of visitors returns to user terminal
The page of record, visitor is informed by liaison mode by house owner.Or guest is mobile phone, passwords of visitors directly passes through cell-phone number
Code is sent to the guest, and visitor can see passwords of visitors by the guest.
After visitor takes passwords of visitors, it is possible to input passwords of visitors to electronic lock, realize and unlock.Specific method is as schemed
Shown in 2, a kind of visitor's method for unlocking, it is applied to electronic lock, and it comprises the following steps:
Step S5, the passwords of visitors of visitor's input is received, and obtains input time when inputting passwords of visitors.
Step S6, the input time is handled to obtain operation time according to preset rules.
The preset rules of this step are identical with step S2, and the object simply handled is different.Specially:Read the input
Time point, if described point be less than or equal to 30, input time when round backward, if the minute be more than 30, input
Time when round forward;The form of the operation time is:Year-month-day-when.
Step S7, default unlocking cipher and the operation time are combined to obtain data splitting, by default
Algorithm carries out computing to the data splitting and obtains verification password.The default algorithm of this step is identical with step S3, that is, uses
MD5。
Accordingly, step S3 uses prioritization scheme, then this step (step S7) is also substituted for following steps:Opened default
Lock cipher, the unique identities identifier of the electronic lock and the operation time are combined to obtain data splitting, by default
Algorithm to the data splitting carry out computing obtain verification password.
Step S8, judge whether verification password is consistent with passwords of visitors, if so, performing step S9, otherwise, perform step
S10。
Step S9, when verification password is consistent with passwords of visitors, then unlock successfully.
If step S10, verification password and passwords of visitors are inconsistent, to the operation time when subtract 1, and return to step
S7.When step S10 number of run reaches the first preset times, then failure of unlocking.For example, the first preset times are 2 times.The
For one preset times equivalent to the term of validity of passwords of visitors, 2 times are 2 hours equivalent to the term of validity.It is of course also possible to set first pre-
If number is 1 time, that is, the term of validity is 1 hour, for safety and easy to use, general first preset times are arranged to 1
Or 2 be preferred, i.e., the term of validity is 1 or 2 hour.
15 divide when being August in 2017 29 days 14 for example, sending the time, then the calculating time obtained through handling is 2017 8
During the moon 29 days 14.The passwords of visitors A that then house owner obtains is obtained by combinatorial operation when unlocking cipher and August in 2017 29 days 14.
35 divide when the input time that visitor inputs passwords of visitors A is August in 2017 29 days 14, then through handling obtained calculating
When time is August in 2017 29 days 15.The passwords of visitors B that then electronic lock computing obtains is by unlocking cipher and August in 2017 29 days
Combinatorial operation obtains when 15.Passwords of visitors A and passwords of visitors B are inconsistent, then to 15 when subtract 1, perform step S7 again, then can be with
The passwords of visitors A judged results consistent with passwords of visitors B is obtained, is unlocked successfully.
15 divide when being August in 2017 29 days 14 in another example sending the time, then the calculating time obtained through handling is 2017
During August 29 days 14.The passwords of visitors A that then house owner obtains is obtained by combinatorial operation when unlocking cipher and August in 2017 29 days 14.
35 divide when the input time that visitor inputs passwords of visitors A is August in 2017 29 days 15, then through handling obtained calculating
When time is August in 2017 29 days 16.The passwords of visitors B that then electronic lock computing obtains is by unlocking cipher and August in 2017 29 days
Combinatorial operation obtains when 16.Passwords of visitors A and passwords of visitors B are inconsistent, then to 1,6 when subtract 1, again perform step S7, then may be used
To obtain passwords of visitors A and judged result inconsistent passwords of visitors B, then then held again to subtracting 1 again during 16 after subtracting 1 again
Row step S7, then the passwords of visitors A judged results consistent with passwords of visitors B can be obtained, is unlocked successfully.
When the number for failure of unlocking reaches the second preset times, the visitor of visitor's input is rejected in preset time
Password.For example, the second preset times are 3 times, preset time is 3 minutes.It thus can further improve the safety of electronic lock
Property.
As shown in figure 3, the present embodiment proposes a kind of server, it includes first memory and first processor;
The first memory, for storing the first programmed instruction;
The first processor, for running first programmed instruction, to perform following steps:
Step S1, receive user terminal send electronic lock unlocking cipher and send the unlocking cipher when transmission when
Between.
The user terminal of this step can be the intelligent terminals such as mobile phone, tablet personal computer.House owner logs in a page by user terminal,
Such as Web page or wechat public number, unlocking cipher is inputted on this page, and clicks on transmission.Server receives unlocking cipher
And transmission time when sending is clicked in acquisition.
Step S2, the transmission time is handled to obtain according to preset rules and calculates the time.
The preset rules are:Point of the transmission time is read, if described point is less than or equal to 30, sends the time
Shi Xianghou is rounded, if the minute be more than 30, send the time when round forward;It is described calculate the time form be:Year-
The moon--when.15 divide when being August in 2017 29 days 14 for example, sending the time, then the calculating time obtained through handling is 2017 8
During the moon 29 days 14.It it is 2017 8 through handling the obtained calculating time if sending the time 35 to divide when being August in 2017 29 days 14
During the moon 29 days 15.
Step S3, the unlocking cipher and the calculating time are combined to obtain data splitting, pass through default calculation
Method carries out computing to the data splitting and obtains passwords of visitors.The default algorithm is MD5 or RC4 or Hash.The present embodiment
It is preferred that use MD5.
In order to further improve security, this step (step S3) can improve and optimizate as follows:By default unlocking cipher, institute
The unique identities identifier and the calculating time for stating electronic lock are combined to obtain data splitting, by default algorithm to institute
State data splitting progress computing and obtain passwords of visitors.Wherein, the unique identities identifier of the electronic lock can be electronic lock
MCU machine code, i.e. MCUID.
Step S4, the passwords of visitors is sent to user terminal or guest.Stepped on for example, passwords of visitors returns to user terminal
The page of record, visitor is informed by liaison mode by house owner.Or guest is mobile phone, passwords of visitors directly passes through cell-phone number
Code is sent to the guest, and visitor can see passwords of visitors by the guest.
As shown in figure 4, the present embodiment also proposed a kind of electronic lock, it includes second memory and second processor;
The second memory, for storing the second programmed instruction;
The second processor, for running second programmed instruction, to perform following steps:
Step S5, the passwords of visitors of visitor's input is received, and obtains input time when inputting passwords of visitors.
Step S6, the input time is handled to obtain operation time according to preset rules.
The preset rules of this step are identical with step S2, and the object simply handled is different.Specially:Read the input
Time point, if described point be less than or equal to 30, input time when round backward, if the minute be more than 30, input
Time when round forward;The form of the operation time is:Year-month-day-when.
Step S7, default unlocking cipher and the operation time are combined to obtain data splitting, by default
Algorithm carries out computing to the data splitting and obtains verification password.The default algorithm of this step is identical with step S3, that is, uses
MD5。
Accordingly, step S3 uses prioritization scheme, then this step (step S7) is also substituted for following steps:Opened default
Lock cipher, the unique identities identifier of the electronic lock and the operation time are combined to obtain data splitting, by default
Algorithm to the data splitting carry out computing obtain verification password.
Step S8, judge whether verification password is consistent with passwords of visitors, if so, performing step S9, otherwise, perform step
S10。
Step S9, when verification password is consistent with passwords of visitors, then unlock successfully.
If step S10, verification password and passwords of visitors are inconsistent, to the operation time when subtract 1, and return to step
S7.When step S10 number of run reaches the first preset times, then failure of unlocking.For example, the first preset times are 2 times.The
For one preset times equivalent to the term of validity of passwords of visitors, 2 times are 2 hours equivalent to the term of validity.
15 divide when being August in 2017 29 days 14 for example, sending the time, then the calculating time obtained through handling is 2017 8
During the moon 29 days 14.The passwords of visitors A that then house owner obtains is obtained by combinatorial operation when unlocking cipher and August in 2017 29 days 14.
35 divide when the input time that visitor inputs passwords of visitors A is August in 2017 29 days 14, then through handling obtained calculating
When time is August in 2017 29 days 15.The passwords of visitors B that then electronic lock computing obtains is by unlocking cipher and August in 2017 29 days
Combinatorial operation obtains when 15.Passwords of visitors A and passwords of visitors B are inconsistent, then to 15 when subtract 1, perform step S7 again, then can be with
The passwords of visitors A judged results consistent with passwords of visitors B is obtained, is unlocked successfully.
15 divide when being August in 2017 29 days 14 in another example sending the time, then the calculating time obtained through handling is 2017
During August 29 days 14.The passwords of visitors A that then house owner obtains is obtained by combinatorial operation when unlocking cipher and August in 2017 29 days 14.
35 divide when the input time that visitor inputs passwords of visitors A is August in 2017 29 days 15, then through handling obtained calculating
When time is August in 2017 29 days 16.The passwords of visitors B that then electronic lock computing obtains is by unlocking cipher and August in 2017 29 days
Combinatorial operation obtains when 16.Passwords of visitors A and passwords of visitors B are inconsistent, then to 1,6 when subtract 1, again perform step S7, then may be used
To obtain passwords of visitors A and judged result inconsistent passwords of visitors B, then then held again to subtracting 1 again during 16 after subtracting 1 again
Row step S7, then the passwords of visitors A judged results consistent with passwords of visitors B can be obtained, is unlocked successfully.
When the number for failure of unlocking reaches the second preset times, the visitor of visitor's input is rejected in preset time
Password.For example, the second preset times are 3 times, preset time is 3 minutes.It thus can further improve the safety of electronic lock
Property.
It will be apparent to those skilled in the art that technical scheme that can be as described above and design, make other various
Corresponding change and deformation, and all these changes and deformation should all belong to the protection domain of the claims in the present invention
Within.
Claims (10)
1. a kind of visitor's method for unlocking, it is applied to electronic lock, it is characterised in that comprises the following steps:
Step 1, the passwords of visitors for receiving visitor's input, and obtain input time when inputting passwords of visitors;
Step 2, according to preset rules the input time is handled to obtain operation time;
Step 3, default unlocking cipher and the operation time is combined to obtain data splitting, passes through default algorithm pair
The data splitting carries out computing and obtains verification password;
Step 4, judge whether verification password and passwords of visitors are consistent;
Step 5, when verification password is consistent with passwords of visitors, then unlock successfully.
2. visitor's method for unlocking as claimed in claim 1, it is characterised in that in step 2, the preset rules are:Read institute
State input time point, if described point be less than or equal to 30, input time when round backward, if the minute be more than 30,
Then input time when round forward;
The form of the operation time is:Year-month-day-when;
In the step 4, if verification password is inconsistent with passwords of visitors, step 6 is performed;
Step 6, to the operation time when subtract 1, and return to step 3.
3. visitor's method for unlocking as claimed in claim 2, it is characterised in that when the number of run of the step 6 reaches first
During preset times, then failure of unlocking.
4. visitor's method for unlocking as claimed in claim 3, it is characterised in that it is pre- that the number to fail when unlocking reaches second
If during number, the passwords of visitors of visitor's input is rejected in preset time.
5. visitor's method for unlocking as claimed in claim 1, it is characterised in that the step 3 is replaced with following steps:Will be default
Unlocking cipher, the electronic lock unique identities identifier and the operation time be combined to obtain data splitting, pass through
Default algorithm carries out computing to the data splitting and obtains verification password.
6. a kind of electronic lock, it is characterised in that including memory and processor;
The memory, instructed for storage program;
The processor, for running described program instruction, unlocked with performing the visitor as described in claim 1-5 any one
The step of method.
7. a kind of passwords of visitors generation method, it is characterised in that comprise the following steps:
Transmission time when receiving the unlocking cipher for the electronic lock that user terminal is sent and sending the unlocking cipher;
The transmission time is handled to obtain according to preset rules and calculates the time;
The unlocking cipher and the calculating time are combined to obtain data splitting, by default algorithm to the combination
Data carry out computing and obtain passwords of visitors;
The passwords of visitors is sent to user terminal or guest.
8. passwords of visitors generation method as claimed in claim 7, it is characterised in that the preset rules are:Read the hair
Send the time point, if described point be less than or equal to 30, send the time when round backward, if the minute be more than 30, send out
Send the time when round forward;
It is described calculate the time form be:Year-month-day-when.
9. passwords of visitors generation method as claimed in claim 7, it is characterised in that it is described " by the unlocking cipher with it is described
The calculating time is combined to obtain data splitting, and it is close to obtain visitor to data splitting progress computing by default algorithm
Code " is replaced with following steps:Default unlocking cipher, the unique identities identifier of the electronic lock and the calculating time are entered
Row combination obtains data splitting, and carrying out computing to the data splitting by default algorithm obtains passwords of visitors.
10. a kind of server, it is characterised in that including memory and processor;
The memory, instructed for storage program;
The processor, for running described program instruction, to perform the generation method as described in claim 7-9 any one
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710822576.XA CN107564161A (en) | 2017-09-13 | 2017-09-13 | Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710822576.XA CN107564161A (en) | 2017-09-13 | 2017-09-13 | Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107564161A true CN107564161A (en) | 2018-01-09 |
Family
ID=60980642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710822576.XA Pending CN107564161A (en) | 2017-09-13 | 2017-09-13 | Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107564161A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840975A (en) * | 2019-01-29 | 2019-06-04 | 武汉天喻聚联网络有限公司 | Remote authorization unlocking system and method without networking |
CN113781686A (en) * | 2021-09-10 | 2021-12-10 | 青岛海信智慧生活科技股份有限公司 | Verification method, generation method and device for temporary password of intelligent door lock |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102682410A (en) * | 2012-05-22 | 2012-09-19 | 厦门思德电子科技有限公司 | Employee empowerment method based on housekeeping service |
CN103136830A (en) * | 2013-02-18 | 2013-06-05 | 江苏省电力公司金湖县供电公司 | Communication-free hopping code generation method of access control system |
CN104123777A (en) * | 2014-08-05 | 2014-10-29 | 上海众人科技有限公司 | Access control remote authorization method |
CN105046775A (en) * | 2015-07-14 | 2015-11-11 | 黄育斌 | Device for unlocking time domain two-dimension code |
CN105118127A (en) * | 2015-09-17 | 2015-12-02 | 慧锐通智能科技股份有限公司 | Visiting system and control method thereof |
CN106127905A (en) * | 2016-07-05 | 2016-11-16 | 杭州摇光科技有限公司 | A kind of electrical lock apparatus, system and method for unlocking thereof |
-
2017
- 2017-09-13 CN CN201710822576.XA patent/CN107564161A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102682410A (en) * | 2012-05-22 | 2012-09-19 | 厦门思德电子科技有限公司 | Employee empowerment method based on housekeeping service |
CN103136830A (en) * | 2013-02-18 | 2013-06-05 | 江苏省电力公司金湖县供电公司 | Communication-free hopping code generation method of access control system |
CN104123777A (en) * | 2014-08-05 | 2014-10-29 | 上海众人科技有限公司 | Access control remote authorization method |
CN105046775A (en) * | 2015-07-14 | 2015-11-11 | 黄育斌 | Device for unlocking time domain two-dimension code |
CN105118127A (en) * | 2015-09-17 | 2015-12-02 | 慧锐通智能科技股份有限公司 | Visiting system and control method thereof |
CN106127905A (en) * | 2016-07-05 | 2016-11-16 | 杭州摇光科技有限公司 | A kind of electrical lock apparatus, system and method for unlocking thereof |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840975A (en) * | 2019-01-29 | 2019-06-04 | 武汉天喻聚联网络有限公司 | Remote authorization unlocking system and method without networking |
CN113781686A (en) * | 2021-09-10 | 2021-12-10 | 青岛海信智慧生活科技股份有限公司 | Verification method, generation method and device for temporary password of intelligent door lock |
CN113781686B (en) * | 2021-09-10 | 2023-08-18 | 青岛海信智慧生活科技股份有限公司 | Verification method, generation method and device for temporary password of intelligent door lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105337928B (en) | Method for identifying ID, safety protection problem generation method and device | |
CN112651011B (en) | Login verification method, device and equipment for operation and maintenance system and computer storage medium | |
CN105323253B (en) | Identity verification method and device | |
CN109460966A (en) | Contract signing method, apparatus and terminal device based on requesting party's classification | |
CN110458559B (en) | Transaction data processing method, device, server and storage medium | |
CN107426169A (en) | A kind of method for processing business and device based on authority | |
US9332433B1 (en) | Distributing access and identification tokens in a mobile environment | |
CN107612880A (en) | One kind applies access method and device | |
CN107545637A (en) | The Activiation method and server of a kind of electronic lock | |
CN103036680A (en) | Realm name certification system and method based on biological feature recognition | |
CN106161710B (en) | A kind of user account safety management system based on smart phone | |
CN105022939A (en) | Information verification method and device | |
CN103188241A (en) | User account management method based on mobile intelligent terminal number | |
CN107517217A (en) | A Multi-factor Wireless Key Filling System Based on Fingerprint Identification | |
CN111784472A (en) | Risk control method, device, system and readable storage medium based on consumption data | |
CN107564161A (en) | Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server | |
CN103428698B (en) | Mobile interchange participant's identity strong authentication method | |
CN105930501B (en) | Network account correlating method and device | |
CN106302479B (en) | A kind of single-point logging method and system for multi-service internet site | |
CN113434481A (en) | Method, device, equipment and storage medium for realizing data service | |
CN105590044A (en) | Information authentication method and apparatus | |
CN116975821B (en) | Information processing method, device, electronic device, storage medium and program product | |
CN106375304A (en) | A one-time authentication method realized by intelligent hardware | |
CN105897726A (en) | Associated account data sharing method and device | |
CN111078649A (en) | Block chain-based on-cloud file storage method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |