CN108537927B - Lockset terminal and method for controlling lockset terminal through regional management - Google Patents
Lockset terminal and method for controlling lockset terminal through regional management Download PDFInfo
- Publication number
- CN108537927B CN108537927B CN201810309600.4A CN201810309600A CN108537927B CN 108537927 B CN108537927 B CN 108537927B CN 201810309600 A CN201810309600 A CN 201810309600A CN 108537927 B CN108537927 B CN 108537927B
- Authority
- CN
- China
- Prior art keywords
- terminal
- lock terminal
- module
- lock
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 230000006855 networking Effects 0.000 claims abstract description 86
- 238000013475 authorization Methods 0.000 claims abstract description 57
- 238000004891 communication Methods 0.000 claims description 55
- 230000003993 interaction Effects 0.000 claims description 43
- 206010048669 Terminal state Diseases 0.000 claims description 13
- 238000000926 separation method Methods 0.000 claims 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims 1
- 230000009286 beneficial effect Effects 0.000 abstract description 3
- 230000005540 biological transmission Effects 0.000 description 4
- 230000002349 favourable effect Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000009182 swimming Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a lockset terminal and a method for controlling the lockset terminal by regional management; the lockset terminal comprises a control module, and a networking module, an authorization starting module, an authorization finishing module, a data uploading module and a reading module which are respectively connected with the control module; the networking module is used for automatically networking when the lockset terminal is powered on; the authorization starting module is used for unlocking the lock terminal locally or remotely; the authorization ending module is used for locking the lock terminal locally or remotely; the data uploading module is used for uploading user operation data of the lock terminal to the server; the reading module is used for reading the physical identification of the door card and controlling the lockset terminal. Therefore, whether the lock terminal can be remotely controlled by the server or not can be automatically set, the server can know the opening condition of the lock terminal, and the lock terminal is particularly suitable for being applied to areas such as campuses, hotels, apartments, office buildings and/or hospitals and the like needing to monitor the door opening condition, and is also beneficial for guardians to know the door opening time of the person under guardianship and make guidance so as to avoid accidents.
Description
Technical Field
The invention relates to a lock terminal and management control thereof, in particular to a lock terminal and a method for controlling the lock terminal through regional management.
Background
Along with the development of technology, the research and the application of intelligence lock have obtained very big progress, and technologies such as fingerprint is unblanked, sound is unblanked and long-range unblank have added the wing of wisdom for the tool to lock. The intelligent lock has the advantages of convenient application and easy unified management, and is particularly suitable for regional management control application.
However, how to design an intelligent lock as a lock terminal for regional management control and how to more effectively manage and control a plurality of lock terminals still remains a technical problem to be solved currently.
Disclosure of Invention
The invention provides a lockset terminal and a method for controlling the lockset terminal through regional management.
The technical scheme of the invention is as follows:
a lockset terminal comprises a control module, and a networking module, an authorization starting module, an authorization finishing module, a data uploading module and a reading module which are respectively connected with the control module;
the networking module is used for automatically networking when the lockset terminal is powered on;
the authorization starting module is used for unlocking the lockset terminal locally or remotely and enabling the lockset terminal to be controlled remotely through the control module;
the authorization finishing module is used for locking the lockset terminal locally or remotely and controlling the lockset terminal remotely through the incapability of the control module;
the data uploading module is used for uploading user operation data of the lock terminal to the server;
the reading module is connected with the data uploading module, and is used for reading the physical identification of the door card, controlling the lock terminal through the control module, and uploading the user operation data of the lock terminal to the server through the data uploading module.
Preferably, the lock terminal further comprises an identification storage module, a registration module and a state query module which are respectively connected with the control module;
the identification storage module is used for storing the lock terminal identification;
the registration module is connected with the identification storage module and is used for registering to a server and acquiring a communication key for a lock terminal by adopting a lock terminal identification;
the state query module is used for providing a lock terminal state and lock terminal parameters when queried;
and the number of the first and second electrodes,
the data uploading module is used for encrypting the user operation data of the lockset terminal by adopting the communication secret key and then uploading the encrypted user operation data to the server;
the networking module is also connected with the registration module, and the networking module is used for automatically networking when the lock terminal is powered on and registering to a server through the registration module;
the reading module is used for reading the physical identification of the door card, and the data uploading module is used for encrypting the user operation data of the lockset terminal by adopting the communication secret key and then uploading the encrypted data to the server.
Preferably, the lock terminal further comprises a display module connected with the control module, and the display module is used for displaying equipment information and a network signal state when the lock terminal is locked and displaying current user operation data when the lock terminal is unlocked.
Preferably, the lock terminal further comprises a parameter configuration module connected with the control module, and the parameter configuration module is used for configuring lock terminal parameters.
Preferably, the networking module is further connected with the parameter configuration module, and the networking module is further configured to send the lock terminal parameters during networking and adjust the lock terminal parameters through the parameter configuration module according to a control instruction of the server.
A method for controlling a lock terminal by regional management comprises the following steps:
networking: automatically networking when the lockset terminal is powered on;
an authorization starting step: unlocking the lockset terminal locally or remotely to enable the lockset terminal to be controlled remotely;
and an authorization finishing step: locking the lockset terminal locally or remotely, and disabling the remote control lockset terminal;
a data uploading step: uploading user operation data of the lock terminal to a server;
a reading step: and reading the physical identification of the door card and controlling the lockset terminal.
Preferably, the method for controlling a lock terminal by regional management further includes the steps of:
an identification obtaining step: acquiring a lock terminal identification;
a registration step: registering with a server, and acquiring a communication secret key for a lock terminal by adopting a lock terminal identifier;
and (3) state query step: providing a lock terminal state and lock terminal parameters when queried;
and the number of the first and second electrodes,
in the data uploading step, user operation data of the lockset terminal are encrypted by the communication secret key and then uploaded to a server;
in the networking step, the network is automatically connected when the lockset terminal is powered on, and the lockset terminal is registered to the server through the registering step;
in the reading step, the physical identification of the door card is read, and the user operation data of the lockset terminal is encrypted by adopting the communication secret key through the data uploading step and then uploaded to the server.
Preferably, the method for controlling the lock terminal by regional management further includes the display step: and displaying equipment information and a network signal state when the lock terminal is locked, and displaying current user operation data when the lock terminal is unlocked.
Preferably, the method for controlling the lock terminal by regional management further includes the parameter configuration step: and configuring lock terminal parameters.
Preferably, the method for managing and controlling the lock terminal in the area is applied to the following areas: a campus, hotel, apartment, office building, and/or hospital.
By adopting the scheme, the invention designs the lock terminal and the method for managing and controlling the lock terminal by the area, the intelligent property of the lock terminal is improved, whether the lock terminal can be remotely controlled by the server can be automatically set by matching with the authorization starting and the authorization ending, and the user operation data can be uploaded to the server when the door card is read to open the door, so that the server can know the opening condition of the lock terminal, and the method is particularly suitable for being applied to areas such as campuses, hotels, apartments, office buildings and/or hospitals and the like needing to monitor the door opening condition, is also beneficial for a guardian to know the door opening time of a guardian, and makes a favorable guide to avoid the accident problem.
Drawings
FIG. 1 is a block diagram of a lock terminal according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a method for controlling a lock terminal by regional management according to an embodiment of the present invention.
Detailed Description
In order to facilitate an understanding of the invention, the invention is described in more detail below with reference to the accompanying drawings and specific examples. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
One embodiment of the invention is a lockset terminal, which comprises a control module, and a networking module, an authorization starting module, an authorization ending module, a data uploading module and a reading module which are respectively connected with the control module; the networking module is used for automatically networking when the lockset terminal is powered on; the authorization starting module is used for unlocking the lockset terminal locally or remotely and enabling the lockset terminal to be controlled remotely through the control module; the authorization finishing module is used for locking the lockset terminal locally or remotely and controlling the lockset terminal remotely through the incapability of the control module; the data uploading module is used for uploading user operation data of the lock terminal to the server; the reading module is connected with the data uploading module, and is used for reading the physical identification of the door card, controlling the lock terminal through the control module, and uploading the user operation data of the lock terminal to the server through the data uploading module. Like this, through having designed a tool to lock terminal, the intelligent nature at tool to lock terminal has been promoted, the cooperation is authorized to start and is authorized the end, can realize whether the tool to lock terminal is set for by oneself can be by server remote control, it is still realized reading when the door card opens the door, user operation data can be uploaded to the server, the condition of opening at tool to lock terminal can be known to the server from this, be particularly suitable for being applied to the region that needs the control condition of opening the door such as campus, hotel, apartment, office building and/or hospital, also be favorable to the guardian to know the time of opening the door of person under guardianship, make favorable guide in order to avoid taking place unexpected problem.
For example, one application scenario is that the area is a campus, the server comprises a life guide computer and a parent mobile phone, when the students read the door card at 11 o' clock and open the dormitory door to return to the dormitory, the life guide computer and the parent mobile phone receive user operation data, the conditions of the students can be known effectively in time, and based on the situation, the students can be guided favorably, so that the safety accident problem or bad habit formation problem is avoided.
For example, the lockset terminal comprises a control module, and a networking module, an authorization starting module, an authorization ending module, a data uploading module and a reading module which are respectively connected with the control module. At this moment, including control module, and respectively with networking module, the start module of authorizing, the end module of authorizing, data upload module and the tool to lock of reading the module that control module connects have certain terminal function, can realize networking module, authorize start, authorize end, data upload and read the function such as, can regard as intelligent lock terminal, promptly the tool to lock terminal. Preferably, the lock terminal is implemented by using the method for controlling the lock terminal through regional management according to any embodiment of the present disclosure.
For example, the networking module is used for automatically networking when the lock terminal is powered on; for example, when the lock terminal is started, the networking module automatically networks; for example, when the lock terminal is powered on, the networking module automatically networks through the gateway, for example, when the lock terminal is powered on, the networking module is automatically connected with the router through the gateway and networks through the router; preferably, when the lock terminal is started, the networking module judges whether networking configuration is finished, if so, networking is automatically performed, otherwise, a networking configuration prompt is sent; for example, otherwise, an indicator lamp of the lock terminal is controlled to flash to serve as a networking configuration prompt.
For example, the authorization starting module is used for unlocking the lock terminal locally or remotely, and enables the lock terminal to be controlled remotely through the control module; like this, the tool to lock terminal gives the authority of server local or remote unblock to the server can remote control tool to lock terminal, for example, control tool to lock terminal and open or close, if, control tool to lock terminal broadcast music again, upload data etc..
For example, the authorization ending module is used for locking the lock terminal locally or remotely, and the lock terminal is remotely controlled by disabling the control module; therefore, the lock terminal gives the server the local or remote locking authority, namely, the authority of the server for locally or remotely controlling the lock terminal is cancelled, so that the server can not remotely control the lock terminal any more.
For example, the data uploading module is used for uploading user operation data of the lock terminal to the server; for example, the number of the servers is one or more, preferably, the servers include a mobile terminal of a short-distance manager and a mobile terminal of a long-distance related person, for example, the mobile terminal includes a wearable device, a mobile phone, a tablet computer, a notebook computer or a desktop computer, so that the short-distance manager can timely go to the field for processing when receiving abnormal data, and the long-distance related person can receive the abnormal data and give an indication even if the long-distance related person is in a foreign country or even in a foreign space.
For example, the reading module is connected with the data uploading module, and the reading module is used for reading the physical identifier of the door card, controlling the lock terminal through the control module, and uploading user operation data of the lock terminal to the server through the data uploading module. Preferably, the reading module is used for reading a door card physical identifier, controlling the lock terminal through the control module, and uploading user operation data of the lock terminal to the server in real time or at regular time or when receiving a data uploading control instruction through the data uploading module. Therefore, when a user opens the door by adopting an identification card or wearable equipment or a mobile phone, the reading module reads the physical identifications of the door cards and controls the lock terminal to authenticate through the control module, the door is opened after the authentication is passed, and the user operation data of the lock terminal is uploaded to the server through the data uploading module in real time or at regular time or under control after the door is opened.
Preferably, the lock terminal further comprises an identification storage module, a registration module and a state query module which are respectively connected with the control module; the identification storage module is used for storing the lock terminal identification; the registration module is connected with the identification storage module and is used for registering to a server and acquiring a communication key for a lock terminal by adopting a lock terminal identification; the state query module is used for providing a lock terminal state and lock terminal parameters when queried; the data uploading module is used for encrypting the user operation data of the lockset terminal by adopting the communication secret key and then uploading the encrypted user operation data to the server; the networking module is also connected with the registration module, and the networking module is used for automatically networking when the lock terminal is powered on and registering to a server through the registration module; the reading module is used for reading the physical identification of the door card, and the data uploading module is used for encrypting the user operation data of the lockset terminal by adopting the communication secret key and then uploading the encrypted data to the server. Preferably, the state query module is configured to provide the lock terminal state and the lock terminal parameter encrypted by using the communication key when queried; for example, a lock terminal includes a control module, and a networking module, an authorization starting module, an authorization ending module, a data uploading module, a reading module, an identifier storage module, a registration module, and a status query module, which are respectively connected to the control module; the identification storage module is used for storing the lock terminal identification; the registration module is connected with the identification storage module and is used for registering to a server and acquiring a communication key for a lock terminal by adopting a lock terminal identification; the networking module is used for automatically networking when the lockset terminal is powered on and registering to the server through the registration module; the authorization starting module is used for unlocking the lockset terminal locally or remotely and enabling the lockset terminal to be controlled remotely through the control module; the authorization finishing module is used for locking the lockset terminal locally or remotely and controlling the lockset terminal remotely through the incapability of the control module; the state query module is used for providing a lock terminal state and lock terminal parameters when queried; the data uploading module is used for encrypting the user operation data of the lockset terminal by adopting the communication secret key and then uploading the encrypted user operation data to the server; the reading module is connected with the data uploading module, the reading module is used for reading the physical identification of the door card and controlling the lock terminal through the control module, the data uploading module is used for encrypting the user operation data of the lock terminal by adopting the communication secret key and then uploading the encrypted data to the server, and the rest embodiments are analogized in the same way.
Preferably, the lock terminal further comprises a display module connected with the control module, and the display module is used for displaying equipment information and a network signal state when the lock terminal is locked and displaying current user operation data when the lock terminal is unlocked. Preferably, the display module is the display screen, promptly the tool to lock terminal is for having the intelligent lock of display screen. For example, a lock terminal comprises a control module, and a networking module, an authorization starting module, an authorization ending module, a data uploading module, a reading module, an identification storage module, a registration module, a display module and a state query module which are respectively connected with the control module; the identification storage module is used for storing the lock terminal identification; the registration module is connected with the identification storage module and is used for registering to a server and acquiring a communication key for a lock terminal by adopting a lock terminal identification; the networking module is used for automatically networking when the lockset terminal is powered on and registering to the server through the registration module; the authorization starting module is used for unlocking the lockset terminal locally or remotely and enabling the lockset terminal to be controlled remotely through the control module; the authorization finishing module is used for locking the lockset terminal locally or remotely and controlling the lockset terminal remotely through the incapability of the control module; the state query module is used for providing the lock terminal state and the lock terminal parameters encrypted by the communication secret key when queried; the data uploading module is used for encrypting the user operation data of the lockset terminal by adopting the communication secret key and then uploading the encrypted user operation data to the server; the reading module is connected with the data uploading module, and is used for reading a door card physical identifier, controlling the lockset terminal through the control module, encrypting user operation data of the lockset terminal by adopting the communication secret key through the data uploading module and uploading the encrypted user operation data to the server; the display module is used for displaying equipment information and a network signal state when the lock terminal is locked and displaying current user operation data when the lock terminal is unlocked; the rest of the examples are analogized.
Preferably, the lock terminal further comprises a parameter configuration module connected with the control module, and the parameter configuration module is used for configuring lock terminal parameters. For example, as shown in fig. 1, a lock terminal includes a control module, and a networking module, an authorization starting module, an authorization ending module, a data uploading module, a reading module, an identifier storing module, a registration module, a parameter configuration module, a display module, and a status query module, which are respectively connected to the control module; the identification storage module is used for storing the lock terminal identification; the registration module is connected with the identification storage module and is used for registering to a server and acquiring a communication key for a lock terminal by adopting a lock terminal identification; the networking module is used for automatically networking when the lockset terminal is powered on and registering to the server through the registration module; the authorization starting module is used for unlocking the lockset terminal locally or remotely and enabling the lockset terminal to be controlled remotely through the control module; the authorization finishing module is used for locking the lockset terminal locally or remotely and controlling the lockset terminal remotely through the incapability of the control module; the state query module is used for providing the lock terminal state and the lock terminal parameters encrypted by the communication secret key when queried; the data uploading module is used for encrypting the user operation data of the lockset terminal by adopting the communication secret key and then uploading the encrypted user operation data to the server; the reading module is connected with the data uploading module, and is used for reading a door card physical identifier, controlling the lockset terminal through the control module, encrypting user operation data of the lockset terminal by adopting the communication secret key through the data uploading module and uploading the encrypted user operation data to the server; the display module is used for displaying equipment information and a network signal state when the lock terminal is locked and displaying current user operation data when the lock terminal is unlocked; the parameter configuration module is used for configuring lock terminal parameters; the rest of the examples are analogized. Preferably, the networking module is further connected with the parameter configuration module, and the networking module is further configured to send the lock terminal parameters during networking and adjust the lock terminal parameters through the parameter configuration module according to a control instruction of the server. In this way, the lock terminal parameters can also be adjusted.
For example, as shown in fig. 2, a method for controlling a lock terminal by regional management includes the steps of: networking: automatically networking when the lockset terminal is powered on; an authorization starting step: unlocking the lockset terminal locally or remotely to enable the lockset terminal to be controlled remotely; and an authorization finishing step: locking the lockset terminal locally or remotely, and disabling the remote control lockset terminal; a data uploading step: uploading user operation data of the lock terminal to a server; a reading step: and reading the physical identification of the door card and controlling the lockset terminal. Preferably, the method for controlling the lock terminal by regional management is implemented by adopting the lock terminal in any embodiment. Preferably, the method for managing and controlling the lock terminal in the area is applied to the following areas: a campus, a hotel, an apartment, an office building, and/or a hospital, i.e., the area includes a campus, a hotel, an apartment, an office building, and/or a hospital.
For example, a zone management control lock terminal method includes the following steps.
For example, the networking step: automatically networking when the lockset terminal is powered on; for example, when the lock terminal is powered on, a local area network is connected, for example, the local area network is a hospital network, an apartment network, a hotel network, or a campus network. For another example, the network is automatically networked through the gateway when the lock terminal is powered on, for example, the network is automatically connected to the router through the gateway when the lock terminal is powered on, and the network is networked through the router. Preferably, the step of networking includes the step of automatically networking when the lock terminal is powered on, including the steps of: powering on the lockset terminal; automatically reading the network type; further automatically judging whether a Dynamic Host Configuration Protocol (DHCP) is started or not, if so, further automatically judging whether the connection server is successful or not, otherwise, reading the networking information of the lockset terminal, and further automatically judging whether the connection server is successful or not; when the connection with the server is unsuccessful, continuing to automatically read the network type; when the server is successfully connected, the lockset terminal feeds back networking success information; for example, the control networking success indicator lights are often on or flashing or blinking for a period of time. As another example, the lock terminal networking information includes a lock terminal IP address, a subnet mask, and a default gateway. In this way, networked control can be achieved, connecting the lock terminal to a server, for example, comprising a router and/or a management terminal, etc. Preferably, the step of networking further comprises: the server is connected with the lock terminal, for example, the networking step comprises: when the lock terminal is powered on, the network is automatically connected, and the server is connected with the lock terminal.
For example, the authorization initiation step: unlocking the lockset terminal locally or remotely to enable the lockset terminal to be controlled remotely; like this, the tool to lock terminal gives the authority of server local or remote unblock to the server can remote control tool to lock terminal, for example, control tool to lock terminal and open or close, if, control tool to lock terminal broadcast music again, upload data etc.. Preferably, before the step of authorizing the starting, the method for controlling the lock terminal by regional management further comprises the steps of: judging whether the server has a control authority, if so, executing an authorization starting step; preferably, the authorization initiation step further comprises: and opening the operation authority to the server with the control authority. Preferably, the lockset terminal authenticates the server to judge whether the server has the control authority; for example, the lock terminal receives a user name and a password sent by the server for authentication, and determines that the server has the control authority when the authentication is passed, and determines that the server does not have the control authority when the authentication is not passed. For another example, the opening of the operation right for the server with the control right includes opening of the setting, modifying and/or deleting right of the door opening password for the server with the control right, at this time, the operation right includes the setting right of the door opening password, the modifying right of the door opening password and/or the deleting right of the door opening password, and the rest of embodiments are similar to the above. It can be understood that, with the intellectualization of the lock terminal, the operation authority will be richer and richer, such as playing video, transmitting sound, logging in non-immortal, receiving and sending WeChat, and the like. For example, the server includes a mobile terminal such as a mobile phone, and the lock terminal authenticates the server to determine whether the server has a control authority by scanning a connection mode of the lock terminal and inputting an initial user name and an initial password obtained when the lock terminal is purchased, for example, the operation authority further includes a modification authority of the user name and the password.
For example, the authorization end step: locking the lockset terminal locally or remotely, and disabling the remote control lockset terminal; therefore, the lock terminal gives the server the local or remote locking authority, namely, the authority of the server for locally or remotely controlling the lock terminal is cancelled, so that the server can not remotely control the lock terminal any more.
For example, the data uploading step: uploading user operation data of the lock terminal to a server; for example, the number of the servers is one or more, and preferably, the servers include a mobile terminal of a close manager and a mobile terminal of a distant manager, for example, the mobile terminals include a wearable device, a mobile phone, a tablet computer, a notebook computer, or a desktop computer. For example, uploading user operation data of the lock terminal to the server includes: and the lock terminal uploads the lock data to the server with the control authority. Preferably, the lock data includes door opening data of the lock terminal. Preferably, the lock terminal uploads the lock data to the server with the control authority at regular time, for example, the lock terminal uploads the lock data to the server with the control authority every 12 or 24 hours. Preferably, the lock terminal uploads lock data to a server with control authority in real time. For example, the lock terminal uploads lock data to a server with control authority in real time each time the door is opened. Preferably, when a preset uploading condition is reached, the lock terminal uploads lock data to the server with the control authority. For example, the uploading condition is that or the uploading condition includes that an owner of the lock terminal logs in the lock terminal or opens the lock terminal through fingerprint identification, so that the lock data uploading of the lock terminal can be controlled strictly. Preferably, the lock terminal acquires image data as the lock data or as part of the lock data when the door is opened at each time. For example, the lock terminal respectively acquires image data as the lock data or as part of the lock data at a first preset time before door opening, at door opening and at a second preset time after door opening. Therefore, the lockset data uploaded by the lockset terminal comprises image data when the door is opened, or three image data before and after the door is opened, so that strong evidence can be provided when an accident occurs; preferably, the device can also prevent the crime and play a role in warning and deterring the crime, and sprout in an ungerminated state to reduce the crime rate. For example, the first predetermined time is 1 to 5 seconds, the second predetermined time is 1 to 5 seconds, for example, the first predetermined time is 1, 1.5, 2, 2.5, 3, 3.5, 4, 4.5 or 5 seconds, and/or the second predetermined time is 1, 1.5, 2, 2.5, 3, 3.5, 4, 4.5 or 5 seconds; preferably, the first preset time is shorter than the second preset time, and if the two preset times are the same, the effect is not good in the actual test, and the entry process cannot be accurately reflected; the second preset time is better to be slightly longer than the first preset time, for example, the second preset time is 0.5-1 second longer than the first preset time; for example, the first preset time is 1.5 seconds, and the second preset time is 2 or 2.5 seconds; the rest of the examples are analogized. Therefore, the entrance of a plurality of people into the gate can be better reflected, the group entrance monitoring is particularly favorably realized, and the method has the advantages of simplicity and convenience in realization.
Preferably, the lock terminal uploads the lock data to the server with the control authority, and the method comprises the following steps: and when the lock terminal receives the data uploading instruction, the lock terminal uploads the lock data to the server with the control authority. Preferably, the lock terminal uploads the lock data to the server with the control authority, and the method comprises the following steps: when the lock terminal receives the door opening signal, lock data are uploaded to a server with control authority. Preferably, the lock terminal uploads the lock data to the server with the control authority, and the method comprises the following steps: when receiving a door opening signal and triggering a data uploading instruction, the lockset terminal sends lockset data to a server with control authority and receives a maximum record number; and judging whether the current maximum record number is larger than the local maximum record number, if so, stopping uploading the lockset data to the server with the control authority, otherwise, continuously sending the lockset data to the server with the control authority and receiving the maximum record number. Preferably, the lock terminal uploads the lock data to the server with the control authority, and the method comprises the following steps: when a door opening signal appears, a door opening signal is received or a data uploading instruction is received, the lockset terminal sends lockset data to a server with control authority and receives a maximum record number; and judging whether the current maximum record number is larger than the local maximum record number, if so, stopping uploading the lockset data to the server with the control authority, otherwise, continuously sending the lockset data to the server with the control authority and receiving the maximum record number. Thus, after the control times of the lock data are finished or the maximum record number is reached, the data uploading is finished.
For example, the reading step: and reading the physical identification of the door card and controlling the lockset terminal. For example, the physical identification of the door card is read, the lock terminal is controlled through the control module, and user operation data of the lock terminal is uploaded to the server in real time or at regular time or when a data uploading control instruction is received.
Preferably, the method for controlling a lock terminal by regional management further includes the steps of: an identification obtaining step: acquiring a lock terminal identification; a registration step: registering with a server, and acquiring a communication secret key for a lock terminal by adopting a lock terminal identifier; and (3) state query step: providing a lock terminal state and lock terminal parameters when queried; in the data uploading step, user operation data of the lock terminal are encrypted by the communication secret key and then uploaded to the server; in the networking step, the network is automatically connected when the lockset terminal is powered on, and the lockset terminal is registered to the server through the registering step; in the reading step, the physical identification of the door card is read, and the user operation data of the lockset terminal is encrypted by adopting the communication secret key through the data uploading step and then uploaded to the server. Preferably, the step of obtaining the identification is performed before the step of networking, and for example, the step of registering is performed after the step of networking; for example, a method for controlling a lock terminal by regional management includes the following steps: acquiring a lock terminal identification; networking: automatically networking when the lockset terminal is powered on, and registering to a server through the registering step; a registration step: registering with a server, and acquiring a communication secret key for a lock terminal by adopting a lock terminal identifier; and (3) state query step: providing a lock terminal state and lock terminal parameters when queried; an authorization starting step: unlocking the lockset terminal locally or remotely to enable the lockset terminal to be controlled remotely; and an authorization finishing step: locking the lockset terminal locally or remotely, and disabling the remote control lockset terminal; a data uploading step: encrypting user operation data of the lockset terminal by adopting the communication secret key and uploading the encrypted user operation data to a server; a reading step: and reading the physical identification of the door card, encrypting the user operation data of the lockset terminal by adopting the communication secret key through the data uploading step, and uploading the encrypted data to a server. The rest of the examples are analogized.
Preferably, the registering step further comprises: binding a lock terminal to the server; for example, a unique serial number of the lock terminal is obtained, and the lock terminal is bound in a database of the server. Preferably, the binding the lock terminal to the server includes: reporting the identification number to a server with control authority; and inquiring whether the lock terminal is bound or not from the server, if so, encrypting and decrypting the communication content by using the new secret key, and otherwise, encrypting and decrypting the communication content by using the new secret key after modifying the lock terminal secret key. For example, the binding the lock terminal to the server includes: and reporting the unique identification number of the lock terminal to a server with control authority, and inquiring whether the lock terminal is bound or not from the server, if so, encrypting and decrypting the communication content by using a new secret key, otherwise, modifying the lock terminal secret key and then encrypting and decrypting the communication content by using the new secret key. In this way, the lock terminal can be bound to a server with control authority; the server can manage a plurality of lock terminals bound by the server simultaneously or sequentially. Preferably, the Encryption and decryption are implemented using Advanced Encryption Standard (AES). AES is a block encryption standard adopted by the federal government in the united states, has been analyzed by many parties and is widely used throughout the world. The encryption algorithm has high calculation speed, is suitable for running in a single chip microcomputer environment, simultaneously supports multiple server languages, and has good compatibility and strong expandability. The most important advantage of the encryption algorithm is safety, and the cracking probability is almost 0. For example, the advanced encryption standard is AES-128. For the lockset terminal, the AES-128 can give consideration to the efficiency and the safety of data communication. For example, the server and the lock terminal interact with a registration instruction, the server obtains the unique serial number of the lock terminal, the server binds in a database of the server, the lock terminal and the server mutually authenticate through the interaction registration instruction, and only the server authenticated by the lock terminal has the right to operate the lock terminal; and only if the lock terminal passes the authentication of the server, the server adds the lock terminal into the database and performs subsequent lock terminal management steps and lock terminal control steps on the lock terminal, so that the lock terminal is controlled. In this way, in the method for controlling the lock terminal by regional management, the server can manage a plurality of lock terminals, for example, one server in a hotel lobby manages all lock terminals in a hotel. For example, in the method for controlling the lock terminals through regional management, N lock terminals are managed through M servers, where M and N are both positive integers, and the magnitude of N is greater than that of M. For example, one server at each floor of the hotel manages all lock terminals at that floor of the hotel.
Preferably, the method for controlling the lock terminal by regional management further includes the display step: and displaying equipment information and a network signal state when the lock terminal is locked, and displaying current user operation data when the lock terminal is unlocked. For example, a method for controlling a lock terminal by regional management includes the following steps: acquiring a lock terminal identification; networking: automatically networking when the lockset terminal is powered on, and registering to a server through the registering step; a registration step: registering with a server, and acquiring a communication secret key for a lock terminal by adopting a lock terminal identifier; and (3) state query step: providing a lock terminal state and lock terminal parameters when queried; an authorization starting step: unlocking the lockset terminal locally or remotely to enable the lockset terminal to be controlled remotely; and an authorization finishing step: locking the lockset terminal locally or remotely, and disabling the remote control lockset terminal; a data uploading step: encrypting user operation data of the lockset terminal by adopting the communication secret key and uploading the encrypted user operation data to a server; a reading step: reading a door card physical identifier, encrypting user operation data of the lockset terminal by adopting the communication secret key through the data uploading step, and uploading the encrypted user operation data to a server; a display step: and displaying equipment information and a network signal state when the lock terminal is locked, and displaying current user operation data when the lock terminal is unlocked. The rest of the examples are analogized.
Preferably, the method for controlling the lock terminal by regional management further includes the parameter configuration step: and configuring lock terminal parameters. Preferably, the parameter configuration step is performed before or after the networking step. For example, a method for controlling a lock terminal by regional management includes the following steps: acquiring a lock terminal identification; parameter configuration step: configuring lockset terminal parameters; networking: automatically networking when the lockset terminal is powered on, and registering to a server through the registering step; a registration step: registering with a server, and acquiring a communication secret key for a lock terminal by adopting a lock terminal identifier; and (3) state query step: providing a lock terminal state and lock terminal parameters when queried; an authorization starting step: unlocking the lockset terminal locally or remotely to enable the lockset terminal to be controlled remotely; and an authorization finishing step: locking the lockset terminal locally or remotely, and disabling the remote control lockset terminal; a data uploading step: encrypting user operation data of the lockset terminal by adopting the communication secret key and uploading the encrypted user operation data to a server; a reading step: reading a door card physical identifier, encrypting user operation data of the lockset terminal by adopting the communication secret key through the data uploading step, and uploading the encrypted user operation data to a server; a display step: and displaying equipment information and a network signal state when the lock terminal is locked, and displaying current user operation data when the lock terminal is unlocked. The rest of the examples are analogized.
It can be understood that the steps of obtaining the identifier, configuring the parameters, networking, registering, querying the status, starting the authorization, ending the authorization, uploading the data, reading the data, displaying the data, etc. in the method for controlling the lock terminal by regional management may be performed in sequence, or may be performed only one, two or more of the steps, or may be performed selectively according to actual requirements.
Preferably, the method for controlling a lock terminal by regional management further includes: and (3) authority authentication interaction step: acquiring a lock terminal control authority; and (3) permission interaction step: opening part of lock terminal operation authority; and the permission forbidding interaction step: forbidding part of lock terminal operation authorities; database operation interaction: the database operation interaction and the updating of the database information of the locker terminal; network configuration interaction: setting network parameters; a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction; time configuration interaction step: configuring and acquiring lockset terminal time; data uploading and interacting steps: and acquiring a data record of the lock terminal. Preferably, in the authority authentication interaction step, the server interacts an authority authentication instruction with the lock terminal, the server acquires the control authority of the lock terminal, the lock terminal opens the control authority to the server which is authenticated by the lock terminal and completes the lock terminal registration step, and the server which succeeds in authority authentication performs related operations of the lock terminal management step and the lock terminal control step on the lock terminal. Preferably, in the permission interaction step, the server interacts a permission instruction with the lock terminal, the lock terminal opens part of lock terminal operation permissions, the server which is authenticated by the lock terminal obtains part of lock terminal operation permissions, and the server performs subsequent lock terminal management steps and lock terminal control steps on the lock terminal by adopting the part of lock terminal operation permissions, so that the control of the lock terminal is realized, and thus, a user can directly control the functions of the lock terminal through the server. Preferably, in the permission prohibition interaction step, the server interacts a permission prohibition instruction with the lock terminal, the lock terminal cancels part of lock terminal operation permission, the server authenticated by the lock terminal cancels part of lock terminal operation permission, the server cannot adopt the part of lock terminal operation permission to perform subsequent lock terminal management step and lock terminal control step on the lock terminal, so that the lock terminal realizes disengagement control on the server authenticated by the lock terminal, and/or the server cancels part of lock terminal operation permission of the lock terminal authenticated by the server, and the server does not adopt the part of lock terminal operation permission to perform subsequent lock terminal management step and lock terminal control step on the lock terminal, so that the server realizes abandonment control on the lock terminal; in this way, the user can directly control the functions of the terminal part of the lock through the server. For example, the database operation interaction step includes operations of adding a password to the lock terminal, deleting the password and the like. Preferably, in the step of interacting database operation, the server interacts a database operation instruction with the lock terminal, and the server authenticated by the lock terminal brings the lock terminal into the database for management, including name management, password management, and/or authority management of the lock terminal. Wherein the name management comprises: adding, modifying and/or deleting names; the password management includes: adding, modifying and/or deleting passwords; the rights management includes: add rights, modify rights, and/or delete rights. For example, the database operation interaction step is subordinate to the lock terminal management step; namely, the lock terminal management step comprises the database operation interaction step. The rest of the examples are analogized. Therefore, the user can update the lock terminal database information of the server, and the lock terminal database information comprises operations of adding a name, modifying the name, adding a password, deleting the password and the like. For example, the method for controlling the lock terminal by regional management further comprises the following network configuration interaction steps: setting network parameters; for example, setting SSID, PASSWORD, IP address, TCP port, DHCP server, etc. for WIFI; preferably, one or more lock terminals are provided with the SSID of WIFI, PASSWORD, the IP address, the TCP port and/or the DHCP server and the like. For example, the network configuration interaction step is performed after the lock terminal registration step and before the lock terminal management step. As another example, the lock terminal management step includes the network configuration interaction step, for example, the lock terminal management step includes: and registering a lock terminal in the server, and setting network parameters for the lock terminal. For example, in the server connection lock terminal, the server and the lock terminal establish connection in a bluetooth communication mode or a local area network communication mode; in the network configuration interaction step, the server sets network parameters for the lockset terminal; the rest of the examples are analogized. As another example, the method for controlling a lock terminal by regional management further includes: the lock terminal is connected with an external network through a server. For example, the method for controlling the lock terminal by regional management further comprises the following steps of: and configuring and acquiring the lockset terminal time, wherein the server can set the lockset terminal time and can acquire the lockset terminal time. Preferably, in the time configuration interaction step, the server interacts with the lock terminal to configure a time configuration instruction, the lock terminal opens a time configuration right, the server authenticated by the lock terminal adopts the time configuration right to set the lock terminal time, and the lock terminal time is acquired, so that the time configuration and acquisition of the lock terminal are realized. Therefore, the user can directly control the time of the lockset terminal through the server, and unified management of a large number of locksets is facilitated.
Preferably, the method for controlling the lock terminal by regional management further comprises the following data uploading interaction step: acquiring a data record of a lockset terminal; for example, door opening and closing records and the like can be obtained by the server, at the moment, data records of the lock terminal can be obtained by the server, the data records are different for different intelligent locks, and the data records provided by some intelligent locks are more detailed, for example, when the fingerprint door opening is successful after MM fails for 3 times in SS seconds in YY month ZZ day HH in XXXXXX, MM succeeds in SS seconds in door opening in YY month ZZ day HH in XX, in the method for controlling the lock terminal through regional management, the data records of the registered lock terminal are obtained through a data uploading interaction step, and more comprehensive information can be provided for the server. Preferably, the lock terminal management step includes the data uploading interaction step. For example, the lock terminal management step includes: and managing the registered lock terminal at the server and acquiring the data record of the lock terminal. Preferably, the method for controlling the lock terminal by regional management further comprises the following steps of data encryption transmission: the method comprises the steps that communication data are encrypted at a sender and then sent to a receiver, and the receiver decrypts the communication data after receiving the communication data, wherein the sender and the receiver are respectively a server and a lockset terminal. To prevent network snooping, the communication protocol does not employ plaintext. The communication data is encrypted at the sender and then sent to the receiver, and the receiver decrypts the communication data after receiving the communication data. For example, in each interaction step in the method for controlling the lock terminal by regional management, each interaction step includes an authorization authentication interaction step, an authorization permission interaction step, an authorization prohibition interaction step, a database operation interaction step, a network configuration interaction step, a heartbeat interaction step, a time configuration interaction step and/or a data upload interaction step.
Continuing to illustrate the embodiment of the present invention, for example, the method for controlling a lock terminal by regional management further includes a gateway configuration step and a gateway control step, for example, the gateway configuration step includes: in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and network use permission is configured for the gateway; as another example, the gateway controlling step includes: in the gateway operating mode, a lock terminal having a wireless receiving function, i.e., a lock terminal, is managed. The Gateway (Gateway) is also called an internetwork connector or a protocol converter, and is interconnected with networks such as a lock terminal and a server above a network layer. Therefore, the lock terminal does not need to independently realize remote communication and can be connected to a remote server, and one gateway can connect and manage a plurality of lock terminals within the effective communication distance of the gateway or the lock terminals. For example, the step of networking comprises the step of gateway configuration; the method for controlling the lock terminal through regional management comprises the gateway control step. In another example, the method for controlling a lock terminal by regional management includes the step of controlling the gateway.
For example, configuring network use authority for the gateway at a server; for example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a server configures network use authority for the gateway; the rest of the examples are analogized. If the gateway is not in the network use permission, entering a setting page to configure the network use permission for the gateway; for example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a setting page is entered to configure network use permission for the gateway; the rest of the examples are analogized. Preferably, the server enters a setting page to configure the network use permission for the gateway. For example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a server enters a setting page to configure network use permission for the gateway; the rest of the examples are analogized. In each embodiment, the server is a mobile terminal, such as a mobile phone, a tablet computer, a notebook computer, a mobile smart device, or the like, and preferably, in the gateway configuration mode, the mobile terminal is connected to the gateway through a gateway wireless interface, and the mobile terminal is used to configure the network usage right for the gateway. Preferably, in the gateway operating mode, a mobile terminal is adopted to manage a lock terminal with a wireless receiving function for the gateway. It can be understood that the mobile terminal used in the gateway configuration mode and the mobile terminal used in the gateway operation mode may be the same mobile terminal or different mobile terminals. Configuring network use authority for the gateway, namely enabling the gateway to have the authority of transmitting data through a network; for example, configuring the gateway with network usage rights includes: and configuring the wifi name and the password of the networking router of the current environment for the gateway. For example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a wifi name and a password of a networking router in the current environment are configured for the gateway; the rest of the examples are analogized. Therefore, the gateway and the lock terminal connected with the gateway can realize network access and data transmission through the networking router of the current environment.
Preferably, the lock terminal having the wireless receiving function includes: and establishing wireless association between the lock terminal with the wireless receiving function and the gateway, and wirelessly managing the lock terminal with the wireless receiving function through the gateway. For example, a lock terminal with a wireless receiving function is wirelessly associated with the gateway at a third-party platform, and the lock terminal with the wireless receiving function is wirelessly managed through the gateway. Preferably, the third party platform is a mobile terminal and/or an application program thereof. If necessary, the lock terminal with data transmission function, such as a wired lock terminal, can also be managed, but this will increase the workload of wiring and connecting, and the preferred embodiment of the present invention is that the gateway is wirelessly connected with the lock terminal, wirelessly managed, and network access and/or data transmission is realized through the networking router of the current environment.
Preferably, the lock terminal having a wireless receiving function includes: adding, deleting or modifying the lock terminal for the gateway, and setting the lock terminal adding, deleting or modifying information for the gateway. For example, the lock terminal with a wireless receiving function includes: establishing wireless association between the lock terminal with the wireless receiving function and the gateway, adding, deleting or modifying the lock terminal for the gateway, and setting the adding, deleting or modifying information of the lock terminal for the gateway. Preferably, the information comprises lock terminal self information, lock terminal environment information, control information and/or authority information; the control information includes enabling control information, disabling control information, display control information and/or monitoring control information, and the authority information includes fingerprint information, voice control information, motion control information, door card information, password information, validity time information and/or validity time information, for example, the lock terminal is turned on or turned off within validity times and/or validity time through the password information, the fingerprint information, the voice control information or the motion control information in the authority information. Therefore, when the lock terminal is connected, the information of the lock terminal can be known, such as a certain apartment 1603; when a user lives in a hotel, the environment information of the lockset terminal can be obtained, for example, a public swimming pool or a gymnasium exists in a 4 th building; when a certain room is temporarily used, authority information such as valid time information and the like can be obtained, and the use by a user or the control by a management party is very convenient.
Preferably, the lock terminal having the wireless receiving function includes: and establishing wireless association with the lock terminal in a mode of scanning the unique identifier of the lock terminal. For example, the gateway and the lock terminal are wirelessly associated by scanning the unique identifier of the lock terminal. For example, a serial number two-dimensional code is arranged on the lock terminal and serves as the unique identifier, and the gateway and the lock terminal are wirelessly associated in a mode that the mobile terminal scans the unique identifier of the lock terminal. Preferably, the lock terminal having the wireless receiving function includes: the gateway sends a working state selection notification, a Wifi configuration notification, a mobile phone connection notification, a TCP data notification, a CC1101 forwarding notification, a watchdog notification, and the like to a lock terminal, a mobile terminal, a server, or the like.
Preferably, the method for controlling a lock terminal by regional management further includes the steps of: and controlling the gateway to enter a gateway configuration mode. For example, the gateway is controlled to enter the configuration mode through a configuration key; for another example, the gateway is controlled to enter the configuration mode through the mobile terminal; preferably, the gateway is controlled to enter the configuration mode by a pre-authorized mobile terminal. In this way, the gateway can be controlled to enter the gateway configuration mode in different ways, either soft or hard. Preferably, the method for controlling a lock terminal by regional management further includes the steps of: and controlling the gateway to enter a gateway working mode. For example, the gateway is controlled to enter the working mode through a configuration key; therefore, the user can realize that the gateway is controlled to enter the working mode by a hard configuration key or the gateway is controlled to enter the working mode by a preauthorized mobile phone and the like in a soft mode. Preferably, the lock terminal and the gateway have the same use authority of the internal network. In this way, the lock terminal and the gateway are in the same local area network, and the association can be established through the router. That is to say, the lock terminal can be connected to the router through the gateway to realize network connection, and the lock terminal can also be directly connected to the router to realize network connection, and the latter obviously increases the cost of the lock terminal, and can be realized by adopting different technical paths in the development stages of market and product cost brought by different technologies.
Furthermore, the embodiment of the invention also comprises the technical characteristics of the above embodiments, the lock terminal and the method for controlling the lock terminal by regional management which are formed by combining the technical characteristics of the above embodiments, thus, the invention improves the intelligent property of the lock terminal by designing the lock terminal and designing a method for controlling the lock terminal by regional management, cooperates with the authorization starting and the authorization ending, can realize that the lockset terminal automatically sets whether the lockset terminal can be remotely controlled by the server or not, and can also upload user operation data to the server when a door card is read to open the door, the server can know the opening condition of the lock terminal, is particularly suitable for being applied to areas such as campuses, hotels, apartments, office buildings and/or hospitals and the like needing to monitor the door opening condition, is also beneficial to a guardian to know the door opening time of a person under guardianship, and makes favorable guidance so as to avoid accidents.
The technical features mentioned above are combined with each other to form various embodiments which are not listed above, and all of them are regarded as the scope of the present invention described in the specification; also, modifications and variations may be suggested to those skilled in the art in light of the above teachings, and it is intended to cover all such modifications and variations as fall within the true spirit and scope of the invention as defined by the appended claims.
Claims (9)
1. A lockset terminal is characterized by comprising a control module, and a networking module, an authorization starting module, an authorization ending module, a data uploading module and a reading module which are respectively connected with the control module;
the networking module is used for automatically networking when the lockset terminal is powered on;
the authorization starting module is used for unlocking the lockset terminal locally or remotely and enabling the lockset terminal to be controlled remotely through the control module;
the authorization finishing module is used for locking the lockset terminal locally or remotely and controlling the lockset terminal remotely through the incapability of the control module;
the data uploading module is used for uploading user operation data of the lock terminal to the server;
the reading module is connected with the data uploading module, and is used for reading a door card physical identifier, controlling the lock terminal through the control module, and uploading user operation data of the lock terminal to a server through the data uploading module; the server comprises a mobile terminal of a short-distance manager and a mobile terminal of a long-distance relation person;
the lock terminal also comprises an identification storage module, a registration module and a state query module which are respectively connected with the control module;
the identification storage module is used for storing the lock terminal identification;
the registration module is connected with the identification storage module and is used for registering to a server and acquiring a communication key for a lock terminal by adopting a lock terminal identification;
the state query module is used for providing a lock terminal state and lock terminal parameters when queried;
and the number of the first and second electrodes,
the data uploading module is used for encrypting the user operation data of the lockset terminal by adopting the communication secret key and then uploading the encrypted user operation data to the server;
the networking module is also connected with the registration module, and the networking module is used for automatically networking when the lock terminal is powered on and registering to a server through the registration module;
the reading module is used for reading the physical identifier of the door card, encrypting the user operation data of the lockset terminal by adopting the communication secret key through the data uploading module and uploading the encrypted data to the server;
when a preset uploading condition is reached, the lock terminal uploads lock data to a server with control authority, and the uploading condition is that an owner of the lock terminal logs in or opens the lock terminal through fingerprint identification.
2. The lock terminal according to claim 1, wherein the reading module is configured to read a physical identifier of a door card, control the lock terminal through the control module, and upload user operation data of the lock terminal to the server through the data upload module in real time or at regular time or upon receiving a data upload control instruction; the lock terminal respectively acquires image data as the lock data or part of the lock data at a first preset time before door opening, at door opening and at a second preset time after door opening; the first preset time is less than the second preset time.
3. The lock terminal according to claim 2, further comprising a display module connected to the control module, wherein the display module is configured to display device information and network signal status when the lock terminal is locked, and to display current user operation data when the lock terminal is unlocked.
4. The lock terminal of claim 2, further comprising a parameter configuration module connected to the control module, the parameter configuration module configured to configure lock terminal parameters.
5. The lock terminal according to claim 4, wherein the networking module is further connected to the parameter configuration module, and the networking module is further configured to send the lock terminal parameters during networking and adjust the lock terminal parameters through the parameter configuration module according to a control instruction of a server.
6. A method for controlling a lockset terminal through regional management is characterized by comprising the following steps:
networking: automatically networking when the lockset terminal is powered on;
an authorization starting step: unlocking the lockset terminal locally or remotely to enable the lockset terminal to be controlled remotely;
and an authorization finishing step: locking the lockset terminal locally or remotely, and disabling the remote control lockset terminal;
a data uploading step: uploading user operation data of the lock terminal to a server;
a reading step: reading a door card physical identification and controlling a lockset terminal;
the method for controlling the lock terminal by regional management is realized by adopting the lock terminal in any one of claims 1 to 5;
the method for controlling the lockset terminal through regional management further comprises the following steps:
an identification obtaining step: acquiring a lock terminal identification;
a registration step: registering with a server, and acquiring a communication secret key for a lock terminal by adopting a lock terminal identifier;
and (3) state query step: providing a lock terminal state and lock terminal parameters when queried;
and the number of the first and second electrodes,
in the data uploading step, user operation data of the lockset terminal are encrypted by the communication secret key and then uploaded to a server;
in the networking step, the network is automatically connected when the lockset terminal is powered on, and the lockset terminal is registered to the server through the registering step;
in the reading step, reading a door card physical identifier, encrypting user operation data of the lockset terminal by adopting the communication secret key through the data uploading step, and uploading the encrypted user operation data to a server;
the method for controlling the lock terminal through regional management further comprises the following steps:
and (3) authority authentication interaction step: acquiring a lock terminal control authority; the method comprises the steps that a server interacts with a lock terminal to obtain a right authentication instruction, the server obtains a control right of the lock terminal, the lock terminal opens the control right to a server which is authenticated by a lock terminal and completes the lock terminal registration step, and the right authentication is successful;
and (3) permission interaction step: opening part of lock terminal operation authority; the server interacts with a lock terminal to give permission, the lock terminal opens part of lock terminal operation permissions, the server which is authenticated by the lock terminal obtains part of lock terminal operation permissions, and the server adopts the part of lock terminal operation permissions to carry out subsequent lock terminal management steps and lock terminal control steps on the lock terminal, so that the control of the lock terminal is realized;
and the permission forbidding interaction step: forbidding part of lock terminal operation authorities; the method comprises the steps that a server interacts with a lock terminal to forbid an authority prohibiting instruction, the lock terminal cancels part of lock terminal operation authorities, the server authenticated by the lock terminal cancels part of lock terminal operation authorities, the server cannot adopt the part of lock terminal operation authorities to carry out subsequent lock terminal management steps and lock terminal control steps on the lock terminal, so that the lock terminal realizes separation control on the server authenticated by the lock terminal, and/or the server cancels part of lock terminal operation authorities of the lock terminal authenticated by the server, and the server does not adopt the part of lock terminal operation authorities to carry out subsequent lock terminal management steps and lock terminal control steps on the lock terminal, so that the server realizes abandonment control on the lock terminal;
database operation interaction: the database operation interaction and the updating of the database information of the locker terminal; the method comprises the steps that a server and a lock terminal interact a database operation instruction, and the server which is authenticated by the lock terminal brings the lock terminal into a database of the lock terminal for management, wherein the management comprises name management, password management and/or authority management of the lock terminal;
network configuration interaction: setting network parameters;
a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction;
time configuration interaction step: configuring and acquiring lockset terminal time;
data uploading and interacting steps: and acquiring a data record of the lock terminal.
7. The method for controlling a lock terminal according to claim 6, further comprising a display step of: and displaying equipment information and a network signal state when the lock terminal is locked, and displaying current user operation data when the lock terminal is unlocked.
8. The method for controlling a lock terminal according to the regional management of claim 6, further comprising the step of configuring parameters: and configuring lock terminal parameters.
9. The zone management control lock terminal method according to claim 6, applied to the following zones: a campus, hotel, apartment, office building, and/or hospital.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810309600.4A CN108537927B (en) | 2018-04-09 | 2018-04-09 | Lockset terminal and method for controlling lockset terminal through regional management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810309600.4A CN108537927B (en) | 2018-04-09 | 2018-04-09 | Lockset terminal and method for controlling lockset terminal through regional management |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108537927A CN108537927A (en) | 2018-09-14 |
CN108537927B true CN108537927B (en) | 2021-09-07 |
Family
ID=63481757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810309600.4A Active CN108537927B (en) | 2018-04-09 | 2018-04-09 | Lockset terminal and method for controlling lockset terminal through regional management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108537927B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111352347A (en) * | 2018-12-24 | 2020-06-30 | 青岛海尔洗衣机有限公司 | Control method of household appliance and household appliance |
CN110288735A (en) * | 2019-06-26 | 2019-09-27 | 广东汇泰龙科技股份有限公司 | Its smart lock of a kind of method of securely unlocking of multiple-authentication and application |
CN110599646A (en) * | 2019-09-03 | 2019-12-20 | 国网内蒙古东部电力有限公司电力科学研究院 | Special local module for access control system, control method, intelligent substation safety precaution method and system |
CN114448727B (en) * | 2022-04-02 | 2022-06-21 | 中国信息通信研究院 | Information processing method and system based on industrial Internet identification analysis system |
CN115601863B (en) * | 2022-09-30 | 2023-07-25 | 宁波纬诚科技股份有限公司 | Intelligent security internet of things lock and application method thereof |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202937071U (en) * | 2012-09-11 | 2013-05-15 | 厦门信昇达物联科技有限公司 | Monitoring anti-theft lock |
CN104167040B (en) * | 2014-09-02 | 2016-11-02 | 深圳攀多物联科技有限公司 | The long-range control method of a kind of electronic lock and system |
CN104361667B (en) * | 2014-12-05 | 2017-06-06 | 国家电网公司 | A kind of access control system and its entrance guard authorization method based on 4G communications |
US20170098335A1 (en) * | 2015-10-02 | 2017-04-06 | Stanley Security Solutions, Inc. | Cardless access control with electronic locks using smartphones |
CN105336029A (en) * | 2015-11-24 | 2016-02-17 | 中船重工(武汉)凌久信息技术有限公司 | IoT (Internet of Things) based intelligent lock system and method |
CN107295041A (en) * | 2016-03-31 | 2017-10-24 | 北京欢乐叮当科技有限公司 | Intelligent entrance guard management method, apparatus and system |
CN106023351A (en) * | 2016-04-28 | 2016-10-12 | 樊明延 | Electronic lock device, and intelligent management and monitoring system and method based on Internet |
CN105931337A (en) * | 2016-05-09 | 2016-09-07 | 杭州摇光科技有限公司 | Electronic lock device and system and authorizing method of electronic lock system |
CN106355715A (en) * | 2016-08-31 | 2017-01-25 | 孟玲 | Wireless speech-recognition door access system |
CN106683214A (en) * | 2016-12-06 | 2017-05-17 | 厦门中控生物识别信息技术有限公司 | Method and device for acquiring attendance verification data |
CN106683251A (en) * | 2017-01-22 | 2017-05-17 | 四川安能能源技术有限公司 | Management control system of intelligent electric control lock for machine room |
CN107170086A (en) * | 2017-05-11 | 2017-09-15 | 广东汇泰龙科技有限公司 | A kind of child custody method locked based on cloud, system |
CN207115539U (en) * | 2017-09-14 | 2018-03-16 | 陕西省西安中学 | Dormitory entrance guard device |
CN207182439U (en) * | 2017-09-26 | 2018-04-03 | 太原工业学院 | A multifunctional electronic access control system |
CN107833326A (en) * | 2017-11-17 | 2018-03-23 | 深圳市驿固科技有限公司 | A kind of method of visualization interface management smart lock |
-
2018
- 2018-04-09 CN CN201810309600.4A patent/CN108537927B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN108537927A (en) | 2018-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108537927B (en) | Lockset terminal and method for controlling lockset terminal through regional management | |
US11044608B2 (en) | System and method for access control via mobile device | |
US11321978B2 (en) | Systems and methods for secure lock systems with redundant access control | |
US9852562B2 (en) | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons | |
CN105279832B (en) | Intelligent door lock system and its control method | |
CN105894627B (en) | A kind of control of bluetooth access equipment, control of bluetooth access management system and method | |
US7493651B2 (en) | Remotely granting access to a smart environment | |
CN107093243B (en) | Door lock verification alarm method and system and terminal | |
CA2516704C (en) | Key control with real time communications to remote locations | |
CN106023373A (en) | Big data and human face identification based access control system for school dormitory | |
TW201706895A (en) | Systems and methods for redundant access control systems based on mobile devices | |
WO2016169424A1 (en) | Networked community area access control system and community area access method based thereon | |
US20040177072A1 (en) | Smart environment | |
KR101814719B1 (en) | System and method for remote controlling digital door-lock using smartphone | |
US12015500B2 (en) | System and method for a control system for managing smart devices in a multiple unit property environment | |
WO2023280277A1 (en) | Control method and system | |
CN110570559A (en) | Electronic key sharing method in access control system based on mobile terminal | |
CN106251438A (en) | A kind of E.E.G lock system and method | |
CN108010166A (en) | Electronic door lock system | |
KR20200052434A (en) | Security system and method for IoT equipment | |
CN110415419A (en) | Electron key share system in access control system based on mobile terminal | |
CN108537924B (en) | Method for realizing network intelligent lock | |
CN108537925B (en) | Lock terminal joint control method | |
CN109615730A (en) | A kind of secondary authentication unlocking system of smart lock and method | |
CN105678869A (en) | Entrance guard intelligent controller, entrance guard intelligent control system and entrance guard opening method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230424 Address after: No. 048, 12th Floor, Weiya Building, No. 29 Suzhou Street, Haidian District, Beijing, 100080 Patentee after: BEIJING HARDROCK TECHNOLOGY CO.,LTD. Address before: 100025 020d, block C, Sanyuanqiao international port, Chaoyang District, Beijing Patentee before: ANHENG SHITONG (BEIJING) NETWORK TECHNOLOGY CO.,LTD. |