CN110176091A - A method of smart lock safety is improved by mobile terminal device code - Google Patents
A method of smart lock safety is improved by mobile terminal device code Download PDFInfo
- Publication number
- CN110176091A CN110176091A CN201910408057.8A CN201910408057A CN110176091A CN 110176091 A CN110176091 A CN 110176091A CN 201910408057 A CN201910408057 A CN 201910408057A CN 110176091 A CN110176091 A CN 110176091A
- Authority
- CN
- China
- Prior art keywords
- identification code
- smart lock
- code
- mobile terminal
- binding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012986 modification Methods 0.000 claims description 15
- 230000004048 modification Effects 0.000 claims description 15
- 230000001815 facial effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 6
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of methods for improving smart lock safety by mobile terminal device code, which comprises mobile terminal initiates bind request to smart lock, sends the first identification code to smart lock;Smart lock receives the first identification code, and the second identification code of the first identification code and smart lock is sent to remote system;Remote system matches the first identification code and the second identification code, verifies whether to allow mobile terminal binding smart lock.The present invention is by binding the mobile phone imei code of smart lock owner with smart lock, the mobile phone terminal equipment for vetoing other imei codes is forced to manipulate it, to solve the problems, such as that illegal person pretends to be smart lock owner's malice manipulation smart lock, the mode of operation of this method is simple, it is big that amplitude promoted to the safety of smart lock, suitable for using the very high user of safety requirements.
Description
Technical field
The present invention relates to smart lock technical fields, and in particular to one kind improves smart lock safety by mobile terminal device code
The method of property.
Background technique
Currently, with modern society's intelligence, the continuous improvement of the level of informatization, smart lock conduct was incipient in recent years
A kind of novel safety lock is used by more and more families.Smart lock as one of defence line most important in household safe,
The problem of particularly with regard to property safety, the safety that consumer is used for especially are paid attention to.And as a peace outstanding
Full problem, illegal person maliciously can pretend to be smart lock owner by various modes, be bound again to smart lock, realization pair
The illegal manipulation of smart lock, jeopardizes the safety of the real owner of smart lock.
Summary of the invention
In order to solve the above technical problems, the present invention provides, one kind is easy to operate, can promote the logical of smart lock safety in utilization
Cross the method that mobile terminal device code improves smart lock safety.
In order to achieve the above objectives, the present invention adopts the following technical scheme:
A method of smart lock safety is improved by mobile terminal device code, which comprises
Mobile terminal initiates bind request to smart lock, sends the first identification code to smart lock;
Smart lock receives the first identification code, and the second identification code of the first identification code and smart lock is sent to remote system;
Remote system matches the first identification code and the second identification code, verifies whether to allow mobile terminal binding intelligence
Lock.
Preferably, when remote system verifies whether to allow mobile terminal binding smart lock, following method is executed:
Remote system judges whether the first identification code with the second identification code is to bind for the first time;
If the first identification code is to bind for the first time with the second identification code, the first identification code and the second identification code are matched
It is right, the first identification code and the second identification code are saved as one group of verifying number sets, and the instruction for allowing to bind is sent to smart lock;
If the first identification code and the second identification code be it is non-bind for the first time, verify current request the first identification code whether with
The first identification code after the first identification code or modification binding bound for the first time is identical;
If the first identification code of current request and the first identification code after the first identification code or modification binding bound for the first time
It is identical, then the instruction for allowing to bind is sent to smart lock;
If the first identification code of current request and the first identification code after the first identification code or modification binding bound for the first time
It is not identical, then the instruction of refusal binding is sent to smart lock.
Preferably, further includes: the identity information of smart lock owner is entered into the number of remote system by mobile terminal
According in library, remote system generates a random code simultaneously and is sent to client;The identity information includes smart lock owner
ID card information, phone number information, finger print information, facial image information.
Preferably, also modification bind request can be sent to remote system by mobile terminal, is manually verified by remote system
Whether the identity information and random code of smart lock owner is consistent, if meeting, allows to modify and the binding of the second identification code
First identification code forms one group of new verifying number sets.
Preferably, the mobile terminal is mobile phone, and first identification code is the imei code of mobile phone, second identification code
For the exclusive identification code in typing smart lock.
Compared with prior art, the invention has the following beneficial effects:
The present invention forces to veto other imei by binding the mobile phone imei code of smart lock owner with smart lock
The mobile phone terminal equipment of code manipulates it, so that solving illegal person pretends to be smart lock owner's malice manipulation smart lock
The problem of.The mode of operation of this method is simple, big to the safety promotion amplitude of smart lock, suitable for non-to safety requirements is used
Often high user.
Detailed description of the invention
Fig. 1 is the method flow block diagram that the present invention improves smart lock safety by mobile terminal device code;
Fig. 2 is the operating process schematic diagram of the method for the present invention;
Fig. 3 is that remote system verifies whether the method flow block diagram for allowing mobile terminal binding smart lock.
Specific embodiment
Present invention will now be described in further detail with reference to the embodiments and the accompanying drawings, but embodiments of the present invention are unlimited
In this.
It is the method flow block diagram that the present invention improves smart lock safety by mobile terminal device code with reference to Fig. 1, Fig. 1,
Wherein, the mobile terminal of the present embodiment refers to mobile phone, and the first following identification codes is the imei code of mobile phone, i.e. international mobile device is known
Other code is equivalent to mobile phone for identifying the mobile communication equipments such as each independent mobile phone in mobile telephone network
Identity card, the second following identification codes are the exclusive identification code in typing smart lock, which can be with smart lock
By factory settings and Unique Device identification number of the typing in the memory of smart lock, as smart lock when equipment is dispatched from the factory.Institute
The method of stating includes:
S10: mobile terminal initiates bind request to smart lock, sends the first identification code to smart lock;
Illustratively, as shown in Fig. 2, Fig. 2 is the operating process schematic diagram of this method, in this step, mobile phone terminal is logical
It crosses the APP (application program) loaded on it and sends binding instruction to smart lock, while mobile phone is obtained by APP (application program)
Imei code, imei code is sent to the smart lock for being mounted with wireless data transceiver module by wireless network.Above-mentioned wireless hair
Sending mode can be WIFI, bluetooth, 2G/3G/4G/5G, NFC or ZigBee etc..
S20: smart lock receives the first identification code, and the second identification code of the first identification code and smart lock is sent to long-range system
System;
Illustratively, in this step, so-called remote system is database server, and smart lock is receiving mobile phone
After imei code, the exclusive identification code in imei code and typing smart lock is remotely sent to and APP by APP (application program)
(application program) is associated, provides the database server of data service for APP (application program).
S30: remote system matches the first identification code and the second identification code, verifies whether to allow mobile terminal binding
Smart lock.
Illustratively, in this step, database server receives unique in the imei code and typing smart lock of mobile phone
After identification code, database information in invoking server, by the exclusive identification code in the imei code and typing smart lock of mobile phone into
Row matching decides whether to allow the handset binding smart lock.
Further, as shown in figure 3, Fig. 3 is the method that remote system verifies whether to allow mobile terminal binding smart lock
Flow diagram, wherein when remote system verifies whether to allow mobile terminal binding smart lock, execute following method:
S301: remote system judges whether the first identification code with the second identification code is to bind for the first time;
Illustratively, in this step, database server judges exclusive identification code in typing smart lock and mobile phone
Whether imei code is to bind for the first time.
S302: if the first identification code and the second identification code are to bind for the first time, by the first identification code and the second identification code into
Row pairing saves the first identification code and the second identification code as one group of verifying number sets, and allow to bind to smart lock transmission
Instruction;
Illustratively, in this step, if the exclusive identification code in the imei code and typing smart lock of mobile phone is to tie up for the first time
It is fixed, then the exclusive identification code in this imei code and typing smart lock is matched, is stored in server as one group of verifying number sets
Database in, while to smart lock send allow bind instruction.
S303: if the first identification code is bound with the second identification code to be non-for the first time, the first identification code of current request is verified
It is whether identical as the first identification code after the first identification code or modification binding bound for the first time;
If the first identification code of current request and the first identification code after the first identification code or modification binding bound for the first time
It is identical, then the instruction for allowing to bind is sent to smart lock;
If the first identification code of current request and the first identification code after the first identification code or modification binding bound for the first time
It is not identical, then the instruction of refusal binding is sent to smart lock.
Illustratively, in this step, if the exclusive identification code in the imei code and typing smart lock of mobile phone is not for the first time
Binding, then database server judge the imei code whether be the imei code bound for the first time or user actively modify bind after with intelligence
The imei code matched again can be locked.
If the imei code is that the imei code bound for the first time or user actively match after modification is bound with smart lock again
Imei code, then server sends the instruction for allowing to bind to smart lock, and mobile phone terminal and smart lock realize binding at this time;
If the imei code is not the imei code bound for the first time or is not that user actively matches after modification is bound with smart lock again
Pair imei code, then server to smart lock send refusal binding instruction, on the Application Program Interface of mobile phone prompt " binding
The information such as failure ".
Further, this method further include: be entered into the identity information of smart lock owner remotely by mobile terminal
In the database of system, can the identity information of typing include the ID card information of smart lock owner, phone number information, fingerprint
Information, facial image information etc..Remote system can generate a random code simultaneously and be sent to client.
Illustratively, in this step, user can by cell phone application (application program), be manually entered by personal body
Part information such as ID card information, phone number information remote are uploaded, are entered into the database of server, or pass through mobile phone
Personal finger print information, facial image information are entered into the database of server by fingerprint sensor, camera.Server simultaneously
A random code can be generated and be transmitted back to user, user need to remember this random code, these identity informations and random code will be made
For the data information of Future authentication user identity.In this step, by increasing random code, the safety of verifying is further increased
Property.
Further, this method further include: modification bind request is sent to remote system by mobile terminal, by being remotely
Whether the artificial identity information for verifying smart lock owner of system and random code are consistent, if meeting, allow to modify and know with second
First identification code of other code binding, forms one group of new verifying number sets.
Illustratively, in this step, if user is lost mobile phone and needs to bind smart lock again, hand can be passed through
Machine APP (application program) sends modification bind request to server, specifically, need to send personal identity information and random code
To server, after server receives request, by manually verify identity information and random code whether with the data that are saved in database
Information is consistent, if meeting, allows user to unbind imei code before with smart lock, binds new imei code again, and
New verifying number sets update is saved in database.
Method provided by the present invention is forced by binding the mobile phone imei code of smart lock owner with smart lock
The mobile phone terminal equipment for vetoing other imei codes manipulates it, pretends to be smart lock owner to dislike to solve illegal person
The problem of meaning manipulation smart lock.The mode of operation of this method is simple, and it is big to promote amplitude to the safety of smart lock, suitable for making
With the very high user of safety requirements.
Step in the method for the embodiment of the present invention can carry out sequence adjustment, merger or deletion according to actual needs.This
Field those of ordinary skill is it is understood that all or part of the steps in the various methods of above-described embodiment is can to pass through
Program is completed to instruct the relevant hardware of terminal device, which can be stored in a computer readable storage medium, institute
Stating storage medium may include: flash disk, read only memory ROM, random access memory ram, disk or CD etc..
The above, preferable specific embodiment only of the invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Design is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (5)
1. a kind of method for improving smart lock safety by mobile terminal device code, which is characterized in that the described method includes:
Mobile terminal initiates bind request to smart lock, sends the first identification code to smart lock;
Smart lock receives the first identification code, and the second identification code of the first identification code and smart lock is sent to remote system;
Remote system matches the first identification code and the second identification code, verifies whether to allow mobile terminal binding smart lock.
2. the method according to claim 1 for improving smart lock safety by mobile terminal device code, which is characterized in that
When remote system verifies whether to allow mobile terminal binding smart lock, following method is executed:
Remote system judges whether the first identification code with the second identification code is to bind for the first time;
If the first identification code is to bind for the first time with the second identification code, the first identification code and the second identification code are matched, protected
The first identification code and the second identification code are deposited as one group of verifying number sets, and sends the instruction for allowing to bind to smart lock;
If the first identification code and the second identification code be it is non-bind for the first time, verify current request the first identification code whether with for the first time
The first identification code after first identification code of binding or modification are bound is identical;
If the first identification code of current request is identical as the first identification code after the first identification code or modification binding bound for the first time,
The instruction for allowing to bind then is sent to smart lock;
If the first identification code of current request and the first identification code after the first identification code for binding for the first time or modification binding not phase
Together, then the instruction of refusal binding is sent to smart lock.
3. the method according to claim 1 for improving smart lock safety by mobile terminal device code, which is characterized in that
Further include: the identity information of smart lock owner is entered into the database of remote system by mobile terminal, remote system
A random code is generated simultaneously is sent to client;The identity information includes the ID card information of smart lock owner, mobile phone
Number information, finger print information, facial image information.
4. the method according to claim 3 for improving smart lock safety by mobile terminal device code, which is characterized in that
Also modification bind request can be sent to remote system by mobile terminal, the body of smart lock owner is manually verified by remote system
Whether part information and random code are consistent, if meeting, allow to modify the first identification code with the binding of the second identification code, form one
The new verifying number sets of group.
5. the method according to claim 1 for improving smart lock safety by mobile terminal device code, which is characterized in that
The mobile terminal is mobile phone, and first identification code is the imei code of mobile phone, and second identification code is in typing smart lock
Exclusive identification code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910408057.8A CN110176091B (en) | 2019-05-15 | 2019-05-15 | Method for improving security of intelligent lock through mobile terminal equipment code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910408057.8A CN110176091B (en) | 2019-05-15 | 2019-05-15 | Method for improving security of intelligent lock through mobile terminal equipment code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110176091A true CN110176091A (en) | 2019-08-27 |
CN110176091B CN110176091B (en) | 2022-03-25 |
Family
ID=67691306
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910408057.8A Active CN110176091B (en) | 2019-05-15 | 2019-05-15 | Method for improving security of intelligent lock through mobile terminal equipment code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110176091B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110991982A (en) * | 2019-10-28 | 2020-04-10 | 中船重工海鑫工程管理(北京)有限公司 | Construction project building information management method and system |
CN111182535A (en) * | 2019-12-23 | 2020-05-19 | 广东科徕尼智能科技有限公司 | Random code binding method and equipment for intelligent door lock and storage medium |
CN111508111A (en) * | 2020-04-13 | 2020-08-07 | 广东科徕尼智能科技有限公司 | Method, equipment and storage medium for binding intelligent lock |
CN111583451A (en) * | 2020-04-09 | 2020-08-25 | 惠州拓邦电气技术有限公司 | Identity verification method and device of electronic lock, computer equipment and storage medium |
CN113256853A (en) * | 2021-06-21 | 2021-08-13 | 德施曼机电(中国)有限公司 | Information transmission method, electronic equipment, door lock, server and storage medium |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102262793A (en) * | 2010-05-26 | 2011-11-30 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
CN104143056A (en) * | 2013-12-31 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Identity authentication method and system |
US20150048927A1 (en) * | 2013-08-13 | 2015-02-19 | Directed, Llc | Smartphone based passive keyless entry system |
CN106228654A (en) * | 2016-08-02 | 2016-12-14 | 成都荷码科技有限公司 | A kind of method of user account binding smart lock |
CN106228655A (en) * | 2016-08-02 | 2016-12-14 | 成都荷码科技有限公司 | A kind of method of user account binding smart lock |
CN106296899A (en) * | 2016-08-02 | 2017-01-04 | 成都荷码科技有限公司 | A kind of method that user account is unbinding with smart lock |
CN106652136A (en) * | 2016-12-22 | 2017-05-10 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal-based access control management information processing method and device |
CN106971442A (en) * | 2017-05-03 | 2017-07-21 | 河南传通电子科技有限公司 | A kind of safe and intelligent lock system |
CN106981108A (en) * | 2016-01-19 | 2017-07-25 | 福建省光速达物联网科技股份有限公司 | A kind of bluetooth nurse method for unlocking and system |
CN107146307A (en) * | 2017-05-03 | 2017-09-08 | 河南传通电子科技有限公司 | A kind of method of securely unlocking of intelligent lock system |
CN107833321A (en) * | 2017-11-01 | 2018-03-23 | 潍柴动力股份有限公司 | A kind of apparatus bound, unbind method, vehicle locking method and relevant device |
CN107895415A (en) * | 2017-10-31 | 2018-04-10 | 美的智慧家居科技有限公司 | Intelligent door lock, voice method for burn-recording, server and voice programming system |
CN108537923A (en) * | 2018-03-27 | 2018-09-14 | 丁巨波 | Network-based smart lock management control method and system |
CN109672683A (en) * | 2018-12-25 | 2019-04-23 | 深圳市安信认证系统有限公司 | Binding method, binding device and the terminal device of internet of things equipment |
-
2019
- 2019-05-15 CN CN201910408057.8A patent/CN110176091B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102262793A (en) * | 2010-05-26 | 2011-11-30 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
US20150048927A1 (en) * | 2013-08-13 | 2015-02-19 | Directed, Llc | Smartphone based passive keyless entry system |
CN104143056A (en) * | 2013-12-31 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Identity authentication method and system |
CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
CN106981108A (en) * | 2016-01-19 | 2017-07-25 | 福建省光速达物联网科技股份有限公司 | A kind of bluetooth nurse method for unlocking and system |
CN106228655A (en) * | 2016-08-02 | 2016-12-14 | 成都荷码科技有限公司 | A kind of method of user account binding smart lock |
CN106296899A (en) * | 2016-08-02 | 2017-01-04 | 成都荷码科技有限公司 | A kind of method that user account is unbinding with smart lock |
CN106228654A (en) * | 2016-08-02 | 2016-12-14 | 成都荷码科技有限公司 | A kind of method of user account binding smart lock |
CN106652136A (en) * | 2016-12-22 | 2017-05-10 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal-based access control management information processing method and device |
CN106971442A (en) * | 2017-05-03 | 2017-07-21 | 河南传通电子科技有限公司 | A kind of safe and intelligent lock system |
CN107146307A (en) * | 2017-05-03 | 2017-09-08 | 河南传通电子科技有限公司 | A kind of method of securely unlocking of intelligent lock system |
CN107895415A (en) * | 2017-10-31 | 2018-04-10 | 美的智慧家居科技有限公司 | Intelligent door lock, voice method for burn-recording, server and voice programming system |
CN107833321A (en) * | 2017-11-01 | 2018-03-23 | 潍柴动力股份有限公司 | A kind of apparatus bound, unbind method, vehicle locking method and relevant device |
CN108537923A (en) * | 2018-03-27 | 2018-09-14 | 丁巨波 | Network-based smart lock management control method and system |
CN109672683A (en) * | 2018-12-25 | 2019-04-23 | 深圳市安信认证系统有限公司 | Binding method, binding device and the terminal device of internet of things equipment |
Non-Patent Citations (2)
Title |
---|
张焕兰: "基于云端的无线智能锁系统设计与实现", 《软件导刊》 * |
王安义: "一种新型智能安全锁系统的设计", 《网络与通信》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110991982A (en) * | 2019-10-28 | 2020-04-10 | 中船重工海鑫工程管理(北京)有限公司 | Construction project building information management method and system |
CN111182535A (en) * | 2019-12-23 | 2020-05-19 | 广东科徕尼智能科技有限公司 | Random code binding method and equipment for intelligent door lock and storage medium |
CN111182535B (en) * | 2019-12-23 | 2023-08-01 | 广东好太太智能家居有限公司 | Random code binding method, device and storage medium for intelligent door lock |
CN111583451A (en) * | 2020-04-09 | 2020-08-25 | 惠州拓邦电气技术有限公司 | Identity verification method and device of electronic lock, computer equipment and storage medium |
CN111508111A (en) * | 2020-04-13 | 2020-08-07 | 广东科徕尼智能科技有限公司 | Method, equipment and storage medium for binding intelligent lock |
CN113256853A (en) * | 2021-06-21 | 2021-08-13 | 德施曼机电(中国)有限公司 | Information transmission method, electronic equipment, door lock, server and storage medium |
CN113256853B (en) * | 2021-06-21 | 2021-10-15 | 德施曼机电(中国)有限公司 | An information transmission method, electronic device, door lock, server and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110176091B (en) | 2022-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110176091A (en) | A method of smart lock safety is improved by mobile terminal device code | |
CN104765999B (en) | Method, terminal and server for processing user resource information | |
CN106340087A (en) | Intelligent switch lock system based on intelligent mobile terminal | |
CN110177354A (en) | A kind of wireless control method and system of vehicle | |
CN104637131A (en) | Authorization method and authorization device for access control system and access control system | |
CN104167040A (en) | Remote control method and system of electronic lock | |
CN104902465B (en) | System of real name is opened an account remote writing-card method and system | |
CN109067881B (en) | Remote authorization method, device, equipment and storage medium thereof | |
CN109658555A (en) | Method for unlocking, equipment and house transaction based on bluetooth see room mode | |
CN110535882A (en) | Identity authentication service method and system based on heterogeneous terminal | |
US20160328714A1 (en) | Method and apparatus for authenticating payment related information in mobile communication system | |
EP3675541A1 (en) | Authentication method and device | |
CN107222375A (en) | Method, Cloud Server and the readable storage medium storing program for executing of remote control intelligent household | |
CN106127888B (en) | Intelligent lock operation method and smart lock operating system | |
CN111508111A (en) | Method, equipment and storage medium for binding intelligent lock | |
CN104157082A (en) | Automatic ticket collecting method and automatic ticket collecting device | |
CN108920919A (en) | Control method, device and system of interactive intelligent equipment | |
CN109714769A (en) | Information binding method, device, equipment and storage medium | |
CN104853354A (en) | Bluetooth authentication method and system thereof | |
CN109379388B (en) | Identity recognition method, terminal and wearable device | |
CN113743938A (en) | Personal credit investigation information query method and device | |
CN109951437A (en) | Safety certifying method, device and server based on recognition of face | |
CN109214166A (en) | Smart machine authentication control method and system | |
CN104640112B (en) | A kind of identification authentication method, apparatus and system | |
CN105871903A (en) | Information security control method and system as well as mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 511434 No.1 and No.2, Shihua Road, Hualong Town, Panyu District, Guangzhou City, Guangdong Province Applicant after: Guangdong haomadame smart home Co.,Ltd. Address before: No.1, No.2 highway, No.2, Panyu, Guangzhou Applicant before: GUANGDONG KELAINI INTELLIGENT TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |