[go: up one dir, main page]

CN107564161A - Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server - Google Patents

Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server Download PDF

Info

Publication number
CN107564161A
CN107564161A CN201710822576.XA CN201710822576A CN107564161A CN 107564161 A CN107564161 A CN 107564161A CN 201710822576 A CN201710822576 A CN 201710822576A CN 107564161 A CN107564161 A CN 107564161A
Authority
CN
China
Prior art keywords
visitors
passwords
time
unlocking
visitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710822576.XA
Other languages
Chinese (zh)
Inventor
王长海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AP TENON INFORMATION IDENTIFICATION TECHNOLOGY (GUANGZHOU) Co Ltd
Original Assignee
AP TENON INFORMATION IDENTIFICATION TECHNOLOGY (GUANGZHOU) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AP TENON INFORMATION IDENTIFICATION TECHNOLOGY (GUANGZHOU) Co Ltd filed Critical AP TENON INFORMATION IDENTIFICATION TECHNOLOGY (GUANGZHOU) Co Ltd
Priority to CN201710822576.XA priority Critical patent/CN107564161A/en
Publication of CN107564161A publication Critical patent/CN107564161A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses visitor's method for unlocking and electronic lock, passwords of visitors generation method and server.Visitor's method for unlocking includes:The passwords of visitors of visitor's input is received, and obtains input time when inputting passwords of visitors;The input time is handled to obtain operation time according to preset rules;Default unlocking cipher and the operation time are combined to obtain data splitting, carrying out computing to the data splitting by default algorithm obtains verification password;Judge whether verification password is consistent with passwords of visitors;When verification password is consistent with passwords of visitors, then unlock successfully.The present invention obtains passwords of visitors using the split lock cipher of default algorithm and the combinatorial operation of time so that the real unlocking cipher of leakage is not a concern in house owner, need not more reset Password Operations, very convenient.

Description

Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server
Technical field
The present invention relates to visitor's unlocking technique of electronic lock.
Background technology
Electronic password lock, also known as electronic lock, it is that one kind (is accessed and controlled come control circuit or chip operation by Password Input System processed), so as to the closure of control machinery switch, complete unlocking, the electronic product of locking task.Its species is a lot, there is letter Easy circuit product, also there is the higher product of the cost performance based on chip.The wider electronic lock of application is using chip as core now The heart, pass through what is be programmed to.
Electronic lock can use as gate inhibition.When there is visitor (relative or friend) to come to visit, but house owner stays out, and When inconvenient horse back is gone home, house owner is also inconvenient to inform visitor unlocking cipher, and now visitor can only wait in front of the door, Or leave away.After if house owner informs visitor's unlocking cipher, to ensure property safety, it is also necessary to password is reseted, it is comparatively laborious.Mesh Preceding also solve house owner without relatively good method and stay out, but thinks that visitor unlocks the problem of entering wait.
The content of the invention
For overcome the deficiencies in the prior art, an object of the present invention is that providing a kind of visitor unlocks, and it can be solved Not the problem of house owner does not have to tell visitor's real unlocking cipher.
The second object of the present invention is to provide a kind of electronic lock, and it can solve house owner and not have to tell visitor really to unlock The problem of password.
The third object of the present invention is to provide a kind of passwords of visitors generation method, and it can solve house owner and not have to tell visitor The problem of real unlocking cipher.
The fourth object of the present invention is to provide a kind of server, and it can solve house owner and not have to tell visitor really to unlock The problem of password.
An object of the present invention is realized using following technical scheme:
A kind of visitor's method for unlocking, it is applied to electronic lock, and it comprises the following steps:
Step 1, the passwords of visitors for receiving visitor's input, and obtain input time when inputting passwords of visitors;
Step 2, according to preset rules the input time is handled to obtain operation time;
Step 3, default unlocking cipher and the operation time is combined to obtain data splitting, passes through default calculation Method carries out computing to the data splitting and obtains verification password;
Step 4, judge whether verification password and passwords of visitors are consistent;
Step 5, when verification password is consistent with passwords of visitors, then unlock successfully.
Preferably, in step 2, the preset rules are:Point of the input time is read, if described point is less than or equal to 30, then input time when round backward, if the minute be more than 30, input time when round forward;
The form of the operation time is:Year-month-day-when;
In the step 4, if verification password is inconsistent with passwords of visitors, step 6 is performed;
Step 6, to the operation time when subtract 1, and return to step 3.
Preferably, when the number of run of the step 6 reaches the first preset times, then failure of unlocking.For example, first is pre- If number is 2 times.
Preferably, it is described when the number for failure of unlocking reaches the second preset times, reject and visit in preset time The passwords of visitors of visitor's input.For example, the second preset times are 3 times, preset time is 3 minutes.
Preferably, the default algorithm is MD5 or RC4 or Hash.
Preferably, the step 3 is replaced with following steps:By default unlocking cipher, the unique identities of the electronic lock Identifier and the operation time are combined to obtain data splitting, and computing is carried out to the data splitting by default algorithm Obtain verification password.
The second object of the present invention is realized using following technical scheme:
A kind of electronic lock, it includes memory and processor;
The memory, instructed for storage program;
The processor, for running described program instruction, the step of to perform visitor's method for unlocking as described above.
The third object of the present invention is realized using following technical scheme:
A kind of passwords of visitors generation method, it comprises the following steps:
Transmission time when receiving the unlocking cipher for the electronic lock that user terminal is sent and sending the unlocking cipher;
The transmission time is handled to obtain according to preset rules and calculates the time;
The unlocking cipher and the calculating time are combined to obtain data splitting, by default algorithm to described Data splitting carries out computing and obtains passwords of visitors;
The passwords of visitors is sent to user terminal or guest.
Preferably, the preset rules are:Point of the transmission time is read, if described point is less than or equal to 30, is sent out Send the time when round backward, if the minute be more than 30, send the time when round forward;
It is described calculate the time form be:Year-month-day-when.
Preferably, the default algorithm is MD5 or RC4 or Hash.
Preferably, it is described " to be combined to obtain data splitting by the unlocking cipher and the calculating time, by default Algorithm to the data splitting carry out computing obtain passwords of visitors " replaced with following steps:By default unlocking cipher, described The unique identities identifier of electronic lock and the calculating time are combined to obtain data splitting, by default algorithm to described Data splitting carries out computing and obtains passwords of visitors.
The fourth object of the present invention is realized using following technical scheme:
A kind of server, it includes memory and processor;
The memory, instructed for storage program;
The processor, for running described program instruction, the step of to perform generation method as described above.
Compared with prior art, the beneficial effects of the present invention are:
Passwords of visitors is obtained using the split lock cipher of default algorithm and the combinatorial operation of time so that house owner is not a concern Real unlocking cipher is revealed, need not more reset Password Operations, it is very convenient.
Brief description of the drawings
Fig. 1 is the flow chart of the passwords of visitors generation method of present pre-ferred embodiments;
Fig. 2 is the flow chart of visitor's method for unlocking of present pre-ferred embodiments;
Fig. 3 is the structural representation of the server of present pre-ferred embodiments;
Fig. 4 is the structural representation of the electronic lock of present pre-ferred embodiments.
Embodiment
Below, with reference to accompanying drawing and embodiment, the present invention is described further:
As shown in figure 1, present embodiment discloses a kind of passwords of visitors generation method, it is applied to server, the server Can be Cloud Server or the private private name server set up.The passwords of visitors generation method comprises the following steps:
Step S1, receive user terminal send electronic lock unlocking cipher and send the unlocking cipher when transmission when Between.The electronic lock of the present embodiment can be the electronic lock that can connect network or the electronic lock that can not connect network.
The user terminal of this step can be the intelligent terminals such as mobile phone, tablet personal computer.House owner logs in a page by user terminal, Such as Web page or wechat public number, unlocking cipher is inputted on this page, and clicks on transmission.Server receives unlocking cipher And transmission time when sending is clicked in acquisition.
Step S2, the transmission time is handled to obtain according to preset rules and calculates the time.
The preset rules are:Point of the transmission time is read, if described point is less than or equal to 30, sends the time Shi Xianghou is rounded, if the minute be more than 30, send the time when round forward;It is described calculate the time form be:Year- The moon--when.15 divide when being August in 2017 29 days 14 for example, sending the time, then the calculating time obtained through handling is 2017 8 During the moon 29 days 14.It it is 2017 8 through handling the obtained calculating time if sending the time 35 to divide when being August in 2017 29 days 14 During the moon 29 days 15.
Step S3, the unlocking cipher and the calculating time are combined to obtain data splitting, pass through default calculation Method carries out computing to the data splitting and obtains passwords of visitors.The default algorithm is MD5 or RC4 or Hash.The present embodiment It is preferred that use MD5.
In order to further improve security, this step (step S3) can improve and optimizate as follows:By default unlocking cipher, institute The unique identities identifier and the calculating time for stating electronic lock are combined to obtain data splitting, by default algorithm to institute State data splitting progress computing and obtain passwords of visitors.Wherein, the unique identities identifier of the electronic lock can be electronic lock MCU machine code, i.e. MCUID.
Step S4, the passwords of visitors is sent to user terminal or guest.Stepped on for example, passwords of visitors returns to user terminal The page of record, visitor is informed by liaison mode by house owner.Or guest is mobile phone, passwords of visitors directly passes through cell-phone number Code is sent to the guest, and visitor can see passwords of visitors by the guest.
After visitor takes passwords of visitors, it is possible to input passwords of visitors to electronic lock, realize and unlock.Specific method is as schemed Shown in 2, a kind of visitor's method for unlocking, it is applied to electronic lock, and it comprises the following steps:
Step S5, the passwords of visitors of visitor's input is received, and obtains input time when inputting passwords of visitors.
Step S6, the input time is handled to obtain operation time according to preset rules.
The preset rules of this step are identical with step S2, and the object simply handled is different.Specially:Read the input Time point, if described point be less than or equal to 30, input time when round backward, if the minute be more than 30, input Time when round forward;The form of the operation time is:Year-month-day-when.
Step S7, default unlocking cipher and the operation time are combined to obtain data splitting, by default Algorithm carries out computing to the data splitting and obtains verification password.The default algorithm of this step is identical with step S3, that is, uses MD5。
Accordingly, step S3 uses prioritization scheme, then this step (step S7) is also substituted for following steps:Opened default Lock cipher, the unique identities identifier of the electronic lock and the operation time are combined to obtain data splitting, by default Algorithm to the data splitting carry out computing obtain verification password.
Step S8, judge whether verification password is consistent with passwords of visitors, if so, performing step S9, otherwise, perform step S10。
Step S9, when verification password is consistent with passwords of visitors, then unlock successfully.
If step S10, verification password and passwords of visitors are inconsistent, to the operation time when subtract 1, and return to step S7.When step S10 number of run reaches the first preset times, then failure of unlocking.For example, the first preset times are 2 times.The For one preset times equivalent to the term of validity of passwords of visitors, 2 times are 2 hours equivalent to the term of validity.It is of course also possible to set first pre- If number is 1 time, that is, the term of validity is 1 hour, for safety and easy to use, general first preset times are arranged to 1 Or 2 be preferred, i.e., the term of validity is 1 or 2 hour.
15 divide when being August in 2017 29 days 14 for example, sending the time, then the calculating time obtained through handling is 2017 8 During the moon 29 days 14.The passwords of visitors A that then house owner obtains is obtained by combinatorial operation when unlocking cipher and August in 2017 29 days 14.
35 divide when the input time that visitor inputs passwords of visitors A is August in 2017 29 days 14, then through handling obtained calculating When time is August in 2017 29 days 15.The passwords of visitors B that then electronic lock computing obtains is by unlocking cipher and August in 2017 29 days Combinatorial operation obtains when 15.Passwords of visitors A and passwords of visitors B are inconsistent, then to 15 when subtract 1, perform step S7 again, then can be with The passwords of visitors A judged results consistent with passwords of visitors B is obtained, is unlocked successfully.
15 divide when being August in 2017 29 days 14 in another example sending the time, then the calculating time obtained through handling is 2017 During August 29 days 14.The passwords of visitors A that then house owner obtains is obtained by combinatorial operation when unlocking cipher and August in 2017 29 days 14.
35 divide when the input time that visitor inputs passwords of visitors A is August in 2017 29 days 15, then through handling obtained calculating When time is August in 2017 29 days 16.The passwords of visitors B that then electronic lock computing obtains is by unlocking cipher and August in 2017 29 days Combinatorial operation obtains when 16.Passwords of visitors A and passwords of visitors B are inconsistent, then to 1,6 when subtract 1, again perform step S7, then may be used To obtain passwords of visitors A and judged result inconsistent passwords of visitors B, then then held again to subtracting 1 again during 16 after subtracting 1 again Row step S7, then the passwords of visitors A judged results consistent with passwords of visitors B can be obtained, is unlocked successfully.
When the number for failure of unlocking reaches the second preset times, the visitor of visitor's input is rejected in preset time Password.For example, the second preset times are 3 times, preset time is 3 minutes.It thus can further improve the safety of electronic lock Property.
As shown in figure 3, the present embodiment proposes a kind of server, it includes first memory and first processor;
The first memory, for storing the first programmed instruction;
The first processor, for running first programmed instruction, to perform following steps:
Step S1, receive user terminal send electronic lock unlocking cipher and send the unlocking cipher when transmission when Between.
The user terminal of this step can be the intelligent terminals such as mobile phone, tablet personal computer.House owner logs in a page by user terminal, Such as Web page or wechat public number, unlocking cipher is inputted on this page, and clicks on transmission.Server receives unlocking cipher And transmission time when sending is clicked in acquisition.
Step S2, the transmission time is handled to obtain according to preset rules and calculates the time.
The preset rules are:Point of the transmission time is read, if described point is less than or equal to 30, sends the time Shi Xianghou is rounded, if the minute be more than 30, send the time when round forward;It is described calculate the time form be:Year- The moon--when.15 divide when being August in 2017 29 days 14 for example, sending the time, then the calculating time obtained through handling is 2017 8 During the moon 29 days 14.It it is 2017 8 through handling the obtained calculating time if sending the time 35 to divide when being August in 2017 29 days 14 During the moon 29 days 15.
Step S3, the unlocking cipher and the calculating time are combined to obtain data splitting, pass through default calculation Method carries out computing to the data splitting and obtains passwords of visitors.The default algorithm is MD5 or RC4 or Hash.The present embodiment It is preferred that use MD5.
In order to further improve security, this step (step S3) can improve and optimizate as follows:By default unlocking cipher, institute The unique identities identifier and the calculating time for stating electronic lock are combined to obtain data splitting, by default algorithm to institute State data splitting progress computing and obtain passwords of visitors.Wherein, the unique identities identifier of the electronic lock can be electronic lock MCU machine code, i.e. MCUID.
Step S4, the passwords of visitors is sent to user terminal or guest.Stepped on for example, passwords of visitors returns to user terminal The page of record, visitor is informed by liaison mode by house owner.Or guest is mobile phone, passwords of visitors directly passes through cell-phone number Code is sent to the guest, and visitor can see passwords of visitors by the guest.
As shown in figure 4, the present embodiment also proposed a kind of electronic lock, it includes second memory and second processor;
The second memory, for storing the second programmed instruction;
The second processor, for running second programmed instruction, to perform following steps:
Step S5, the passwords of visitors of visitor's input is received, and obtains input time when inputting passwords of visitors.
Step S6, the input time is handled to obtain operation time according to preset rules.
The preset rules of this step are identical with step S2, and the object simply handled is different.Specially:Read the input Time point, if described point be less than or equal to 30, input time when round backward, if the minute be more than 30, input Time when round forward;The form of the operation time is:Year-month-day-when.
Step S7, default unlocking cipher and the operation time are combined to obtain data splitting, by default Algorithm carries out computing to the data splitting and obtains verification password.The default algorithm of this step is identical with step S3, that is, uses MD5。
Accordingly, step S3 uses prioritization scheme, then this step (step S7) is also substituted for following steps:Opened default Lock cipher, the unique identities identifier of the electronic lock and the operation time are combined to obtain data splitting, by default Algorithm to the data splitting carry out computing obtain verification password.
Step S8, judge whether verification password is consistent with passwords of visitors, if so, performing step S9, otherwise, perform step S10。
Step S9, when verification password is consistent with passwords of visitors, then unlock successfully.
If step S10, verification password and passwords of visitors are inconsistent, to the operation time when subtract 1, and return to step S7.When step S10 number of run reaches the first preset times, then failure of unlocking.For example, the first preset times are 2 times.The For one preset times equivalent to the term of validity of passwords of visitors, 2 times are 2 hours equivalent to the term of validity.
15 divide when being August in 2017 29 days 14 for example, sending the time, then the calculating time obtained through handling is 2017 8 During the moon 29 days 14.The passwords of visitors A that then house owner obtains is obtained by combinatorial operation when unlocking cipher and August in 2017 29 days 14.
35 divide when the input time that visitor inputs passwords of visitors A is August in 2017 29 days 14, then through handling obtained calculating When time is August in 2017 29 days 15.The passwords of visitors B that then electronic lock computing obtains is by unlocking cipher and August in 2017 29 days Combinatorial operation obtains when 15.Passwords of visitors A and passwords of visitors B are inconsistent, then to 15 when subtract 1, perform step S7 again, then can be with The passwords of visitors A judged results consistent with passwords of visitors B is obtained, is unlocked successfully.
15 divide when being August in 2017 29 days 14 in another example sending the time, then the calculating time obtained through handling is 2017 During August 29 days 14.The passwords of visitors A that then house owner obtains is obtained by combinatorial operation when unlocking cipher and August in 2017 29 days 14.
35 divide when the input time that visitor inputs passwords of visitors A is August in 2017 29 days 15, then through handling obtained calculating When time is August in 2017 29 days 16.The passwords of visitors B that then electronic lock computing obtains is by unlocking cipher and August in 2017 29 days Combinatorial operation obtains when 16.Passwords of visitors A and passwords of visitors B are inconsistent, then to 1,6 when subtract 1, again perform step S7, then may be used To obtain passwords of visitors A and judged result inconsistent passwords of visitors B, then then held again to subtracting 1 again during 16 after subtracting 1 again Row step S7, then the passwords of visitors A judged results consistent with passwords of visitors B can be obtained, is unlocked successfully.
When the number for failure of unlocking reaches the second preset times, the visitor of visitor's input is rejected in preset time Password.For example, the second preset times are 3 times, preset time is 3 minutes.It thus can further improve the safety of electronic lock Property.
It will be apparent to those skilled in the art that technical scheme that can be as described above and design, make other various Corresponding change and deformation, and all these changes and deformation should all belong to the protection domain of the claims in the present invention Within.

Claims (10)

1. a kind of visitor's method for unlocking, it is applied to electronic lock, it is characterised in that comprises the following steps:
Step 1, the passwords of visitors for receiving visitor's input, and obtain input time when inputting passwords of visitors;
Step 2, according to preset rules the input time is handled to obtain operation time;
Step 3, default unlocking cipher and the operation time is combined to obtain data splitting, passes through default algorithm pair The data splitting carries out computing and obtains verification password;
Step 4, judge whether verification password and passwords of visitors are consistent;
Step 5, when verification password is consistent with passwords of visitors, then unlock successfully.
2. visitor's method for unlocking as claimed in claim 1, it is characterised in that in step 2, the preset rules are:Read institute State input time point, if described point be less than or equal to 30, input time when round backward, if the minute be more than 30, Then input time when round forward;
The form of the operation time is:Year-month-day-when;
In the step 4, if verification password is inconsistent with passwords of visitors, step 6 is performed;
Step 6, to the operation time when subtract 1, and return to step 3.
3. visitor's method for unlocking as claimed in claim 2, it is characterised in that when the number of run of the step 6 reaches first During preset times, then failure of unlocking.
4. visitor's method for unlocking as claimed in claim 3, it is characterised in that it is pre- that the number to fail when unlocking reaches second If during number, the passwords of visitors of visitor's input is rejected in preset time.
5. visitor's method for unlocking as claimed in claim 1, it is characterised in that the step 3 is replaced with following steps:Will be default Unlocking cipher, the electronic lock unique identities identifier and the operation time be combined to obtain data splitting, pass through Default algorithm carries out computing to the data splitting and obtains verification password.
6. a kind of electronic lock, it is characterised in that including memory and processor;
The memory, instructed for storage program;
The processor, for running described program instruction, unlocked with performing the visitor as described in claim 1-5 any one The step of method.
7. a kind of passwords of visitors generation method, it is characterised in that comprise the following steps:
Transmission time when receiving the unlocking cipher for the electronic lock that user terminal is sent and sending the unlocking cipher;
The transmission time is handled to obtain according to preset rules and calculates the time;
The unlocking cipher and the calculating time are combined to obtain data splitting, by default algorithm to the combination Data carry out computing and obtain passwords of visitors;
The passwords of visitors is sent to user terminal or guest.
8. passwords of visitors generation method as claimed in claim 7, it is characterised in that the preset rules are:Read the hair Send the time point, if described point be less than or equal to 30, send the time when round backward, if the minute be more than 30, send out Send the time when round forward;
It is described calculate the time form be:Year-month-day-when.
9. passwords of visitors generation method as claimed in claim 7, it is characterised in that it is described " by the unlocking cipher with it is described The calculating time is combined to obtain data splitting, and it is close to obtain visitor to data splitting progress computing by default algorithm Code " is replaced with following steps:Default unlocking cipher, the unique identities identifier of the electronic lock and the calculating time are entered Row combination obtains data splitting, and carrying out computing to the data splitting by default algorithm obtains passwords of visitors.
10. a kind of server, it is characterised in that including memory and processor;
The memory, instructed for storage program;
The processor, for running described program instruction, to perform the generation method as described in claim 7-9 any one The step of.
CN201710822576.XA 2017-09-13 2017-09-13 Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server Pending CN107564161A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710822576.XA CN107564161A (en) 2017-09-13 2017-09-13 Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710822576.XA CN107564161A (en) 2017-09-13 2017-09-13 Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server

Publications (1)

Publication Number Publication Date
CN107564161A true CN107564161A (en) 2018-01-09

Family

ID=60980642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710822576.XA Pending CN107564161A (en) 2017-09-13 2017-09-13 Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server

Country Status (1)

Country Link
CN (1) CN107564161A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840975A (en) * 2019-01-29 2019-06-04 武汉天喻聚联网络有限公司 Remote authorization unlocking system and method without networking
CN113781686A (en) * 2021-09-10 2021-12-10 青岛海信智慧生活科技股份有限公司 Verification method, generation method and device for temporary password of intelligent door lock

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102682410A (en) * 2012-05-22 2012-09-19 厦门思德电子科技有限公司 Employee empowerment method based on housekeeping service
CN103136830A (en) * 2013-02-18 2013-06-05 江苏省电力公司金湖县供电公司 Communication-free hopping code generation method of access control system
CN104123777A (en) * 2014-08-05 2014-10-29 上海众人科技有限公司 Access control remote authorization method
CN105046775A (en) * 2015-07-14 2015-11-11 黄育斌 Device for unlocking time domain two-dimension code
CN105118127A (en) * 2015-09-17 2015-12-02 慧锐通智能科技股份有限公司 Visiting system and control method thereof
CN106127905A (en) * 2016-07-05 2016-11-16 杭州摇光科技有限公司 A kind of electrical lock apparatus, system and method for unlocking thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102682410A (en) * 2012-05-22 2012-09-19 厦门思德电子科技有限公司 Employee empowerment method based on housekeeping service
CN103136830A (en) * 2013-02-18 2013-06-05 江苏省电力公司金湖县供电公司 Communication-free hopping code generation method of access control system
CN104123777A (en) * 2014-08-05 2014-10-29 上海众人科技有限公司 Access control remote authorization method
CN105046775A (en) * 2015-07-14 2015-11-11 黄育斌 Device for unlocking time domain two-dimension code
CN105118127A (en) * 2015-09-17 2015-12-02 慧锐通智能科技股份有限公司 Visiting system and control method thereof
CN106127905A (en) * 2016-07-05 2016-11-16 杭州摇光科技有限公司 A kind of electrical lock apparatus, system and method for unlocking thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840975A (en) * 2019-01-29 2019-06-04 武汉天喻聚联网络有限公司 Remote authorization unlocking system and method without networking
CN113781686A (en) * 2021-09-10 2021-12-10 青岛海信智慧生活科技股份有限公司 Verification method, generation method and device for temporary password of intelligent door lock
CN113781686B (en) * 2021-09-10 2023-08-18 青岛海信智慧生活科技股份有限公司 Verification method, generation method and device for temporary password of intelligent door lock

Similar Documents

Publication Publication Date Title
CN105337928B (en) Method for identifying ID, safety protection problem generation method and device
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
CN105323253B (en) Identity verification method and device
CN109460966A (en) Contract signing method, apparatus and terminal device based on requesting party's classification
CN110458559B (en) Transaction data processing method, device, server and storage medium
CN107426169A (en) A kind of method for processing business and device based on authority
US9332433B1 (en) Distributing access and identification tokens in a mobile environment
CN107612880A (en) One kind applies access method and device
CN107545637A (en) The Activiation method and server of a kind of electronic lock
CN103036680A (en) Realm name certification system and method based on biological feature recognition
CN106161710B (en) A kind of user account safety management system based on smart phone
CN105022939A (en) Information verification method and device
CN103188241A (en) User account management method based on mobile intelligent terminal number
CN107517217A (en) A Multi-factor Wireless Key Filling System Based on Fingerprint Identification
CN111784472A (en) Risk control method, device, system and readable storage medium based on consumption data
CN107564161A (en) Visitor's method for unlocking and electronic lock, passwords of visitors generation method and server
CN103428698B (en) Mobile interchange participant's identity strong authentication method
CN105930501B (en) Network account correlating method and device
CN106302479B (en) A kind of single-point logging method and system for multi-service internet site
CN113434481A (en) Method, device, equipment and storage medium for realizing data service
CN105590044A (en) Information authentication method and apparatus
CN116975821B (en) Information processing method, device, electronic device, storage medium and program product
CN106375304A (en) A one-time authentication method realized by intelligent hardware
CN105897726A (en) Associated account data sharing method and device
CN111078649A (en) Block chain-based on-cloud file storage method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180109