[go: up one dir, main page]

CN112448909A - Electronic lock management method, device, system and storage medium - Google Patents

Electronic lock management method, device, system and storage medium Download PDF

Info

Publication number
CN112448909A
CN112448909A CN201910749607.2A CN201910749607A CN112448909A CN 112448909 A CN112448909 A CN 112448909A CN 201910749607 A CN201910749607 A CN 201910749607A CN 112448909 A CN112448909 A CN 112448909A
Authority
CN
China
Prior art keywords
electronic lock
authentication information
management request
target user
lock management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910749607.2A
Other languages
Chinese (zh)
Inventor
范玉杯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Suzhou Software Technology Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Suzhou Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Suzhou Software Technology Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201910749607.2A priority Critical patent/CN112448909A/en
Publication of CN112448909A publication Critical patent/CN112448909A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the invention provides an electronic lock management method, an electronic lock management device, an electronic lock management system and a storage medium, wherein the method is applied to an operator system and comprises the following steps: receiving an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user; based on the electronic lock management request, calling an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result; and managing the electronic lock based on the authentication result. Therefore, authentication is completed cooperatively through integration of the electronic lock system and the operator system, remote management of the electronic lock is achieved, and user experience is improved.

Description

Electronic lock management method, device, system and storage medium
Technical Field
The invention relates to the field of smart home, in particular to an electronic lock management method, device and system and a storage medium.
Background
With the increasing variety of electronic locks, the security requirement of a user on the electronic lock is higher and higher, for example, face recognition, retina recognition, fingerprint recognition and the like are added to the management technology of the related electronic lock, but all of these require to construct a dedicated control network to transmit signals, and the user is required to manage the electronic lock in a short distance, which is not capable of remote management, and the user experience needs to be improved.
Disclosure of Invention
In view of this, embodiments of the present invention provide an electronic lock management method, apparatus, system and storage medium, so as to perform remote management on an electronic lock, thereby improving user experience.
The embodiment of the invention provides an electronic lock management method, which is applied to an operator system and comprises the following steps:
receiving an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user;
based on the electronic lock management request, calling an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and managing the electronic lock based on the authentication result.
In the above scheme, the method further comprises:
constructing the electronic lock system with a container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
In the foregoing solution, the invoking the electronic lock system to authenticate the target user based on the authentication information includes:
and sending the electronic lock management request to the electronic lock system through an interface of the electronic lock system, wherein the electronic lock management request is used for matching the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticating the target user based on a matching result.
In the foregoing solution, the invoking the electronic lock system to authenticate the target user based on the authentication information includes:
analyzing the electronic lock management request to obtain the authentication information;
and sending the authentication information to the electronic lock system through an interface of the electronic lock system, wherein the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
In the above scheme, the electronic lock management request is used to obtain a dynamic password of the electronic lock; accordingly, the managing the electronic lock based on the authentication result includes:
when the authentication result represents that the target user passes the authentication, acquiring a dynamic password of the electronic lock;
and sending the acquired dynamic password.
In the above scheme, the electronic lock management request is used for remote unlocking; accordingly, the managing the electronic lock based on the authentication result includes:
when the authentication result represents that the target user passes the authentication, acquiring an unlocking instruction of the electronic lock;
and sending the unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
In the above scheme, the method further comprises:
acquiring a locking instruction of the electronic lock when the number of times of the received electronic lock management request in a preset time period exceeds a preset threshold value and the authentication result corresponding to each electronic lock management request represents that the authentication on the target user is not passed;
and sending the locking instruction to the electronic lock to control the electronic lock to be locked.
The embodiment of the invention also provides an electronic lock management method, which is applied to a terminal and comprises the following steps:
sending an electronic lock management request to an operator system, wherein the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to call the electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and receiving management information which is returned by the operator system based on the authentication result and corresponds to the electronic lock, so as to manage the electronic lock based on the management information.
The embodiment of the present invention further provides an electronic lock management device, which is located in an operator system, and includes:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving an electronic lock management request which carries authentication information corresponding to a target user;
the calling unit is used for calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result;
and the management unit is used for managing the electronic lock based on the authentication result.
In the above solution, the apparatus further comprises a construction unit,
the building unit is used for building the electronic lock system by taking the container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
In the above scheme, the invoking unit is specifically configured to send the electronic lock management request to the electronic lock system through an interface of the electronic lock system, where the electronic lock management request is used to match the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticate the target user based on a matching result.
In the above scheme, the calling unit is specifically configured to analyze the electronic lock management request to obtain the authentication information;
and sending the authentication information to the electronic lock system through an interface of the electronic lock system, wherein the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
In the above scheme, the electronic lock management request is used to obtain a dynamic password of the electronic lock; accordingly, the number of the first and second electrodes,
the management unit is specifically configured to obtain a dynamic password of the electronic lock when the authentication result represents that the target user is authenticated;
and sending the acquired dynamic password.
In the above scheme, the electronic lock management request is used for remote unlocking; accordingly, the number of the first and second electrodes,
the management unit is specifically used for acquiring an unlocking instruction of the electronic lock when the authentication result represents that the target user passes the authentication;
and sending the unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
In the above solution, the device further comprises a locking unit,
the locking unit is used for acquiring a locking instruction of the electronic lock when the number of times of the received electronic lock management request in a preset time period exceeds a preset threshold and the authentication result corresponding to each electronic lock management request represents that the authentication of the target user is not passed;
and sending the locking instruction to the electronic lock to control the electronic lock to be locked.
The embodiment of the present invention further provides an electronic lock management device, located at a terminal, including:
the system comprises a sending unit, a receiving unit and a processing unit, wherein the sending unit is used for sending an electronic lock management request to an operator system, the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to call the electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and the acquisition unit is used for receiving management information which is returned by the operator system based on the authentication result and corresponds to the electronic lock, so as to manage the electronic lock based on the management information.
An embodiment of the present invention further provides an electronic lock management system, including: the system comprises a terminal, an operator system, an electronic lock system and an electronic lock;
the terminal is used for sending an electronic lock management request to an operator system, wherein the electronic lock management request carries authentication information of a corresponding target user;
and the operator system is used for receiving the electronic lock management request, calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result, and managing the electronic lock based on the authentication result.
An embodiment of the present invention further provides an electronic lock management apparatus, including:
a memory for storing executable instructions;
and the processor is used for realizing the electronic lock management method of the embodiment of the invention when executing the executable instructions stored in the memory.
The embodiment of the invention also provides a storage medium, which stores executable instructions, and when the executable instructions are executed, the electronic lock management method is implemented.
The embodiment of the invention provides an electronic lock management method, a device and a system, wherein the method is applied to an operator system and comprises the following steps: receiving an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user; based on the electronic lock management request, calling an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result; and managing the electronic lock based on the authentication result. Therefore, authentication is completed through integration cooperation of the electronic lock system and the operator system, remote management of the electronic lock is achieved, and user experience is improved.
Drawings
Fig. 1 is a schematic structural diagram of an electronic lock management system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an electronic lock system according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart illustrating automatic interface adaptation of an electronic lock system according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic lock according to an embodiment of the present invention;
fig. 5 is a first flowchart illustrating an electronic lock management method according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a container platform architecture according to an embodiment of the present invention;
FIG. 7 is a flow chart illustrating service containerization according to an embodiment of the present invention;
fig. 8 is a second flowchart illustrating an electronic lock management method according to an embodiment of the present invention;
fig. 9 is a third schematic flowchart of an electronic lock management method according to an embodiment of the present invention;
fig. 10 is a first schematic structural diagram illustrating a composition of an electronic lock management device according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a second exemplary embodiment of an electronic lock management device;
fig. 12 is a third schematic view of a composition structure of an electronic lock management device according to an embodiment of the present invention.
Detailed Description
So that the manner in which the features and aspects of the embodiments of the present invention can be understood in detail, a more particular description of the embodiments of the invention, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which embodiments of the present invention belong. The terminology used herein is for the purpose of describing embodiments of the invention only and is not intended to be limiting of embodiments of the invention.
The flowchart and block diagrams in the figures presented by the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Before further detailed description of the embodiments of the present invention, terms and expressions referred to in the embodiments of the present invention are described, and the terms and expressions referred to in the embodiments of the present invention are applicable to the following explanations.
1) The container defines a set of standardized system from construction to execution, changes the traditional virtualization technology, deeply influences the field of cloud computing, and is the future of cloud computing. The container technology represented by Docker increasingly affects cloud computing, and changes our daily development, operation and maintenance, and testing. Compared with a virtual machine, the container is light in weight, quick to start and low in cost, and a packing by service and micro service mode based on the container are used for improving Development operation and maintenance integration (Development Operations), and the container is more suitable for large-scale cluster management and flexible distributed system building under many scenes. Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS) and container technology are deeply integrated, services such as elastic computing, DevOps tool chains and micro-Service infrastructures are provided, and the problems of IT, architecture, operation and maintenance and the like are solved for enterprises, so that the enterprises focus on services more, and a new generation of cloud computing ecosystem is constructed.
2) Docker, an open source application container engine, allows developers to package their applications and dependencies into a portable container, and then release them to any popular operating system, and also can implement virtualization, containers are fully sandboxed, and there is no interface between them.
3) Microservice is an architectural style in that a large complex software application consists of one or more microservices. Each microservice in the system can be deployed independently, with loose coupling between the microservices, and each microservice is only concerned with completing one task and well completing the task. In all cases, each task represents a small business capability. With services organized around business capabilities, automated deployment, intelligent endpoints, de-centralized control of speech and data, etc.
4) Model View Controller (MVC), a software design paradigm, organizes code using a method that separates business logic, data, and interface display, aggregates business logic into one component, and does not require rewriting business logic while improving and personalizing custom interfaces and user interactions. MVC was uniquely developed to map traditional input, processing, and output functions into a logical graphical user interface structure.
5) JavaScript Object Notation (JSON), a lightweight data interchange format. It is based on a subset of JavaScript (Standard ECMA-2623 rd Edition-December 1999). JSON employs a text format that is completely language independent, but also uses conventions similar to the C language family (including C, C + +, C #, Java, JavaScript, Perl, Python, etc.). JSON is easy to read and write by humans, and also easy to parse and generate by machines, thus becoming an ideal data exchange language.
6) The operator system is a provider system capable of providing network services, is deployed on an operator server, and can be called as an operator only by companies such as China Mobile, China Unicom, China telecom and China radio and television, which have operation licenses issued by the industry and credit department.
Based on the above explanations of terms and terms involved in the embodiments of the present invention, referring next to fig. 1, fig. 1 is a schematic diagram of an architecture of an electronic lock management system 100 provided in the embodiments of the present invention, and to implement supporting an exemplary application, the electronic lock management system is composed of an electronic lock system 200, an operator system 400, a terminal 500, and an electronic lock 600, where the terminal 500 is connected to the operator system 400 through a network 300, and the network 300 is a network provided by the operator system 400, and may be a wide area network or a local area network, or may be a combination of the two, and implements data transmission using a wireless link.
A terminal 500, configured to send an electronic lock management request to the operator system 400, where the electronic lock management request carries authentication information of a corresponding target user;
and the operator system 400 is configured to receive the electronic lock management request, invoke the electronic lock system 200 to authenticate the target user based on the authentication information based on the electronic lock management request, obtain an authentication result, and manage the electronic lock 600 based on the authentication result.
Fig. 2 is a schematic structural diagram of an electronic lock system 200 according to an embodiment of the present invention, and referring to fig. 2, the electronic lock system 200 is divided into a base layer, an ability layer, a business layer, and an application layer, and provides multiple access modes and access roles.
The base layer provides a software running environment through a container platform, and provides an application running platform through technologies such as Docker and Kubernetes, so that operation and maintenance automation is realized, application is deployed quickly, application environment resources are elastically stretched and dynamically adjusted, and research and development operation efficiency is improved.
The capability layer is an abstraction of various capabilities, providing authentication, workflow, reporting, configuration, interface functions. The authentication service for the access of operators, equipment merchants and users is a first line of defense for accessing the system and is also an authentication module integrated with a third party; the workflow is used for configuring a user operation process, a third-party integrated approval process and other service processes; the report provides statistical analysis of equipment data, regional fault statistics, activated data statistics and the like for various data statistical analysis; configuration provides system configuration management, administrator setting, and basic configuration information management of users, roles and the like; the interface is integrated with the outside and provides a configuration data interface for the outside.
The service layer provides a set of services that are available to the user to the outside. The resource management provides resource management for the activated equipment, and comprises various management operations such as startup and shutdown, restart and offline; the user management provides user data management, authority management, account opening, account cancellation and the like; remote control provides remote control authority management and remote unlocking functions, and remote temporary passwords and the like can be set; the monitoring alarm provides various monitoring alarms such as equipment failure, intrusion alarm, equipment switch abnormity and the like.
The application layer enables integration with third party systems, which here may be operator systems. Sales management may provide sold data, sales price and type, etc.; the device management provides device management functions such as device activation and freezing; the charging management provides a service charging function according to the service time of the equipment; system management provides device infrastructure management. Referring to fig. 3, fig. 3 is a schematic flow chart of the automatic interface adaptation of the electronic lock system according to the embodiment of the present invention, and relates to steps S301 to S305, which are described below.
Step S301: and the electronic lock system receives the information sent by the operator system through the electronic lock system interface.
Step S302: and judging whether the received information is in json format, if so, executing S304, and if not, executing step S303.
The message format returned by the operator system interface is various, before the electronic lock system analyzes the received message, whether the message format received by the electronic lock system interface is the json format needs to be judged, if so, the step S304 is executed; if not, step S303 is performed.
Step S303: and converting the message into a json format.
The received messages in the non-json format returned by the interface of the operator system are converted into the json format, which is a necessary step for analyzing the messages and is also the first step of analyzing.
Step S304: and reading the object of the message in the json format for analysis.
When the electronic lock system analyzes the message in the json format, a message interval mark needs to be defined manually, the message interval mark is used for reading the configuration items of the message to be analyzed, the json object to be analyzed is sequentially read through step-by-step cyclic analysis of each configuration item, the attribute value is read, and finally the analysis of the json message is completed.
Step S305: judging whether the analysis is finished, if so, ending the process; if the parsing is not completed, return is made to step S304.
When the judgment result represents that the json message is finally analyzed, the process is ended; and when the judgment result represents that the json message is not analyzed, executing the step S304 to continue analyzing the json message.
The automatic interface adaptation method realizes the complete automatic adaptation of the interface, does not need secondary development when being in butt joint with a third-party interface, greatly lightens the development pressure and improves the product integration efficiency.
Fig. 4 is a schematic diagram of a composition structure of an electronic lock according to an embodiment of the present invention, referring to fig. 4, where a wireless module is used to receive and transmit a control signal through an operator network, an embedded program runs in an intelligent chip, which is a brain of the intelligent lock, a touch screen is used to receive a key instruction, a camera collects image data around a door lock, a clutch and an electric lock control complete a switching operation after receiving the instruction, fingerprint collection is used to read user fingerprint information, and a power module provides electric energy required by the intelligent lock.
The electronic lock provides a plurality of unlocking modes, including: the electronic lock management method comprises a fingerprint, a password, an intelligent terminal and a key, and is mainly used for introducing the electronic lock management method provided by the embodiment of the invention aiming at an unlocking process of the intelligent terminal.
Fig. 5 is a first schematic flow chart of an electronic lock management method according to an embodiment of the present invention, and referring to fig. 5, the electronic lock management method according to the embodiment of the present invention is applied to an operator system, and includes:
step S501: and the operator system receives an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user.
In some embodiments, when the user forgets the password, the user may send an electronic lock management request to the operator system through the terminal to apply for unlocking, and the terminal may be a mobile phone or a tablet computer. In other embodiments, when a guest visits and the host is not at home, the user may send an electronic lock management request to the operator system through the terminal, where the electronic lock management request is used to obtain a dynamic password of the electronic lock to set a temporary password for the guest, so as to achieve remote unlocking.
Taking the terminal as a mobile phone as an example, a user can dial an operator customer service telephone through the mobile phone, and the operator customer service can verify the identity of the user by calling the electronic lock system, so that the electronic lock can be remotely operated. The user can also open the application software in the mobile phone, and send an electronic lock management request to the operator system in the application software for identity authentication, so as to realize the control of the electronic lock.
Step S502: and calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result.
In actual implementation, before the operator system calls the electronic lock system to verify the electronic lock management request, the electronic lock system needs to be constructed. In some embodiments, the electronic lock system is built with the container platform as a base layer, the electronic lock system being used to provide a plurality of services, each service being run through one container in the container platform.
The container platform provides high-performance scalable container application management services, supports application lifecycle management with Docker containers, provides multiple application publishing modes and continuous delivery capabilities, and supports service architectures. The container service simplifies the construction work of the container management muscle group, integrates the virtualization, storage, network and safety capabilities of cloud computing, and creates the optimal operation environment of the cloud. Fig. 6 is a schematic diagram of a container platform architecture according to an embodiment of the present invention, referring to fig. 6, the container application can be accessed directly from a public network or accessed through a load balancing service portal through an elastic IP; through the elastic load balancing service, the flow among the nodes in the cluster can be automatically balanced, and the high performance and high availability of the container application are ensured; the data persistence storage of the container application is realized through the virtualization cluster; and the server side of the electronic lock system is made into a mirror image, stored in a mirror image warehouse and operated in a container. The container has the characteristics of automatic operation and maintenance elastic expansion and the like, and an electronic lock system automatically triggers automatic elastic expansion under the condition that electronic lock clients are on line on a large scale, responds to concurrent peaks quickly and provides performance guarantee.
Fig. 7 is a schematic flow chart of service containerization provided by the embodiment of the present invention, and referring to fig. 7, a service containerization process provided by the embodiment of the present invention includes:
step S701: and creating a container space, and logically isolating the service based on the container space to obtain different virtual clusters.
In practical implementation, the traditional containerization process comprises environment preparation, mirror image production and container starting; unlike traditional containerization, in some embodiments of the invention, service resources are logically isolated by container space, services are divided into different virtual clusters, and the environment is isolated by space.
Step S702: creating container services includes code building, application packaging, integration testing, creating service names and states.
In actual implementation, creating a container service includes code building, application packaging, integration testing, and creating a service name and state, and a user passes through < service name >: the service port can access deployed services, elastic expansion, load balancing, gray scale upgrading and error recovery of applications can be realized by using the services, the product service updating online process is accelerated from code construction to integration test, and development, operation and maintenance integration is realized.
Step S703: and (4) plug-in storage is carried out when the mirror image is created, and the frequently updated content is made into a single mirror image.
In actual implementation, the time consumption of the traditional mirror image manufacturing process is long, and when the mirror image needs to be updated, all mirror images need to be updated, so that the efficiency is low. In order to solve the problem, in some embodiments of the present invention, when creating an image, the storage is added externally, the content which is frequently updated is made into a single image, and when starting a container, parameters are introduced to cover a specified directory, so as to solve the problem of creating the image.
Step S704: the configuration runtime environment mainly sets resource limits, ports and copy numbers.
In actual implementation, the configuration operating environment mainly sets resource limitations, ports, copy numbers, and the like, where the resource limitations include a cpu specification, a memory size, and a system disk size, the port configuration defines a port mapping relationship between a container and a service, the port selection range is 1 to 65535, and the port protocols include a Transmission Control Protocol (TCP) and a User Datagram Protocol (UDP).
Through the process, the creation service can be started through the container platform, and the creation result can be checked through the container platform log.
In some embodiments, the operator system may invoke the electronic lock system to authenticate the target user based on the authentication information by:
and sending an electronic lock management request to the electronic lock system through an interface of the electronic lock system, wherein the electronic lock management request is used for matching the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticating the target user based on the matching result.
Here, in actual implementation, the operator system transmits the received electronic lock management request to the electronic lock system. After receiving an electronic lock management request, an electronic lock system firstly analyzes the request to obtain authentication information corresponding to a target user; then, matching the obtained authentication information with preset authentication information stored in an electronic lock system to obtain a matching result; then, the target user is authenticated based on the matching result to obtain an authentication result; and finally, generating management information corresponding to the electronic lock based on the authentication result, and sending the management information to an operator system.
In some embodiments, the operator system may invoke the electronic lock system to authenticate the target user based on the authentication information by:
analyzing the electronic lock management request to obtain authentication information; sending authentication information to the electronic lock system through an interface of the electronic lock system; and the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
Here, in actual implementation, the operator system analyzes the received electronic lock management request to obtain authentication information; and then sends the obtained authentication information to the electronic lock system. After the electronic lock system receives the authentication information, the authentication information is matched with preset authentication information stored in the electronic lock system to obtain a matching result; then, the target user is authenticated based on the matching result to obtain an authentication result; and finally, generating management information corresponding to the electronic lock based on the authentication result, and sending the management information to an operator system.
Step S503: and managing the electronic lock based on the authentication result.
In practical application, after receiving the management information of the corresponding electronic lock generated based on the authentication result and sent by the electronic lock system, the operator system correspondingly manages the electronic lock based on the management information.
In some embodiments, the electronic lock management request is used to obtain a dynamic password of the electronic lock, and accordingly, the operator system may manage the electronic lock based on the authentication result by:
when the authentication result represents that the target user passes the authentication, acquiring a dynamic password of the electronic lock; and sending the acquired dynamic password.
Here, in practical implementation, when the authentication result indicates that the target user is authenticated, the electronic lock system generates a dynamic password of the electronic lock and sends the dynamic password to the operator system; and the operator system sends the acquired dynamic password to the mobile phone terminal of the target user or to the mobile phone terminals of other preset users.
In some embodiments, the electronic lock management request is for remote unlocking, and accordingly, the operator system may manage the electronic lock based on the authentication result by:
when the authentication result represents that the target user passes the authentication, acquiring an unlocking instruction of the electronic lock; and sending an unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
In actual implementation, when the authentication result represents that the authentication of the target user passes, the electronic lock system generates an unlocking instruction of the electronic lock and sends the generated unlocking instruction to the operator system; after the operator system obtains the unlocking instruction, the unlocking instruction is sent to the electronic lock to control the electronic lock to unlock.
In some embodiments, the operator system may further count the number of times of the electronic lock management request received within a preset time period, and determine whether the authentication result corresponding to each electronic lock management request represents that the authentication on the target user passes. When the number of times of the received electronic lock management requests in a preset time period exceeds a preset threshold value and the authentication result corresponding to each electronic lock management request represents that the authentication of a target user is not passed, acquiring a locking instruction of the electronic lock; and sending a locking instruction to the electronic lock to control the electronic lock to be locked.
Through the mode, when the unlocking authentication fails for many times, the electronic lock can be controlled to be locked, and the safety of the electronic lock is improved.
Next, the electronic lock management method provided by the embodiment of the present invention is described by taking a terminal as a mobile phone and acquiring a dynamic password as an example. Fig. 8 is a second schematic flowchart of a method for managing an electronic lock according to an embodiment of the present invention, and referring to fig. 8, the method for managing an electronic lock according to the embodiment of the present invention includes:
step 801: and responding to an operation instruction for sending the dynamic password triggered by the user, generating a dynamic password application request by the mobile phone terminal, and sending the dynamic password application request to the operator system.
Step 802: and the operator system analyzes the dynamic password application request to obtain authentication information of the corresponding target user and sends the authentication information to the electronic lock system.
Step 803: and the electronic lock system matches the received authentication information with preset authentication information, authenticates the target user and obtains an authentication result.
Step 804: the electronic lock system generates a dynamic password based on the authentication result.
Here, if the authentication result represents that the target user passes the authentication, the electronic lock system generates a corresponding dynamic password; and if the authentication result represents that the target user is not authenticated, the electronic lock system does not generate the corresponding dynamic password.
Step 805: the electronic lock system sends the generated dynamic password to the operator system.
Step 806: and the operator system sends the received dynamic password to the mobile phone terminal.
Here, the operator system may send the dynamic password to the mobile phone terminal of the target user, or send the dynamic password to the mobile phone terminals of other preset users.
Step 807: and responding to the dynamic password input by the user, and the electronic lock executes unlocking operation.
Next, an electronic lock management method provided by an embodiment of the present invention is described by taking remote unlocking as an example. Fig. 9 is a third schematic flowchart of a method for managing an electronic lock according to an embodiment of the present invention, and referring to fig. 9, the method for managing an electronic lock according to an embodiment of the present invention includes:
step 901: and responding to a remote unlocking operation instruction triggered by a user, generating an unlocking request carrying corresponding target user authentication information by the terminal, and sending the unlocking request to the operator system.
Step 902: the operator system sends an unlocking request to the electronic lock system through an interface of the electronic lock system.
Step 903: and the electronic lock system analyzes the unlocking request to obtain the authentication information corresponding to the target user.
Step 904: and the electronic lock system matches the analyzed authentication information with preset authentication information, authenticates the target user and obtains an authentication result.
Step 905: the electronic lock system generates an unlocking instruction based on the authentication result.
If the authentication result represents that the authentication of the target user passes, the electronic lock system generates a corresponding unlocking instruction; and if the authentication result represents that the authentication of the target user is not passed, the electronic lock system does not generate a corresponding unlocking instruction.
Step 906: and the electronic lock system sends the generated unlocking instruction to the operator system.
Step 907: and the operator system sends the received unlocking instruction to the electronic lock.
Step 908: and responding to the unlocking instruction, and executing unlocking operation by the electronic lock.
Fig. 10 is a schematic view of a first structural diagram of an electronic lock management device according to an embodiment of the present invention, and referring to fig. 9, the electronic lock management device 10 according to the embodiment of the present invention is located in an operator system, and includes:
the system comprises a receiving unit 101, a receiving unit, a processing unit and a processing unit, wherein the receiving unit 101 is used for receiving an electronic lock management request which carries authentication information of a corresponding target user;
the calling unit 102 is configured to call, based on the electronic lock management request, an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and the management unit 103 is used for managing the electronic lock based on the authentication result.
In some embodiments, the apparatus 10 further comprises a construction unit,
the building unit is used for building the electronic lock system by taking the container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
In some embodiments, the invoking unit 102 is specifically configured to send the electronic lock management request to the electronic lock system through an interface of the electronic lock system, where the electronic lock management request is used to match the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticate the target user based on a matching result.
In some embodiments, the invoking unit 102 is specifically configured to analyze the electronic lock management request to obtain the authentication information;
and sending the authentication information to the electronic lock system through an interface of the electronic lock system, wherein the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
In some embodiments, the electronic lock management request is used to obtain a dynamic password of the electronic lock; accordingly, the number of the first and second electrodes,
the management unit 103 is specifically configured to obtain the dynamic password of the electronic lock when the authentication result represents that the target user is authenticated; and sending the acquired dynamic password.
In some embodiments, the electronic lock management request is for remote unlocking; accordingly, the number of the first and second electrodes,
the management unit 103 is specifically configured to obtain an unlocking instruction of the electronic lock when the authentication result indicates that the authentication on the target user passes;
and sending the unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
In some embodiments, the device 10 further comprises a locking unit,
the locking unit is used for acquiring a locking instruction of the electronic lock when the number of times of the received electronic lock management request in a preset time period exceeds a preset threshold and the authentication result corresponding to each electronic lock management request represents that the authentication of the target user is not passed;
and sending the locking instruction to the electronic lock to control the electronic lock to be locked.
Fig. 11 is a schematic diagram of a second configuration of the electronic lock management device according to the embodiment of the present invention, and referring to fig. 11, the electronic lock management device 11 according to the embodiment of the present invention is located at a terminal, and includes:
a sending unit 111, configured to send an electronic lock management request to an operator system, where the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to invoke the electronic lock system to authenticate the target user based on the authentication information, so as to obtain an authentication result;
an obtaining unit 112, configured to receive management information corresponding to the electronic lock, which is returned by the operator system based on the authentication result.
It should be noted that: in the electronic lock management device provided in the above embodiment, when the electronic lock is managed, only the division of the program modules is exemplified, and in practical applications, the above processing distribution may be completed by different program modules according to needs, that is, the internal structure of the device is divided into different program modules to complete all or part of the above-described processing. In addition, the electronic lock management device provided by the above embodiment and the electronic lock management method embodiment belong to the same concept, and specific implementation processes thereof are detailed in the method embodiment and are not described herein again.
Fig. 12 is a schematic diagram of a third configuration of the electronic lock management device according to an embodiment of the present invention, and referring to fig. 12, the electronic lock management device 12 includes: at least one processor 121, memory 122, at least one network interface 123, and a user interface 124. The various components in the electronic lock management device 12 are coupled together by a bus system 125. It is understood that the bus system 125 is used to enable connection communications between these components. The bus system 125 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 125 in fig. 12. The user interface 124 may include a display, keyboard, mouse, trackball, click wheel, keys, buttons, touch pad or touch screen, and the like.
The memory 122 may be either volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), a Flash Memory (Flash Memory), and the like. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM). The memory 122 described in connection with embodiments of the invention is intended to comprise these and any other suitable types of memory.
The memory 122 in embodiments of the present invention is capable of storing data to support the operation of the electronic lock management device 12. Examples of such data include: any computer program for operating on the electronic lock management device 12, such as an operating system and application programs. The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application program may include various application programs.
As an example of the method provided by the embodiment of the present invention implemented by a combination of hardware and software, the method provided by the embodiment of the present invention may be directly embodied as a combination of software modules executed by the processor 121, where the software modules may be located in a storage medium located in the memory 122, and the processor 121 reads executable instructions 1221 included in the software modules in the memory 122, and completes the method provided by the embodiment of the present invention in combination with necessary hardware (for example, including the processor 121 and other components connected to the bus 125).
By way of example, the Processor 121 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor or the like.
An embodiment of the present invention further provides a storage medium, where the storage medium may include: a removable storage device, a RAM, a ROM, a magnetic or optical disk, or various other media that can store program code. The readable storage medium stores executable instructions; the executable instructions are used for realizing the electronic lock management method when being executed by the processor.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (15)

1. An electronic lock management method is applied to an operator system, and comprises the following steps:
receiving an electronic lock management request, wherein the electronic lock management request carries authentication information of a corresponding target user;
based on the electronic lock management request, calling an electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and managing the electronic lock based on the authentication result.
2. The method of claim 1, further comprising:
constructing the electronic lock system with a container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
3. The method of claim 1, wherein the invoking the electronic lock system to authenticate the target user based on the authentication information comprises:
and sending the electronic lock management request to the electronic lock system through an interface of the electronic lock system, wherein the electronic lock management request is used for matching the authentication information with preset authentication information after the electronic lock system analyzes the electronic lock management request to obtain the authentication information, and authenticating the target user based on a matching result.
4. The method of claim 1, wherein the invoking the electronic lock system to authenticate the target user based on the authentication information comprises:
analyzing the electronic lock management request to obtain the authentication information;
and sending the authentication information to the electronic lock system through an interface of the electronic lock system, wherein the authentication information is used for matching the authentication information with preset authentication information by the electronic lock system and authenticating the target user based on a matching result.
5. The method according to claim 1, wherein the electronic lock management request is used to obtain a dynamic password of the electronic lock; accordingly, the managing the electronic lock based on the authentication result includes:
when the authentication result represents that the target user passes the authentication, acquiring a dynamic password of the electronic lock;
and sending the acquired dynamic password.
6. The method of claim 1, wherein the electronic lock management request is for remote unlocking; accordingly, the managing the electronic lock based on the authentication result includes:
when the authentication result represents that the target user passes the authentication, acquiring an unlocking instruction of the electronic lock;
and sending the unlocking instruction to the electronic lock to control the electronic lock to be unlocked.
7. The method of claim 1, further comprising:
acquiring a locking instruction of the electronic lock when the number of times of the received electronic lock management request in a preset time period exceeds a preset threshold value and the authentication result corresponding to each electronic lock management request represents that the authentication on the target user is not passed;
and sending the locking instruction to the electronic lock to control the electronic lock to be locked.
8. An electronic lock management method is applied to a terminal, and comprises the following steps:
sending an electronic lock management request to an operator system, wherein the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to call the electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and receiving management information which is returned by the operator system based on the authentication result and corresponds to the electronic lock, so as to manage the electronic lock based on the management information.
9. An electronic lock management device, wherein the device is located at an operator system, comprising:
the system comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving an electronic lock management request which carries authentication information corresponding to a target user;
the calling unit is used for calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result;
and the management unit is used for managing the electronic lock based on the authentication result.
10. The apparatus according to claim 9, characterized in that the apparatus further comprises a construction unit,
the building unit is used for building the electronic lock system by taking the container platform as a base layer;
the electronic lock system is configured to provide a plurality of services, each of the services being run through a container in the container platform.
11. The apparatus of claim 9,
the calling unit is specifically configured to send the electronic lock management request to the electronic lock system through an interface of the electronic lock system, where the electronic lock management request is used for the electronic lock system to analyze the electronic lock management request to obtain the authentication information, match the authentication information with preset authentication information, and authenticate the target user based on a matching result.
12. An electronic lock management device, wherein the device is located at a terminal, comprising:
the system comprises a sending unit, a receiving unit and a processing unit, wherein the sending unit is used for sending an electronic lock management request to an operator system, the electronic lock management request carries authentication information corresponding to a target user, and the electronic lock management request is used for the operator system to call the electronic lock system to authenticate the target user based on the authentication information to obtain an authentication result;
and the acquisition unit is used for receiving management information which is returned by the operator system based on the authentication result and corresponds to the electronic lock, so as to manage the electronic lock based on the management information.
13. An electronic lock management system, the system comprising: the system comprises a terminal, an operator system, an electronic lock system and an electronic lock;
the terminal is used for sending an electronic lock management request to an operator system, wherein the electronic lock management request carries authentication information of a corresponding target user;
and the operator system is used for receiving the electronic lock management request, calling the electronic lock system to authenticate the target user based on the authentication information based on the electronic lock management request to obtain an authentication result, and managing the electronic lock based on the authentication result.
14. An electronic lock management device, comprising:
a memory for storing executable instructions;
a processor for implementing the electronic lock management method of any one of claims 1 to 7 when executing executable instructions stored in the memory.
15. A storage medium storing executable instructions for implementing the electronic lock management method of any one of claims 1 to 7 when executed.
CN201910749607.2A 2019-08-14 2019-08-14 Electronic lock management method, device, system and storage medium Withdrawn CN112448909A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910749607.2A CN112448909A (en) 2019-08-14 2019-08-14 Electronic lock management method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910749607.2A CN112448909A (en) 2019-08-14 2019-08-14 Electronic lock management method, device, system and storage medium

Publications (1)

Publication Number Publication Date
CN112448909A true CN112448909A (en) 2021-03-05

Family

ID=74742143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910749607.2A Withdrawn CN112448909A (en) 2019-08-14 2019-08-14 Electronic lock management method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN112448909A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113791864A (en) * 2021-09-08 2021-12-14 国电南瑞科技股份有限公司 Container and micro-service function based monitoring system and construction method thereof
CN114826648A (en) * 2022-03-09 2022-07-29 北京快乐茄信息技术有限公司 Authentication assembly, authentication method, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903317A (en) * 2012-12-28 2014-07-02 北京大唐高鸿数据网络技术有限公司 Access control and alarm method employing session initiation protocol (SIP) extension
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903317A (en) * 2012-12-28 2014-07-02 北京大唐高鸿数据网络技术有限公司 Access control and alarm method employing session initiation protocol (SIP) extension
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113791864A (en) * 2021-09-08 2021-12-14 国电南瑞科技股份有限公司 Container and micro-service function based monitoring system and construction method thereof
CN113791864B (en) * 2021-09-08 2024-03-26 国电南瑞科技股份有限公司 Monitoring system based on container and microservice function and construction method thereof
CN114826648A (en) * 2022-03-09 2022-07-29 北京快乐茄信息技术有限公司 Authentication assembly, authentication method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111258725B (en) Data processing method, device, equipment and medium based on block chain
US8955037B2 (en) Access management architecture
CN111290865A (en) Service calling method and device, electronic equipment and storage medium
CN111930521A (en) Method and device for deploying application, electronic equipment and readable storage medium
CN111414381B (en) Data processing method and device, electronic equipment and storage medium
US10686791B1 (en) Secure cloud computing framework
CN111274268A (en) Internet of things data transmission method, device, medium and electronic equipment
WO2022095518A1 (en) Automatic interface test method and apparatus, and computer device and storage medium
CN106452815B (en) An information management method, device and system
CN113360217B (en) Rules engine SDK calling method, device and storage medium
CN112181745A (en) A cloud service platform system and method for FPGA prototype verification
CN112565225B (en) Method and device for data transmission, electronic equipment and readable storage medium
CN112448909A (en) Electronic lock management method, device, system and storage medium
US10621111B2 (en) System and method for unified secure remote configuration and management of multiple applications on embedded device platform
WO2023125755A1 (en) Service request processing method and apparatus based on large-scale cluster, and device and medium
CN105681291B (en) A kind of realization multi-client uniform authentication method and system
CN114095272B (en) Intranet data linking method and device based on internal and external network security architecture
CN111045928A (en) Interface data testing method, device, terminal and storage medium
Jayagopan et al. Intelligence orchestration in IoT and cyber-physical systems
CN114398082B (en) Compatible operation method and device for frame type block chain application
CN113672385B (en) Server hardware resource management system, method and device and storage medium
CN116032494B (en) Data interaction method, blockchain predictor, device and medium
CN117041353B (en) Task processing method and device, electronic equipment and storage medium
US20240330315A1 (en) Event based source replication architecture
US20250117315A1 (en) Multicloud test automation framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210305