[go: up one dir, main page]

CN110284770B - Unlocking system and method, terminal equipment, door lock and door lock server - Google Patents

Unlocking system and method, terminal equipment, door lock and door lock server Download PDF

Info

Publication number
CN110284770B
CN110284770B CN201910561822.XA CN201910561822A CN110284770B CN 110284770 B CN110284770 B CN 110284770B CN 201910561822 A CN201910561822 A CN 201910561822A CN 110284770 B CN110284770 B CN 110284770B
Authority
CN
China
Prior art keywords
door lock
unlocking
mobile phone
phone number
sim card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910561822.XA
Other languages
Chinese (zh)
Other versions
CN110284770A (en
Inventor
王晓东
翟群峰
徐翔
郭军
刘建军
王文涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huada Zhibao Electronic System Co Ltd
Original Assignee
Beijing Zhibao Yunke Technology Co ltd
Beijing Huada Zhibao Electronic System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhibao Yunke Technology Co ltd, Beijing Huada Zhibao Electronic System Co Ltd filed Critical Beijing Zhibao Yunke Technology Co ltd
Priority to CN201910561822.XA priority Critical patent/CN110284770B/en
Publication of CN110284770A publication Critical patent/CN110284770A/en
Application granted granted Critical
Publication of CN110284770B publication Critical patent/CN110284770B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B51/00Operating or controlling locks or other fastening devices by other non-mechanical means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses unlocking system, which comprises terminal equipment, a door lock and a door lock server. And the terminal equipment is used for sending an unlocking request to the door lock, and the unlocking request carries the user identification. And the door lock is used for determining the binding mobile phone number corresponding to the user identifier and sending the binding mobile phone number to the terminal equipment when the user corresponding to the user identifier is determined to have the unlocking right of the door lock. The terminal equipment can also acquire the identifier of the SIM card installed in the terminal equipment, and sends the identifier of the SIM card and the received binding mobile phone number to the door lock server. And the door lock server is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the bound mobile phone number. After the door lock receives the unlocking instruction, the unlocking action can be executed according to the unlocking instruction. Therefore, compared with the traditional door lock using the password, the user does not need to remember the unlocking password, unlocking can be achieved by using the terminal equipment, and the operation mode is simple and convenient.

Description

Unlocking system and method, terminal equipment, door lock and door lock server
Technical Field
The application relates to the field of internet, in particular to an unlocking system, an unlocking method, terminal equipment, a door lock and a door lock server.
Background
The traditional unlocking method generally requires a user to carry a key and unlock the lock by using the key. Along with the development of science and technology, intelligent lockset has gone into people's life, especially uses the intelligent lockset that the password unblanked, because it can need not the user and carry the key, just can realize unblanking, and only know the user who unblanks the password and just can unblank, is a security relatively higher mode of unblanking, consequently obtains the favor of many users.
However, the door lock using the password requires the user to remember the preset unlocking password, and when the door lock is unlocked, the user needs to manually input the remembered password to unlock the door lock, which is troublesome to operate, and the input password is easy to be peeped, so that certain potential safety hazards exist.
Disclosure of Invention
The technical problem that this application will be solved is that traditional lock of using password, and it is more troublesome, the high problem of potential safety hazard to operate, provides an unlocking system, method, terminal equipment, lock and lock server.
In a first aspect, an embodiment of the present application provides an unlocking system, where the system includes: the system comprises terminal equipment, a door lock and a door lock server;
the terminal equipment is used for sending an unlocking request to the door lock, and the unlocking request carries a user identifier;
the door lock is used for determining a binding mobile phone number corresponding to the user identifier and sending the binding mobile phone number to the terminal equipment when the user corresponding to the user identifier is determined to have unlocking right for the door lock;
the terminal equipment is also used for acquiring an identifier of an SIM card installed in the terminal equipment and sending the identifier of the SIM card and the binding mobile phone number to the door lock server;
the door lock server is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number;
the door lock is used for executing unlocking action according to the unlocking instruction.
Optionally, the door lock determines that the user corresponding to the user identifier has the unlocking authority for the door lock by the following method:
and the door lock determines the identifier of the door lock, and determines that a mapping relation exists between the identifier of the door lock and the user identifier, and then determines that the user corresponding to the user identifier has the unlocking authority for the door lock.
Optionally, the terminal device is further configured to:
and receiving unlocking operation triggered by a user on a preset interface displayed by an unlocking application program installed on the terminal equipment, and generating the unlocking request.
Optionally, the user identifier includes a user identifier corresponding to an account corresponding to the unlocking application program.
Optionally, the system further comprises an operator server;
the terminal equipment acquires the identifier of the SIM card installed in the terminal equipment, and the method comprises the following steps:
and the terminal equipment sends an SIM card identification acquisition request to the operator server and receives the identification of the SIM card sent by the operator server.
Optionally, the determining, by the door lock server, that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number includes:
the door lock server sends a verification request to the operator server, wherein the verification request comprises the identification of the SIM card and the bound mobile phone number;
the operator server determines a mobile phone number corresponding to the SIM card identifier, and determines that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number;
and the operator server sends a verification result indicating that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number to the door lock server.
Alternatively to this, the first and second parts may,
the door lock is further configured to: after the unlocking action is executed, an unlocking success message is sent to the terminal equipment; and/or the presence of a gas in the gas,
and the door lock is also used for sending an unlocking failure message to the terminal equipment if the unlocking action is not executed within the preset time after the unlocking request is received.
In a second aspect, an embodiment of the present application provides an unlocking method, where the method includes:
the method comprises the steps that terminal equipment sends an unlocking request to a door lock, wherein the unlocking request carries a user identifier;
the terminal equipment receives a binding mobile phone number which is sent by the door lock and corresponds to the user identification;
the terminal equipment acquires an identifier of an SIM card installed in the terminal equipment, and sends the identifier of the SIM card and the binding mobile phone number to the door lock server, so that the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
In a third aspect, an embodiment of the present application provides an unlocking method, where the method includes:
the method comprises the steps that a door lock receives an unlocking request sent by terminal equipment, wherein the unlocking request carries a user identifier;
when the door lock determines that the user corresponding to the user identification has unlocking right for the door lock, determining a binding mobile phone number corresponding to the user identification, and sending the binding mobile phone number to the terminal equipment;
the door lock receives an unlocking instruction sent by the door lock server, and executes an unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock server by the terminal equipment through the identification of the SIM card and the binding mobile phone number, and the door lock server sends the unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number.
In a fourth aspect, an embodiment of the present application provides an unlocking method, where the method includes:
the method comprises the steps that a door lock server receives an identifier of an SIM card installed in a terminal device and sent by the terminal device, and a binding mobile phone number corresponding to a user identifier carried in an unlocking request sent to a door lock by the terminal device;
and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number, so that the door lock executes unlocking action according to the unlocking instruction.
In a fifth aspect, an embodiment of the present application provides a terminal device, where the terminal device includes:
the first sending unit is used for sending an unlocking request to the door lock, wherein the unlocking request carries a user identifier;
the receiving unit is used for receiving the binding mobile phone number which is sent by the door lock and corresponds to the user identification;
an obtaining unit, configured to obtain an identifier of an SIM card installed in the terminal device;
and the second sending unit is used for sending the identifier of the SIM card and the bound mobile phone number to the door lock server, so that the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number.
In a sixth aspect, an embodiment of the present application provides a door lock, including:
the first receiving unit is used for receiving an unlocking request sent by the terminal equipment, wherein the unlocking request carries a user identifier;
the determining unit is used for determining a binding mobile phone number corresponding to the user identifier when determining that the user corresponding to the user identifier has unlocking right on the door lock;
a sending unit, configured to send the bound mobile phone number to the terminal device;
the second receiving unit is used for receiving an unlocking instruction sent by the door lock server and executing unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock server by the terminal equipment through the identification of the SIM card and the binding mobile phone number, and the door lock server sends the unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number.
In a seventh aspect, an embodiment of the present application provides a door lock server, where the door lock server includes:
the receiving unit is used for receiving the identifier of the SIM card installed in the terminal equipment and sent by the terminal equipment and the binding mobile phone number corresponding to the user identifier carried in the unlocking request sent to the door lock by the terminal equipment;
and the sending unit is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number, so that the door lock can execute unlocking action according to the unlocking instruction.
In an eighth aspect, an embodiment of the present application provides an unlocking system, where the system includes: the system comprises terminal equipment, a door lock and a door lock server;
the terminal equipment is used for sending an unlocking request to the door lock, and the unlocking request carries a user identifier;
the door lock is used for determining a binding mobile phone number corresponding to the user identifier when the user corresponding to the user identifier is determined to have unlocking right for the door lock;
the terminal equipment is also used for acquiring an identifier of an SIM card installed in the terminal equipment and sending the identifier of the SIM card to the door lock;
the door lock is also used for sending the identification of the SIM card and the binding mobile phone number to the door lock server;
the door lock server is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number;
the door lock is used for executing unlocking action according to the unlocking instruction.
Optionally, the door lock determines that the user corresponding to the user identifier has the unlocking authority for the door lock by the following method:
and the door lock determines the identifier of the door lock, and determines that a mapping relation exists between the identifier of the door lock and the user identifier, and then determines that the user corresponding to the user identifier has the unlocking authority for the door lock.
Optionally, the terminal device is further configured to:
and receiving unlocking operation triggered by a user on a preset interface displayed by an unlocking application program installed on the terminal equipment, and generating the unlocking request.
Optionally, the user identifier includes a user identifier corresponding to an account corresponding to the unlocking application program.
Optionally, the system further comprises an operator server;
the terminal equipment acquires the identifier of the SIM card installed in the terminal equipment, and the method comprises the following steps:
and the terminal equipment sends an SIM card identification acquisition request to the operator server and receives the identification of the SIM card sent by the operator server.
Optionally, the determining, by the door lock server, that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number includes:
the door lock server sends a verification request to the operator server, wherein the verification request comprises the identification of the SIM card and the bound mobile phone number;
the operator server determines a mobile phone number corresponding to the SIM card identifier, and determines that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number;
and the operator server sends a verification result indicating that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number to the door lock server.
Optionally, the door lock is further configured to: after the unlocking action is executed, an unlocking success message is sent to the terminal equipment; and/or the presence of a gas in the gas,
and the door lock is also used for sending an unlocking failure message to the terminal equipment if the unlocking action is not executed within the preset time after the unlocking request is received.
In a ninth aspect, an embodiment of the present application provides an unlocking method, where the method includes:
the method comprises the steps that terminal equipment sends an unlocking request to a door lock, wherein the unlocking request carries a user identifier;
the terminal equipment acquires an identifier of an SIM card installed in the terminal equipment, and sends the identifier of the SIM card to the door lock, so that the door lock sends the identifier of the SIM card and a binding mobile phone number corresponding to the user identifier to a door lock server, and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
In a tenth aspect, an embodiment of the present application provides an unlocking method, where the method includes:
the method comprises the steps that a door lock receives an unlocking request sent by terminal equipment, wherein the unlocking request carries a user identifier;
when the door lock determines that the user corresponding to the user identification has unlocking right for the door lock, determining a binding mobile phone number corresponding to the user identification;
the door lock receives an identifier of an SIM card installed in the terminal equipment, which is sent by the terminal equipment, and sends the identifier of the SIM card and the binding mobile phone number to a door lock server;
the door lock receives an unlocking instruction sent by the door lock server, and executes an unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock by the door lock server when the corresponding mobile phone number of the SIM card is determined to be consistent with the binding mobile phone number.
In an eleventh aspect, an embodiment of the present application provides an unlocking method, where the method includes:
the method comprises the steps that a door lock server receives an identifier of an SIM card installed in terminal equipment and sent by a door lock, and a binding mobile phone number corresponding to a user identifier carried in an unlocking request sent to the door lock by the terminal equipment;
and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number, so that the door lock executes unlocking action according to the unlocking instruction.
In a twelfth aspect, an embodiment of the present application provides a terminal device, where the terminal device includes:
the first sending unit is used for sending an unlocking request to the door lock, wherein the unlocking request carries a user identifier;
an obtaining unit, configured to obtain an identifier of an SIM card installed in the terminal device;
and the second sending unit is used for sending the identifier of the SIM card to the door lock so that the door lock can send the identifier of the SIM card and the binding mobile phone number corresponding to the user identifier to a door lock server, and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
In a thirteenth aspect, an embodiment of the present application provides a door lock, including:
the first receiving unit is used for receiving an unlocking request sent by the terminal equipment, wherein the unlocking request carries a user identifier;
the determining unit is used for determining the binding mobile phone number corresponding to the user identifier when the door lock determines that the user corresponding to the user identifier has unlocking right on the door lock;
the second receiving unit is used for receiving the identifier of the SIM card installed in the terminal equipment, which is sent by the terminal equipment, by the door lock;
the sending unit is used for sending the identification of the SIM card and the binding mobile phone number to a door lock server;
the third receiving unit is used for receiving an unlocking instruction sent by the door lock server and executing unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock by the door lock server when the corresponding mobile phone number of the SIM card is determined to be consistent with the binding mobile phone number.
In a fourteenth aspect, an embodiment of the present application provides a door lock server, where the door lock server includes:
the receiving unit is used for receiving the identifier of the SIM card installed in the terminal equipment and sent by the door lock and the binding mobile phone number corresponding to the user identifier carried in the unlocking request sent by the terminal equipment to the door lock;
and the sending unit is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number, so that the door lock can execute unlocking action according to the unlocking instruction.
Compared with the prior art, the embodiment of the application has the following advantages:
the embodiment of the application provides an unlocking system which comprises terminal equipment, a door lock and a door lock server. And the terminal equipment is used for sending an unlocking request to the door lock, wherein the unlocking request carries the user identification. And the door lock is used for determining the binding mobile phone number corresponding to the user identification and sending the binding mobile phone number to the terminal equipment when the user corresponding to the user identification is determined to have the unlocking right of the door lock. The terminal equipment can also acquire an identifier of an SIM card installed in the terminal equipment, and sends the identifier of the SIM card and the received binding mobile phone number to the door lock server. And the door lock server is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number. After the door lock receives the unlocking instruction, the unlocking action can be executed according to the unlocking instruction. Therefore, by using the unlocking system provided by the embodiment of the application, whether the user corresponding to the user identifier carried in the unlocking request has the unlocking authority of the door lock is verified, and then whether the user who uses the terminal equipment to initiate the unlocking request is a legal user having the unlocking authority of the door lock is verified, so that the unlocking safety is ensured. Moreover, compared with the traditional door lock using the password, the user does not need to remember the unlocking password, unlocking can be achieved by using the terminal equipment, and the operation mode is simple and convenient.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic structural diagram of an unlocking system provided in an embodiment of the present application;
fig. 2 is a signaling interaction diagram of an unlocking method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a door lock according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a door lock server according to an embodiment of the present application
Fig. 6 is a signaling interaction diagram of another unlocking method provided in the embodiment of the present application;
fig. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a door lock according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a door lock server according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The inventor of the application discovers through research that in the prior art, the door lock using the password needs the user to remember the preset unlocking password, and when the door is unlocked, the user needs to manually input the remembered password to unlock the door, so that the operation is troublesome.
In view of this, this application embodiment provides an unlocking system, and the user need not remember the password of unblanking, utilizes terminal equipment can realize unblanking, and the operating mode is simple convenient.
Various non-limiting embodiments of the present application are described in detail below with reference to the accompanying drawings.
Referring to fig. 1, the structure of the unlocking system provided in the embodiment of the present application is schematically shown.
The unlocking system provided by the embodiment of the application comprises a terminal device 100, a door lock 200 and a door lock server 300. The terminal device 100 provided in the embodiment of the present application may be, for example, a mobile terminal device such as a smart phone and a tablet computer. The door lock 200 mentioned in the embodiment of the present application may be a door lock having a communication function, and a functional module providing the communication function may be built in the door lock. The door lock server 300 mentioned in the embodiment of the present application may be a dedicated door lock server specially configured for the unlocking function provided in the embodiment of the present application, or may be a door lock server with other data processing functions, and the embodiment of the present application is not particularly limited.
In the embodiment of the present application, the terminal device 100 and the door lock 200 may communicate with each other through bluetooth, a wireless network, or the like.
An unlocking method applied to the unlocking system shown in fig. 1 will be described below with reference to fig. 2. Referring to fig. 2, this figure is a signaling interaction diagram of an unlocking method provided in the embodiment of the present application.
The unlocking method shown in fig. 2 may be realized, for example, by steps S101 to S107 as follows.
It should be noted that the terminal device shown in fig. 2 may be the terminal device 100 shown in fig. 1; the door lock shown in fig. 2 may be the door lock 200 shown in fig. 1; the door lock server shown in fig. 2 may be the door lock server 300 shown in fig. 1.
S101: and the terminal equipment sends an unlocking request to the door lock, wherein the unlocking request carries the user identification.
In this embodiment, the terminal device may first establish a communication connection with the door lock, and then send an unlocking request to the door lock. For example, when the user is closer to the door lock, the terminal device may be controlled to establish bluetooth connection with the door lock, and then the terminal device sends an unlocking request to the door lock through bluetooth communication. For another example, the terminal device may establish a connection with the door lock through a wireless network, and then the terminal device sends an unlocking request to the door lock through the wireless network.
In this embodiment, the terminal device sends an unlocking request to the door lock, which may be triggered by a user. Specifically, the user can trigger a corresponding unlocking operation on the terminal device, and the terminal device responds to the unlocking operation triggered by the user, generates the unlocking request, and sends the unlocking request to the door lock.
The embodiment of the present application does not specifically limit a specific implementation manner in which the user triggers the unlocking operation on the terminal device. As an example, an unlocking application may be installed on the terminal device, and a user may log in a corresponding account on the unlocking application, and then trigger a corresponding unlocking operation on a preset interface displayed by the unlocking application, so that the terminal device generates the unlocking request based on the unlocking operation. The preset interface is not specifically limited in the embodiment of the application, and the preset interface may be a certain interface displayed by the unlocking application program. The embodiment of the present application also does not specifically limit the unlocking operation, and the unlocking operation may be, for example, a user clicking a certain function button displayed on the preset interface.
It should be noted that, in the embodiment of the present application, the unlocking request carries a user identifier. In this embodiment, the user identifier may be used to identify a user identity using the terminal device. In an implementation manner of the embodiment of the present application, if the unlocking request is generated by the terminal device based on an unlocking operation triggered by a user on an unlocking application installed on the terminal device, the user identifier may be embodied as a user identifier corresponding to an account corresponding to the unlocking application. The embodiment of the present application does not specifically limit the user identifier corresponding to the account corresponding to the unlocking application, and as an example, the user identifier corresponding to the account corresponding to the unlocking application may be, for example, an account ID (identity) which is an identification number of the account corresponding to the account.
S102: and when the door lock determines that the user corresponding to the user identification has the unlocking right for the door lock, determining the binding mobile phone number corresponding to the user identification.
It is understood that in practical applications, not all users have the right to unlock the door lock. Therefore, in the embodiment of the present application, after the door lock receives the unlocking request, it is first determined whether the user corresponding to the user identifier has the unlocking authority for the door lock.
In the embodiment of the application, the door lock can determine whether the user corresponding to the user identifier carried in the unlocking request has the unlocking authority for the door lock according to the legal user identifier having the unlocking authority for the door lock and the user identifier carried in the unlocking request. In practical application, one door lock can correspond to a plurality of users with unlocking authority, one user can also correspond to a plurality of door locks, and the user identification can bind the user and the door lock to determine the mapping relation between the user and the door lock.
The embodiment of the present application does not specifically limit a specific implementation manner of determining, by a door lock, whether a user corresponding to a user identifier carried in an unlocking request has an unlocking right for the door lock, and as an example, the door lock may determine an identifier of the door lock, that is, an identifier of the door lock, and determine whether a mapping relationship exists between the identifier of the door lock and the user identifier carried in the unlocking request, and if a mapping relationship exists between the identifier of the door lock and the user identifier carried in the unlocking request, it indicates that the user identifier carried in the unlocking request is a legal user identifier having the unlocking right for the door lock, so the door lock may determine that the user corresponding to the user identifier has the unlocking right for the door lock.
It should be noted that the mapping relationship between the identifier of the door lock and the user identifier may be stored in the door lock, or may be stored in a door lock server, and the embodiment of the present application is not specifically limited. If the mapping relation is stored in the door lock, the door lock can search the mapping relation stored by the door lock, so that whether the mapping relation between the identification of the door lock and the user identification exists or not is determined. If the mapping relationship is stored in the door lock server, the door lock may send a mapping relationship query request to the door lock server, and request the door lock server to determine whether the mapping relationship between the identifier of the door lock and the user identifier exists.
In the embodiment of the present application, it is considered that, in practical application, a user corresponding to the user identifier has an unlocking right for the door lock, and does not necessarily indicate that a user currently using the terminal device to initiate an unlocking request is a valid user having an unlocking right for the door lock. For example, the unauthorized user steals the unlocking application account of the legitimate user, and logs in the unlocking application account of the legitimate application by using the unlocking application installed on the terminal device of the unauthorized user. In this case, although the door lock determines that the user corresponding to the user identifier carried in the unlocking request has the unlocking authority for the door lock, the user who actually initiates the unlocking request using the terminal device is not a legitimate user who has the unlocking authority for the door lock.
In view of this, in the embodiment of the present application, the identity of the user who currently initiates the unlocking request by using the terminal device may be further verified, so as to determine whether to perform the unlocking operation.
In the embodiment of the application, the identity of a user using the terminal equipment can be represented to a certain extent by considering the mobile phone number of the SIM card installed in the terminal equipment. Therefore, in the embodiment of the application, the identity of the user who uses the terminal equipment to initiate the unlocking request can be verified by using the mobile phone number corresponding to the SIM card installed in the terminal equipment.
In the embodiment of the application, when the unlocking right of the door lock is initially given to the user corresponding to the user identifier, the identifier of the door lock, the user identifier and the mobile phone number of the user can be bound. Namely, the mapping relation among the identification of the door lock, the user identification and the mobile phone number of the user is saved. For convenience of description, the mobile phone number of the user included in the mapping relationship is referred to as a "bound mobile phone number". It can be understood that the mapping relationship between the identifier of the door lock and the user identifier may be regarded as a part of the mapping relationship between the identifier of the door lock, the user identifier, and the bound mobile phone number. Because the mapping relationship among the identifier of the door lock, the user identifier and the bound mobile phone number actually comprises three pairs of mapping relationships, which are respectively: the mapping relation between the identification of the door lock and the user identification, the mapping relation between the identification of the door lock and the binding mobile phone number, and the mapping relation between the user identification and the binding mobile phone number.
In the embodiment of the application, when the door lock determines that the user corresponding to the user identifier has the unlocking right for the door lock, a bound mobile phone number corresponding to the user identifier can be further determined, so that the identity of the user who currently uses the terminal device to initiate the unlocking request can be verified by using the bound mobile phone number and a mobile phone number corresponding to an SIM card installed in the terminal device.
In the embodiment of the application, the door lock can determine the bound mobile phone number corresponding to the user identifier according to the mapping relation between the user identifier and the bound mobile phone number. The mapping relationship between the user identifier and the bound mobile phone number can be stored in the door lock or in a door lock server, and the embodiment of the application is not particularly limited. If the mapping relation is stored in the door lock, the door lock can search the mapping relation stored by the door lock, so that the bound mobile phone number is determined. If the mapping relation is stored in the door lock server, the door lock can send a binding mobile phone number query request to the door lock server to request the door lock server to determine the binding mobile phone number.
S103: and the door lock sends the binding mobile phone number to the terminal equipment.
S104: and the terminal equipment acquires the identifier of the SIM card installed in the terminal equipment.
In the embodiment of the application, the terminal equipment can acquire the identifier of the SIM card installed in the terminal equipment, so that the identity of the user who uses the terminal equipment to initiate the unlocking request at present is further verified according to the acquired identifier of the SIM card and the binding mobile phone number.
In the embodiment of the application, the identifier of the SIM card can be used to uniquely identify the SIM card, and the mobile phone number corresponding to the SIM card can be determined by using the identifier of the SIM card. The identifier of the SIM card is not specifically limited in the embodiments of the present application, and the identifier of the SIM card may be, for example, an authorization token corresponding to the SIM card.
It should be noted that, in the embodiment of the present application, a specific implementation manner of a terminal device acquiring an identifier of a SIM card installed in the terminal device is not specifically limited. As an example, the unlocking system provided by the embodiment of the present application may further include an operator server in addition to the terminal device, the door lock, and the door lock server. The terminal device may obtain, from the operator server, an identity of a SIM card installed in the terminal device. Specifically, the terminal device may call a preset interface, send an SIM card identifier acquisition request to the operator server through the preset interface, and receive the identifier of the SIM card sent by the operator server. The preset interface is not specifically limited in the embodiment of the present application, and the preset interface may be, for example, a token interface provided by an operator.
It should be noted that in the embodiment of the present application, S104 does not necessarily need to be executed after S103, and S104 may also be executed between S101 and S103, and S104 may even be executed simultaneously with S101.
S105: and the terminal equipment sends the identification of the SIM card and the bound mobile phone number to a door lock server.
S106: and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
S107: and the door lock executes unlocking action according to the unlocking instruction.
And after the terminal equipment acquires the identifier of the SIM card and receives the bound mobile phone number sent by the door lock, the terminal equipment sends the identifier of the SIM card and the bound mobile phone number to a door lock server. And determining whether the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number by the door lock server. And when the door lock server determines that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number, the user who uses the terminal equipment to initiate an unlocking request currently is a legal user with the unlocking authority of the door lock. Therefore, the door lock server can send an unlocking instruction to the door lock, and the door lock executes unlocking action after receiving the unlocking instruction, so that the unlocking purpose is achieved. And when the door lock server determines that the mobile phone number corresponding to the SIM card is inconsistent with the bound mobile phone number, the door lock server indicates that the user currently utilizing the terminal equipment to initiate an unlocking request may not be a legal user with the unlocking authority of the door lock. Therefore, the door lock server can not send an unlocking instruction to the door lock, so that certain loss of a legal user with the unlocking authority of the door lock is avoided.
In this embodiment of the application, it is not specifically limited that the door lock server determines that the mobile phone number corresponding to the SIM card is consistent with the specific implementation manner of the binding of the mobile phone number, and as an example, the door lock server may determine the mobile phone number corresponding to the SIM card identifier, and then determine whether the mobile phone number corresponding to the SIM card identifier is consistent with the binding of the mobile phone number. The embodiment of the application does not specifically limit the implementation manner of the door lock server according to the identification of the SIM card determines the mobile phone number corresponding to the SIM card, as an example, the door lock server can store the identification of the SIM card and the mapping relation between the mobile phone numbers corresponding to the SIM card, so that the door lock server can determine the mobile phone number corresponding to the identification of the SIM card according to the identification of the SIM card and the mapping relation between the mobile phone numbers corresponding to the SIM card. As another example, the door lock server may determine, by means of an operator server, a mobile phone number corresponding to the identity of the SIM card. For example, the door lock server sends a mobile phone number acquisition request to an operator server, wherein the mobile phone number acquisition request carries the identifier of the SIM card, and receives the mobile phone number returned by the operator server, so as to determine the mobile phone number corresponding to the identifier of the SIM card.
As another example, the operator server may verify whether a mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number, and then send a verification result to the door lock server. Specifically, the door lock server may send an authentication request to the operator server, where the authentication request includes an identifier of the SIM card and the bound mobile phone number. And after receiving the verification request, the operator server further determines the mobile phone number corresponding to the SIM card identifier, and determines that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number. And after the operator server determines that the mobile phone number corresponding to the SIM card identification is consistent with the bound mobile phone number, the operator server sends a verification result indicating that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number to the door lock server.
As can be seen from the above description, with the unlocking system provided in the embodiment of the present application, it is first verified whether the user corresponding to the user identifier carried in the unlocking request has the unlocking authority of the door lock, and then verified whether the user currently using the terminal device to initiate the unlocking request is a legitimate user having the unlocking authority of the door lock, so that the unlocking security is ensured. Moreover, the user does not need to remember the unlocking password in the whole unlocking process, unlocking can be achieved by utilizing the terminal equipment, and the user operation is simple and convenient.
In order to enable a user to determine an unlocking result corresponding to the unlocking request through the terminal device, in an implementation manner of the application embodiment, the door lock server may further send an unlocking success message to the terminal device after sending the unlocking instruction to the door lock; and when the door lock server determines that the mobile phone number corresponding to the SIM card is inconsistent with the bound mobile phone number, the door lock server can also send an unlocking failure message to the terminal equipment. After receiving the unlocking success message or the unlocking failure message, the door lock can display the unlocking success message or the unlocking failure message, so that a user determines a corresponding unlocking result according to the content displayed by the terminal device, and can also inform an indicator lamp or a player at the door lock end of success or failure prompt, for example, when the unlocking is successful, the indicator lamp at the door lock end is green, the player is a short prompt tone, when the unlocking is failed, the indicator lamp at the door lock end is red, and the player is a long prompt tone.
In another implementation manner of the embodiment of the present application, the door lock may also send the unlocking success message or the unlocking failure message to the terminal device. Specifically, after the door lock performs the unlocking action, an unlocking success message may be sent to the terminal device. If the terminal device does not execute the unlocking action within the preset time after receiving the unlocking request, the unlocking failure is indicated, and at the moment, the door lock can send an unlocking failure message to the terminal device. After receiving the unlocking success message or the unlocking failure message, the door lock can display the unlocking success message or the unlocking failure message, so that a user can determine a corresponding unlocking result according to the content displayed by the terminal equipment. It will be appreciated that the unlocking result obtained from the door lock is the most direct and accurate result, since the door lock is the performer of the unlocking action. Therefore, the mode that the door lock sends the unlocking success message or the unlocking failure message to the terminal equipment is adopted, so that a user can obtain a more accurate unlocking result, and the user experience is improved.
The embodiment of the application does not specifically limit the preset time, and the preset time can be determined according to time consumed by the door lock server for verifying whether the bound mobile phone number is consistent with the mobile phone number corresponding to the SIM card or not and time for the door lock server to send an unlocking instruction to the door lock. Considering that the calculation performance of the door lock server is not very low in general, the preset time may be a relatively small value, such as 10 seconds, 15 seconds, and the like, and of course, 10 seconds and 15 seconds are only shown for convenience of understanding and do not constitute a limitation on the embodiment of the present application.
As described above, in the embodiment of the present application, when a user corresponding to the user identifier is initially given an unlocking right to the door lock, the identifier of the door lock, the user identifier, and the mobile phone number of the user (that is, the binding mobile phone number) may be bound. The specific process of binding the identifier of the door lock, the user identifier and the binding mobile phone number is described in detail herein.
In this embodiment of the application, the user identifier corresponding to the account of the unlocking application program may include two types, where one type is an administrator user identifier, and the other type is a general user identifier. The account corresponding to the administrator user identifier may be user registered, and the account of the common user is allocated to the administrator user.
When the user identifier is an administrator user identifier, the mapping relationship among the user identifier, the door lock identifier and the binding mobile phone number may be, for example, when a user registers an account by using an unlocking application installed on a terminal device, the user identifier, the door lock identifier and the binding mobile phone number are bound. Specifically, a user may trigger an account registration operation on a terminal device, and the terminal device sends an account registration request to a door lock server based on the account registration operation, where the registration request includes the user identifier, the bound mobile phone number, and the identifier of the door lock. The door lock server stores the mapping relation among the user identification, the binding mobile phone number and the identification of the door lock according to the registration request, and can simultaneously send the mapping relation to a door lock end for storage.
When the user identifier is a common user identifier, the mapping relationship among the user identifier, the door lock identifier and the binding mobile phone number may be, for example, when a user corresponding to the administrator user identifier uses an unlocking application installed on the terminal device to allocate an account for the user corresponding to the user identifier, the door lock identifier and the binding mobile phone number are bound. Specifically, a user corresponding to the administrator user identifier may trigger a common account opening operation on the terminal device, and the terminal device sends a common account opening request to the door lock server based on the common account opening operation, where the common account opening request includes the user identifier, the bound mobile phone number, and the identifier of the door lock. And the door lock server saves the mapping relation among the user identification, the binding mobile phone number and the identification of the door lock according to the common account opening request. Correspondingly, the door lock server can also store the mapping relation between the administrator user identification and the user identification so as to verify the identity of the administrator user when the subsequent administrator user logs out the account corresponding to the user identification, and the door lock server can simultaneously send the mapping relation to the door lock end for storage.
Based on the unlocking method shown in fig. 2, the embodiment of the present application further provides an unlocking method applied to a terminal device, wherein the terminal device can be used to perform the following steps a 1-A3.
A1, the terminal equipment sends an unlocking request to the door lock, wherein the unlocking request carries the user identification.
A2, the terminal equipment receives the binding mobile phone number which is sent by the door lock and corresponds to the user identification.
A3: the terminal equipment acquires an identifier of an SIM card installed in the terminal equipment, and sends the identifier of the SIM card and the binding mobile phone number to the door lock server, so that the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
Based on the unlocking method shown in fig. 2, the embodiment of the application also provides an unlocking method applied to the door lock, wherein the door lock can be used for executing the following steps B1-B3.
B1: the method comprises the steps that a door lock receives an unlocking request sent by terminal equipment, and the unlocking request carries a user identification.
B2: and when the door lock determines that the user corresponding to the user identification has the unlocking right for the door lock, determining a bound mobile phone number corresponding to the user identification, and sending the bound mobile phone number to the terminal equipment.
B3: the door lock receives an unlocking instruction sent by the door lock server, and executes an unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock server by the terminal equipment through the identification of the SIM card and the binding mobile phone number, and the door lock server sends the unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number.
Based on the unlocking method shown in fig. 2, the embodiment of the present application further provides an unlocking method applied to a door lock server, wherein the door lock server can be used to execute the following steps C1-C2.
C1: and the door lock server receives the identifier of the SIM card installed in the terminal equipment and sent by the terminal equipment and the binding mobile phone number corresponding to the user identifier carried in the unlocking request sent to the door lock by the terminal equipment.
C2: and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number, so that the door lock executes unlocking action according to the unlocking instruction.
It should be noted that, regarding the descriptions of the steps a1-A3, B1-B3 and C1-C2, reference may be made to the previous description of S101-S107, and details thereof are not described here.
Based on the unlocking method shown in fig. 2, the embodiment of the application also provides a terminal device. Referring to fig. 3, the figure is a schematic structural diagram of a terminal device according to an embodiment of the present application.
The terminal device 300 provided in the embodiment of the present application may include, for example, a first sending unit 301, a receiving unit 302, an obtaining unit 303, and a second sending unit 304.
A first sending unit 301, configured to send an unlocking request to a door lock, where the unlocking request carries a user identifier;
a receiving unit 302, configured to receive a binding mobile phone number corresponding to the user identifier and sent by the door lock;
an obtaining unit 303, configured to obtain an identifier of a SIM card installed in the terminal device;
a second sending unit 304, configured to send the identifier of the SIM card and the bound mobile phone number to the door lock server, so that the door lock server sends an unlocking instruction to the door lock when it is determined that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number.
Since the specific implementation of each unit of the terminal device 300 belongs to the same concept as the steps executed by the terminal device in the foregoing S101-S107, with regard to the specific implementation of each unit of the terminal device 300, reference may be made to the description part of the relevant content in the foregoing S101-S107, and details will not be described here.
Based on the unlocking method shown in fig. 2, the embodiment of the application also provides a door lock. Referring to fig. 4, the drawing is a schematic structural diagram of a door lock provided in an embodiment of the present application.
The door lock 400 provided in the embodiment of the present application may include, for example: a first receiving unit 401, a determining unit 402, a transmitting unit 403 and a second receiving unit 404.
A first receiving unit 401, configured to receive an unlocking request sent by a terminal device, where the unlocking request carries a user identifier;
a determining unit 402, configured to determine, when it is determined that a user corresponding to the user identifier has an unlocking right for the door lock, a binding mobile phone number corresponding to the user identifier;
a sending unit 403, configured to send the bound mobile phone number to the terminal device;
a second receiving unit 404, configured to receive an unlocking instruction sent by the door lock server, and execute an unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock server by the terminal equipment through the identification of the SIM card and the binding mobile phone number, and the door lock server sends the unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number.
Since the specific implementation of each unit of the door lock 400 is the same concept as the steps performed by the door lock in the foregoing S101-S107, reference may be made to the description part related to the foregoing S101-S107 for the specific implementation of each unit of the door lock 400, and details will not be described here.
Based on the unlocking method shown in fig. 2, the embodiment of the application also provides a door lock server. Referring to fig. 5, this figure is a schematic structural diagram of a door lock server according to an embodiment of the present application.
The door lock server 500 provided in the embodiment of the present application may include, for example: a receiving unit 501 and a transmitting unit 502.
A receiving unit 501, configured to receive an identifier of an SIM card installed in a terminal device and a binding mobile phone number corresponding to a user identifier carried in an unlocking request sent to a door lock by the terminal device, where the identifier is sent by the terminal device;
a sending unit 502, configured to send an unlocking instruction to the door lock when it is determined that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number, so that the door lock executes an unlocking action according to the unlocking instruction.
Since the specific implementation of each unit of the door lock server 500 belongs to the same concept as the steps executed by the door lock server in the foregoing S101-S107, with regard to the specific implementation of each unit of the door lock server 500, reference may be made to the description part of the relevant contents in the foregoing S101-S107, and details will not be described here.
Referring to fig. 6, this figure is a signaling interaction diagram of another unlocking method provided in the embodiment of the present application.
The unlocking method shown in fig. 6 may be implemented, for example, by steps S201 to S207.
S201: and the terminal equipment sends an unlocking request to the door lock, wherein the unlocking request carries the user identification.
S202: and when the door lock determines that the user corresponding to the user identification has the unlocking right for the door lock, determining the binding mobile phone number corresponding to the user identification.
S203: and the terminal equipment acquires the identifier of the SIM card installed in the terminal equipment.
S204: and the terminal equipment sends the identifier of the SIM card to the door lock.
S205: and the door lock sends the identification of the SIM card and the bound mobile phone number to a door lock server.
S206: and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
S207: and the door lock executes unlocking action according to the unlocking instruction.
Optionally, the door lock determines that the user corresponding to the user identifier has the unlocking authority for the door lock by the following method:
and the door lock determines the identifier of the door lock, and determines that a mapping relation exists between the identifier of the door lock and the user identifier, and then determines that the user corresponding to the user identifier has the unlocking authority for the door lock.
Optionally, the terminal device is further configured to:
and receiving unlocking operation triggered by a user on a preset interface displayed by an unlocking application program installed on the terminal equipment, and generating the unlocking request.
Optionally, the user identifier includes a user identifier corresponding to an account corresponding to the unlocking application program.
Optionally, the system further comprises an operator server;
the terminal equipment acquires the identifier of the SIM card installed in the terminal equipment, and the method comprises the following steps:
and the terminal equipment sends an SIM card identification acquisition request to the operator server and receives the identification of the SIM card sent by the operator server.
Optionally, the determining, by the door lock server, that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number includes:
the door lock server sends a verification request to the operator server, wherein the verification request comprises the identification of the SIM card and the bound mobile phone number;
the operator server determines a mobile phone number corresponding to the SIM card identifier, and determines that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number;
and the operator server sends a verification result indicating that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number to the door lock server.
Optionally, the door lock is further configured to: after the unlocking action is executed, an unlocking success message is sent to the terminal equipment;
and the door lock is also used for sending an unlocking failure message to the terminal equipment if the unlocking action is not executed within the preset time after the unlocking request is received.
It should be noted that the general flow of S201-S207 is the same as S101-S107, except that the unlocking method shown in S101-S107 is that the door lock sends the bound mobile phone number to the terminal device, and the terminal device sends the identifier of the SIM card and the bound mobile phone number to the door lock server. And the unlocking method shown in S201-S207 is that the terminal equipment sends the identifier of the SIM card to the door lock, and the door lock sends the identifier of the SIM card and the binding mobile phone number to the door lock server. However, the steps executed by the terminal equipment in S201-S207 to acquire the identity of the SIM card, the door lock acquisition binding phone number, and the door lock server are consistent with the specific implementation of the relevant steps in S101-S107. Therefore, for the description of the steps of S201 to S207, reference may be made to the description of S101 to S107, and the detailed description is omitted here.
Based on the unlocking method shown in fig. 6, the embodiment of the present application further provides an unlocking method applied to a terminal device, wherein the terminal device can be used to perform the following steps D1-D2.
D1: and the terminal equipment sends an unlocking request to the door lock, wherein the unlocking request carries the user identification.
D2: the terminal equipment acquires an identifier of an SIM card installed in the terminal equipment, and sends the identifier of the SIM card to the door lock, so that the door lock sends the identifier of the SIM card and a binding mobile phone number corresponding to the user identifier to a door lock server, and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
Based on the unlocking method shown in fig. 6, the embodiment of the present application further provides an unlocking method applied to a door lock, wherein the door lock can be used for executing the following steps E1-E4.
E1: the method comprises the steps that a door lock receives an unlocking request sent by terminal equipment, and the unlocking request carries a user identification.
E2: and when the door lock determines that the user corresponding to the user identification has the unlocking right for the door lock, determining the binding mobile phone number corresponding to the user identification.
E3: and the door lock receives the SIM card identification which is sent by the terminal equipment and is installed in the terminal equipment, and sends the SIM card identification and the binding mobile phone number to a door lock server.
E4: the door lock receives an unlocking instruction sent by the door lock server, and executes an unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock by the door lock server when the corresponding mobile phone number of the SIM card is determined to be consistent with the binding mobile phone number.
Based on the unlocking method shown in fig. 6, the embodiment of the present application further provides an unlocking method applied to a door lock server, wherein the door lock server can be used to execute the following steps F1-F2.
F1: and the door lock server receives the identifier of the SIM card installed in the terminal equipment and sent by the door lock and the binding mobile phone number corresponding to the user identifier carried in the unlocking request sent to the door lock by the terminal equipment.
F2: and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number, so that the door lock executes unlocking action according to the unlocking instruction.
It should be noted that, regarding the descriptions of the steps D1-D2, E1-E4, and F1-F2, reference may be made to the previous description of the steps S201-S207, and details thereof are not described here.
Based on the unlocking method shown in fig. 6, the embodiment of the application also provides a terminal device. Referring to fig. 7, the figure is a schematic structural diagram of a terminal device according to an embodiment of the present application.
The terminal device 700 shown in fig. 7 may include, for example: a first sending unit 701, an acquiring unit 702 and a second sending unit 703.
A first sending unit 701, configured to send an unlocking request to a door lock, where the unlocking request carries a user identifier;
an obtaining unit 702, configured to obtain an identifier of a SIM card installed in the terminal device;
a second sending unit 703, configured to send the identifier of the SIM card to the door lock, so that the door lock sends the identifier of the SIM card and the bound mobile phone number corresponding to the user identifier to a door lock server, and the door lock server sends an unlocking instruction to the door lock when it is determined that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number.
Since the specific implementation of each unit of the terminal device 700 is the same concept as the steps performed by the terminal device in S201-S207, reference may be made to the description part of the relevant contents in S201-S207 for the specific implementation of each unit of the terminal device 700, and details will not be described here.
Based on the unlocking method shown in fig. 6, the embodiment of the application also provides a door lock. Referring to fig. 8, the drawing is a schematic structural diagram of a door lock provided in an embodiment of the present application.
The door lock 800 shown in fig. 8 may include, for example, a first receiving unit 801, a determining unit 802, a second receiving unit 803, a transmitting unit 804, and a third receiving unit 805.
A first receiving unit 801, configured to receive an unlocking request sent by a terminal device, where the unlocking request carries a user identifier;
a determining unit 802, configured to determine, by the door lock, a binding mobile phone number corresponding to the user identifier when it is determined that the user corresponding to the user identifier has the unlocking right for the door lock;
a second receiving unit 803, configured to receive, by the door lock, an identifier of a SIM card installed in the terminal device, where the identifier is sent by the terminal device;
a sending unit 804, configured to send the identifier of the SIM card and the bound mobile phone number to a door lock server;
a third receiving unit 805, configured to receive an unlocking instruction sent by the door lock server, and execute an unlocking operation based on the unlocking instruction; and the unlocking instruction is sent to the door lock by the door lock server when the corresponding mobile phone number of the SIM card is determined to be consistent with the binding mobile phone number.
Since the specific implementation of each unit of the door lock 800 belongs to the same concept as the steps performed by the door lock in the foregoing S201-S207, reference may be made to the description part related to the foregoing S201-S207 for the specific implementation of each unit of the door lock 800, and details will not be described here.
Based on the unlocking method shown in fig. 6, the embodiment of the application also provides a door lock server. Referring to fig. 9, this figure is a schematic structural diagram of a door lock server according to an embodiment of the present application.
Fig. 9 shows a door lock server 900. Examples may include: a receiving unit 901 and a transmitting unit 902.
A receiving unit 901, configured to receive an identifier of a SIM card installed in a terminal device and a binding mobile phone number corresponding to a user identifier carried in an unlocking request sent to a door lock by the terminal device;
and the sending unit 903 is configured to send an unlocking instruction to the door lock when it is determined that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number, so that the door lock executes an unlocking action according to the unlocking instruction.
Since the specific implementation of each unit of the door lock server 900 belongs to the same concept as the steps executed by the door lock server in the foregoing S201-S207, with respect to the specific implementation of each unit of the door lock server 900, reference may be made to the description part of the related contents in the foregoing S201-S207, and details will not be described here.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice in the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the attached claims
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (26)

1. An unlocking system, characterized in that it comprises: the system comprises terminal equipment, a door lock and a door lock server;
the terminal equipment is used for sending an unlocking request to the door lock, and the unlocking request carries a user identifier;
the door lock is used for determining a binding mobile phone number corresponding to the user identifier and sending the binding mobile phone number to the terminal equipment when the user corresponding to the user identifier is determined to have unlocking right for the door lock;
the terminal equipment is also used for acquiring an identifier of an SIM card installed in the terminal equipment and sending the identifier of the SIM card and the binding mobile phone number to the door lock server;
the door lock server is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number;
the door lock is used for executing unlocking action according to the unlocking instruction.
2. The system of claim 1, wherein the door lock determines that the user corresponding to the user identifier has the unlocking right for the door lock by:
and the door lock determines the identifier of the door lock, and determines that a mapping relation exists between the identifier of the door lock and the user identifier, and then determines that the user corresponding to the user identifier has the unlocking authority for the door lock.
3. The system of claim 1, wherein the terminal device is further configured to:
and receiving unlocking operation triggered by a user on a preset interface displayed by an unlocking application program installed on the terminal equipment, and generating the unlocking request.
4. The system of claim 3, wherein the user identifier comprises a user identifier corresponding to an account corresponding to the unlocking application.
5. The system according to any one of claims 1-4, wherein the system further comprises an operator server;
the terminal equipment acquires the identifier of the SIM card installed in the terminal equipment, and the method comprises the following steps:
and the terminal equipment sends an SIM card identification acquisition request to the operator server and receives the identification of the SIM card sent by the operator server.
6. The system of claim 5, wherein the door lock server determining that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number comprises:
the door lock server sends a verification request to the operator server, wherein the verification request comprises the identification of the SIM card and the bound mobile phone number;
the operator server determines a mobile phone number corresponding to the SIM card identifier, and determines that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number;
and the operator server sends a verification result indicating that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number to the door lock server.
7. The system according to any one of claims 1 to 4,
the door lock is further configured to: after the unlocking action is executed, an unlocking success message is sent to the terminal equipment; and/or the presence of a gas in the gas,
and the door lock is also used for sending an unlocking failure message to the terminal equipment if the unlocking action is not executed within the preset time after the unlocking request is received.
8. A method of unlocking, the method comprising:
the method comprises the steps that terminal equipment sends an unlocking request to a door lock, wherein the unlocking request carries a user identifier;
the terminal equipment receives a binding mobile phone number which is sent by the door lock and corresponds to the user identification;
the terminal equipment acquires an identifier of an SIM card installed in the terminal equipment, and sends the identifier of the SIM card and the binding mobile phone number to a door lock server, so that the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
9. A method of unlocking, the method comprising:
the method comprises the steps that a door lock receives an unlocking request sent by terminal equipment, wherein the unlocking request carries a user identifier;
when the door lock determines that the user corresponding to the user identification has unlocking right for the door lock, determining a binding mobile phone number corresponding to the user identification, and sending the binding mobile phone number to the terminal equipment;
the door lock receives an unlocking instruction sent by a door lock server, and executes an unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock server by the terminal equipment through the identification of the SIM card and the binding mobile phone number, and the door lock server sends the unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number.
10. A method of unlocking, the method comprising:
the method comprises the steps that a door lock server receives an identifier of an SIM card installed in a terminal device and sent by the terminal device, and a binding mobile phone number corresponding to a user identifier carried in an unlocking request sent to a door lock by the terminal device;
and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number, so that the door lock executes unlocking action according to the unlocking instruction.
11. A terminal device, characterized in that the terminal device comprises:
the first sending unit is used for sending an unlocking request to the door lock, wherein the unlocking request carries a user identifier;
the receiving unit is used for receiving the binding mobile phone number which is sent by the door lock and corresponds to the user identification;
an obtaining unit, configured to obtain an identifier of an SIM card installed in the terminal device;
and the second sending unit is used for sending the identifier of the SIM card and the bound mobile phone number to a door lock server, so that the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number.
12. A door lock, characterized in that the door lock comprises:
the first receiving unit is used for receiving an unlocking request sent by the terminal equipment, wherein the unlocking request carries a user identifier;
the determining unit is used for determining a binding mobile phone number corresponding to the user identifier when determining that the user corresponding to the user identifier has unlocking right on the door lock;
a sending unit, configured to send the bound mobile phone number to the terminal device;
the second receiving unit is used for receiving an unlocking instruction sent by the door lock server and executing unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock server by the terminal equipment through the identification of the SIM card and the binding mobile phone number, and the door lock server sends the unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number.
13. A door lock server, characterized in that the door lock server comprises:
the receiving unit is used for receiving the identifier of the SIM card installed in the terminal equipment and sent by the terminal equipment and the binding mobile phone number corresponding to the user identifier carried in the unlocking request sent to the door lock by the terminal equipment;
and the sending unit is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number, so that the door lock can execute unlocking action according to the unlocking instruction.
14. An unlocking system, characterized in that it comprises: the system comprises terminal equipment, a door lock and a door lock server;
the terminal equipment is used for sending an unlocking request to the door lock, and the unlocking request carries a user identifier;
the door lock is used for determining a binding mobile phone number corresponding to the user identifier when the user corresponding to the user identifier is determined to have unlocking right for the door lock;
the terminal equipment is also used for acquiring an identifier of an SIM card installed in the terminal equipment and sending the identifier of the SIM card to the door lock;
the door lock is also used for sending the identification of the SIM card and the binding mobile phone number to the door lock server;
the door lock server is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number;
the door lock is used for executing unlocking action according to the unlocking instruction.
15. The system of claim 14, wherein the door lock determines that the user corresponding to the user identifier has the unlocking right for the door lock by:
and the door lock determines the identifier of the door lock, and determines that a mapping relation exists between the identifier of the door lock and the user identifier, and then determines that the user corresponding to the user identifier has the unlocking authority for the door lock.
16. The system of claim 14, wherein the terminal device is further configured to:
and receiving unlocking operation triggered by a user on a preset interface displayed by an unlocking application program installed on the terminal equipment, and generating the unlocking request.
17. The system of claim 16, wherein the user identifier comprises a user identifier corresponding to an account corresponding to the unlocking application.
18. The system according to any one of claims 14-17, wherein the system further comprises an operator server;
the terminal equipment acquires the identifier of the SIM card installed in the terminal equipment, and the method comprises the following steps:
and the terminal equipment sends an SIM card identification acquisition request to the operator server and receives the identification of the SIM card sent by the operator server.
19. The system of claim 18, wherein the door lock server determining that the phone number corresponding to the SIM card is consistent with the bound phone number comprises:
the door lock server sends a verification request to the operator server, wherein the verification request comprises the identification of the SIM card and the bound mobile phone number;
the operator server determines a mobile phone number corresponding to the SIM card identifier, and determines that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number;
and the operator server sends a verification result indicating that the mobile phone number corresponding to the SIM card is consistent with the bound mobile phone number to the door lock server.
20. The system of any one of claims 14-17, wherein the door lock is further configured to: after the unlocking action is executed, an unlocking success message is sent to the terminal equipment; and/or the presence of a gas in the gas,
and the door lock is also used for sending an unlocking failure message to the terminal equipment if the unlocking action is not executed within the preset time after the unlocking request is received.
21. A method of unlocking, the method comprising:
the method comprises the steps that terminal equipment sends an unlocking request to a door lock, wherein the unlocking request carries a user identifier;
the terminal equipment acquires an identifier of an SIM card installed in the terminal equipment, and sends the identifier of the SIM card to the door lock, so that the door lock sends the identifier of the SIM card and a binding mobile phone number corresponding to the user identifier to a door lock server, and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
22. A method of unlocking, the method comprising:
the method comprises the steps that a door lock receives an unlocking request sent by terminal equipment, wherein the unlocking request carries a user identifier;
when the door lock determines that the user corresponding to the user identification has unlocking right for the door lock, determining a binding mobile phone number corresponding to the user identification;
the door lock receives an identifier of an SIM card installed in the terminal equipment, which is sent by the terminal equipment, and sends the identifier of the SIM card and the binding mobile phone number to a door lock server;
the door lock receives an unlocking instruction sent by the door lock server, and executes an unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock by the door lock server when the corresponding mobile phone number of the SIM card is determined to be consistent with the binding mobile phone number.
23. A method of unlocking, the method comprising:
the method comprises the steps that a door lock server receives an identifier of an SIM card installed in terminal equipment and sent by a door lock, and a binding mobile phone number corresponding to a user identifier carried in an unlocking request sent to the door lock by the terminal equipment;
and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number, so that the door lock executes unlocking action according to the unlocking instruction.
24. A terminal device, characterized in that the terminal device comprises:
the first sending unit is used for sending an unlocking request to the door lock, wherein the unlocking request carries a user identifier;
an obtaining unit, configured to obtain an identifier of an SIM card installed in the terminal device;
and the second sending unit is used for sending the identifier of the SIM card to the door lock so that the door lock can send the identifier of the SIM card and the binding mobile phone number corresponding to the user identifier to a door lock server, and the door lock server sends an unlocking instruction to the door lock when determining that the mobile phone number corresponding to the SIM card is consistent with the binding mobile phone number.
25. A door lock, characterized in that the door lock comprises:
the first receiving unit is used for receiving an unlocking request sent by the terminal equipment, wherein the unlocking request carries a user identifier;
the determining unit is used for determining the binding mobile phone number corresponding to the user identifier when the door lock determines that the user corresponding to the user identifier has unlocking right on the door lock;
the second receiving unit is used for receiving the identifier of the SIM card installed in the terminal equipment, which is sent by the terminal equipment, by the door lock;
the sending unit is used for sending the identification of the SIM card and the binding mobile phone number to a door lock server;
the third receiving unit is used for receiving an unlocking instruction sent by the door lock server and executing unlocking action based on the unlocking instruction; and the unlocking instruction is sent to the door lock by the door lock server when the corresponding mobile phone number of the SIM card is determined to be consistent with the binding mobile phone number.
26. A door lock server, characterized in that the door lock server comprises:
the receiving unit is used for receiving the identifier of the SIM card installed in the terminal equipment and sent by the door lock and the binding mobile phone number corresponding to the user identifier carried in the unlocking request sent by the terminal equipment to the door lock;
and the sending unit is used for sending an unlocking instruction to the door lock when the mobile phone number corresponding to the SIM card is determined to be consistent with the binding mobile phone number, so that the door lock can execute unlocking action according to the unlocking instruction.
CN201910561822.XA 2019-06-26 2019-06-26 Unlocking system and method, terminal equipment, door lock and door lock server Active CN110284770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910561822.XA CN110284770B (en) 2019-06-26 2019-06-26 Unlocking system and method, terminal equipment, door lock and door lock server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910561822.XA CN110284770B (en) 2019-06-26 2019-06-26 Unlocking system and method, terminal equipment, door lock and door lock server

Publications (2)

Publication Number Publication Date
CN110284770A CN110284770A (en) 2019-09-27
CN110284770B true CN110284770B (en) 2020-12-08

Family

ID=68006217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910561822.XA Active CN110284770B (en) 2019-06-26 2019-06-26 Unlocking system and method, terminal equipment, door lock and door lock server

Country Status (1)

Country Link
CN (1) CN110284770B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116229625A (en) * 2022-12-30 2023-06-06 中国电信股份有限公司 Access control method, device, electronic equipment and readable storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9704314B2 (en) * 2014-08-13 2017-07-11 August Home, Inc. BLE/WiFi bridge that detects signal strength of Bluetooth LE devices at an exterior of a dwelling
CN105139499A (en) * 2015-09-08 2015-12-09 蔡炜 Mobile phone door lock system based on asymmetric secret key and realization method thereof
US10325430B2 (en) * 2016-11-04 2019-06-18 Gilbert Eid Methods and systems for operating door locks using mobile devices
US10475264B2 (en) * 2017-08-14 2019-11-12 Q & K International Group Limited Application method of Bluetooth low-energy electronic lock based on built-in offline pairing passwords, interactive unlocking method of a Bluetooth electronic lock and electronic lock system
CN107909682A (en) * 2017-10-23 2018-04-13 林楚莲 A kind of access control method, device and antitheft door
CN109905235B (en) * 2017-12-08 2020-11-27 北京邮电大学 A smart lock unlocking method, smart lock, terminal, server and system
CN108269334A (en) * 2018-01-10 2018-07-10 北京小米移动软件有限公司 Method for unlocking, terminal device and smart lock
CN108269335A (en) * 2018-01-15 2018-07-10 广安众道电子商务有限公司 A kind of intelligent entrance guard control system and method
CN109410379A (en) * 2018-09-06 2019-03-01 广东汇泰龙科技有限公司 A kind of wireless method for unlocking, system
CN109636983A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of access control method, device and access control system

Also Published As

Publication number Publication date
CN110284770A (en) 2019-09-27

Similar Documents

Publication Publication Date Title
CN111917773B (en) Service data processing method and device and server
CN109102593B (en) Method and apparatus for managing vehicle control authority
EP3312750A1 (en) Information processing device, information processing system, and information processing method
CN107026836B (en) Service implementation method and device
CN114268445B (en) Authentication method, device, system, authentication module and terminal for cloud phone application
CN109688186B (en) Data interaction method, device, equipment and readable storage medium
US20050138394A1 (en) Biometric access control using a mobile telephone terminal
CN107911340B (en) Login verification method, device and equipment of application program and storage medium
CN111422163A (en) Vehicle ignition method and system based on face recognition and vehicle
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
CN105279818A (en) Electronic lock and opening method and system thereof, and mobile terminal
CN111131202A (en) Identity authentication method and system based on multiple information authentication
HK1213706A1 (en) Method for processing password, server and system
CN101155212A (en) A method for restricting the use of mobile terminals
CN115344401A (en) XFS realizing method, device, equipment and readable storage medium based on Hongmon system
CN111093192A (en) Device binding method, device, terminal device and network side device
CN110284770B (en) Unlocking system and method, terminal equipment, door lock and door lock server
CN110264602B (en) Unlocking system and method, terminal equipment and door lock server
CN107306249A (en) Vehicle monitoring method and device
CN104951678B (en) Unlocking method and a device
CN101854357A (en) Method and system for monitoring network authentication
CN108550208B (en) User authority management method of intelligent door lock, server and readable medium
CN116409190B (en) Charging control, charging requests, charging authentication methods and devices for charging piles
CN113515735B (en) Data processing method, device, equipment and medium
JP2022175426A (en) Information processing program and first terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20191118

Address after: 100015 Beijing city Chaoyang District Gaojiayuan No.

Applicant after: Beijing Huada Zhibao Electronics System Co., Ltd.

Applicant after: Beijing Zhibao Yunke Technology Co., Ltd.

Address before: Room B106-1, 1st floor, Building 1, 14 Zhonghe Street, Beijing Economic and Technological Development Zone, Daxing District, Beijing, 100176

Applicant before: Beijing Zhibao Yunke Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant