CN102945574B - Device and method for controlling locking system permission by mobile equipment - Google Patents
- ️Wed Apr 08 2015
CN102945574B - Device and method for controlling locking system permission by mobile equipment - Google Patents
Device and method for controlling locking system permission by mobile equipment Download PDFInfo
-
Publication number
- CN102945574B CN102945574B CN201210455033.6A CN201210455033A CN102945574B CN 102945574 B CN102945574 B CN 102945574B CN 201210455033 A CN201210455033 A CN 201210455033A CN 102945574 B CN102945574 B CN 102945574B Authority
- CN
- China Prior art keywords
- locking system
- mobile device
- user
- characteristic information
- gives Prior art date
- 2012-11-14 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
In order to solve the problem that the administrator permission management can not be conveniently realized in the prior art of the locking system, the invention provides a device and a method for controlling the locking system permission by mobile equipment. The device for controlling the locking system permission by the mobile equipment mainly comprises the following components: one or a plurality of switching circuits, a single chip microcomputer and a Bluetooth module and is provided with necessary peripheral circuits and necessary electronic components, such as a battery, a capacitor, a triode, a resistor, an LED (light emitting diode) and a circuit board. According to the invention, a switch and an administrator mobile phone need to be cooperated for setting at each time, thereby being safer, and a secret key protection mechanism does not need to be added on a mobile phone program.
Description
Technical field
The apparatus and method of controlling locking system by mobile equipment authority, are applied to the locking system field that mobile device controls, and are especially applied to the field being controlled door lock, automotive lock, gate inhibition by the wifi of mobile phone, Bluetooth technology.
Background technology
In existing locking system field, there is a kind of lock completely newly, utilize the radio communication function of mobile device (mainly mobile phone) (being mainly bluetooth) and be locked into row radio communication, by sending instruction, or use user name code entry etc. are in interior mode, lock is allowed to perform the action unblanked with locking, according to existing technology, general employing installation procedure on mobile phone, then the password arranging a management on program realizes management, but there is a shortcoming in this way, lose if that is exactly mobile device itself, very large inconvenience will be caused to management, and, the password of management is easily revealed, as long as reveal, others can utilize keeper's mobile phone to carry out the operation of various change authority, and, because the program of smart mobile phone itself is all can along with smart mobile phone brush machine, to delete etc. by mistake and damage in interior process, reinstall same program, original administrator's password cannot be used, so even can cause the consequence that original data cannot use.
Patented claim 2012100614396 discloses a kind of new method, the key using lock itself to carry and locking system coordinate, therefore the rights management of locking system inside, rely on mobile device and key, but this invention is only the imparting realizing the authority of keeper by rotating key, the cooperation of key and mobile device cannot be utilized, use mobile device to add and delete keeper, read record of unblanking, administrator right etc. is set, and not providing the concrete structure that can implement completely to form.
Bluetooth and wifi belong to existing known technology, apply completely in daily life, wirelessly can be carried out the exchange of data by bluetooth and wifi.Therefore, bluetooth and wifi belong to existing known technology.
Summary of the invention
In order to the technology solving existing locking system can not realize the problem of administrator right management very easily, the invention provides a kind of apparatus and method of controlling locking system by mobile equipment authority, these apparatus and method can be convenient to use and add deletion keeper, read record of unblanking, the functions such as administrator right are set.
The device of controlling locking system by mobile equipment authority, mainly comprises following assembly:
One or more on-off circuit, wherein has at least one to be positioned at locking system inside, needs to take locking system apart from inner side, or inserts key rotary locking cylinder to the angle of specifying, and just can trigger this circuit, allows this circuit ON.
Single-chip microcomputer, single-chip microcomputer is a kind of integrated circuit (IC) chip, is to adopt very large scale integration technology to be integrated into the little and perfect microcomputer system of that one piece of silicon chip is formed having the central processor CPU random access memory ram of data-handling capacity, read only memory ROM, multiple I/O mouth and the function such as interrupt system, timer/timer (may also comprise the circuit such as display driver circuit, pulse-width modulation circuit, analog multiplexer, A/D converter).
Bluetooth module, has the function of Bluetooth communication of standard, can carry out data communication with other bluetooth equipment.
Hummer, provides the function of auditory tone cues when controlling various authority for mobile device.
In addition, also there are necessary peripheral circuit and electronic devices and components, comprising: battery, electric capacity, triode, resistance, LED(light emitting diode), circuit board.
The method of controlling locking system by mobile equipment authority, the flow process of adding keeper is first:
1) user's turn on-switch circuit, and the time that maintenance is specified;
2) locking system open function set up wireless connections with mobile device;
3) mobile device sends request the order of keeper's identity validation to locking system, gives mobile device feedback after locking system receives;
4) mobile device sends own identification characteristic information to locking system, preserves the identity characteristic information of mobile device after locking system receives, and gives mobile device feedback.
The method of controlling locking system by mobile equipment authority, the flow process of being added/being deleted user by keeper's mobile device is:
1) user's turn on-switch circuit, and the time that maintenance is specified;
2) locking system open function set up wireless connections with mobile device;
3) mobile device and locking system carry out the discriminating of both sides' identity characteristic information;
4) mobile device sends request interpolation/deletion user command to locking system, gives mobile device feedback after locking system receives;
5) mobile device sends the user identity characteristic information being added/deleting, and locking system receives rear preservation and gives mobile device feedback.
The method of controlling locking system by mobile equipment authority, reading the flow process of unblanking to record by keeper's mobile device is:
1) user's turn on-switch circuit, and the time that maintenance is specified;
2) locking system open function set up wireless connections with mobile device;
3) mobile device and locking system carry out the discriminating of both sides' identity characteristic information;
4) mobile device sends request reading to locking system and to unblank record order, gives mobile device feedback after locking system receives;
5) locking system sends to mobile device and unblanks to record data, gives mobile device feedback after locking system receives.
The method of controlling locking system by mobile equipment authority, the flow process being arranged locking system basic parameter by keeper's mobile device is:
1) user's turn on-switch circuit, and the time that maintenance is specified;
2) locking system open function set up wireless connections with mobile device;
3) mobile device and locking system carry out the discriminating of both sides' identity characteristic information;
4) mobile device sends request the setting command of the parameter that request is arranged to locking system, gives mobile device feedback after locking system receives;
5) mobile device sends new parameter information to locking system, feeds back after locking system receives based on mobile device.
In the method for above-mentioned controlling locking system by mobile equipment authority, the mode of turn on-switch circuit is: insert the time that lock core rotation also keeps to the angle of specifying specifying by key.
In the method for above-mentioned controlling locking system by mobile equipment authority, the mode of turn on-switch circuit can also be: on-off circuit is arranged in the position not using speciality tool to touch, and user uses speciality tool from inner side touching or takes the time that locking system turn on-switch circuit also keeps specifying apart.
In the method for above-mentioned controlling locking system by mobile equipment authority, the time that user's turn on-switch circuit keeps, can set according to different environment.
In the method for above-mentioned controlling locking system by mobile equipment authority, the implementing procedure of step and success or not, the sound that all can be sent by hummer is pointed out.
In the method for above-mentioned controlling locking system by mobile equipment authority, both sides' identity characteristic information, comprises one or more the combination in the enciphered data of account, password, device name, the MAC Address of equipment, equipment.
Use the present invention, because each setting all needs the cooperation of switch and keeper's mobile phone, so safer, therefore without the need to adding the mechanism of a cryptographic key protection on handset program again.Simultaneously because the cooperation of switch, when only having a keeper, and after keeper's mobile phone loss, can factory reset very easily.
Accompanying drawing explanation
Fig. 1 is composition structural representation of the present invention.
Fig. 2 is the process flow diagram that the present invention adds keeper first.
Fig. 3 is the process flow diagram that the present invention increases/delete user.
Fig. 4 is that the present invention reads the process flow diagram unblanking to record.
Fig. 5 is the volume process flow diagram that the present invention arranges basic parameter.
Embodiment
Fig. 1 is composition structural representation of the present invention.In FIG, on-off circuit 101 is for opening and closing the administrator right of locking system, when on-off circuit 101 is opened time, can the demand working circuit of specifying, single-chip microcomputer 202 above circuit board 201, the connection of circuit can be detected fast, if bluetooth module 203 itself is not opened, then can automatically open bluetooth module 203.Bluetooth module 203 also can use other wireless communication module to replace, as wifi in some circumstances.Bluetooth module 203, for carrying out data communication with mobile device 301, accepts and sends the data command etc. of encryption.Mobile device 301 has various ways, can be any electronic equipment with function of Bluetooth communication.Hummer 204 is for pointing out various correct or wrong operation.It should be noted that, except above-mentioned electronic component, the present invention also needs other electronic components 205 of some peripheries to support running, comprise resistance, electric capacity, battery, transformation chip, low voltage test chip etc., should be appreciated that as one of skill in the art, these parts do not marked equally, for no other reason than that in the present invention, basic role for these components and parts belongs to known technology part, so be not described in detail.
Meanwhile, locking system of the present invention, except circuit part, also comprises the part of some machineries, and as lock body, spanner, shell etc., these parts are because belong to known technology part equally, so the present invention is also not described in detail here.
Fig. 2 is the process flow diagram that the present invention adds keeper first, and the present invention adds keeper first to be needed through following steps.
Step 201: user's turn on-switch circuit, and the time that maintenance is specified.Locking system itself carries key and lock core, the structure of lock core is existing technology, only need to insert key, lock core can be allowed to rotate, and the plectrum switch in the present invention, itself be in a position on lock core side, this position can be arranged arbitrarily according to producer's internal mechanical structure and adjusts, but prerequisite is this position lock core can be allowed to rotate after, outstanding part directly can promote this switch and close.Simultaneously, the present invention also requires the time that switch cuts out, the time of specifying must be reached, this time of specifying can be arranged according to demand, as 5 seconds-10 seconds, insert key as user and rotate to the angle of specifying, allowing the outshot of lock core touch plectrum switch and close, and keep closed condition 5-10 second, namely representative starts step 201 of the present invention.In this flow process, present invention also offers a kind of mode: on-off circuit is arranged in the position that locking system uses speciality tool just can touch, user uses speciality tool or takes locking system apart and just can trigger this on-off circuit in the inner side of locking system.
Step 202: locking system open function also sets up wireless connections with mobile device.After the flow process of previous step, single-chip microcomputer can detect the closure state of plectrum switch automatically, after the closed time meets the time of specifying, the radio communication function of single-chip microcomputer and open-and-close system, and use this function and mobile device to set up wireless connections.
Step 203: mobile device sends request the order of keeper's identity validation to locking system, gives mobile device feedback after locking system receives.After locking system and mobile device set up wireless connections, mobile device sends request the order of keeper's identity validation simultaneously.After locking system receives the data message of mobile device, give mobile device feedback.
Step 204: mobile device sends own identification characteristic information to locking system.User on the mobile apparatus face input wants the account number cipher of use, and this account and password are sent to locking system by mobile device, and account number cipher is preserved after receiving this account number cipher by locking system, and gives mobile device feedback.In some circumstances, mobile device sends to the identity information of locking system, can also comprise the MAC Address of self, device name etc.Mobile device also can keep the information such as MAC Address, device name of locking system simultaneously, so that judge for locking system time next time unblanks.
Fig. 3 is the process flow diagram that the present invention increases/delete user, and the present invention adds and deletes the method for user, mainly comprises following step.
Step 301: user's turn on-switch circuit, and the time that maintenance is specified.Locking system itself carries key and lock core, the structure of lock core is existing technology, only need to insert key, lock core can be allowed to rotate, and the plectrum switch in the present invention, itself be in a position on lock core side, this position can be arranged arbitrarily according to producer's internal mechanical structure and adjusts, but prerequisite is this position lock core can be allowed to rotate after, outstanding part directly can promote this switch and close.Simultaneously, the present invention also requires the time that switch cuts out, the time of specifying must be reached, this time of specifying can be arranged according to demand, as 5 seconds-10 seconds, insert key as user and rotate to the angle of specifying, allowing the outshot of lock core touch plectrum switch and close, and keep closed condition 5-10 second, namely representative starts step 301 of the present invention.In this flow process, present invention also offers a kind of mode: on-off circuit is arranged in the position that locking system uses speciality tool just can touch, user uses speciality tool or takes locking system apart and just can trigger this on-off circuit in the inner side of locking system.
Step 302: locking system open function also sets up wireless connections with mobile device.After the flow process of previous step, single-chip microcomputer can detect the closure state of plectrum switch automatically, after the closed time meets the time of specifying, the radio communication function of single-chip microcomputer and open-and-close system, and use this function and mobile device to set up wireless connections.
Step 303: mobile device and locking system carry out the discriminating of both sides' identity characteristic information.Because mobile device and locking system, itself all will carry out data confidentiality exchange, so before mobile device and locking system carry out exchanges data, the authentication of both sides must be carried out, mobile device must confirm that the locking system connected with oneself has data record at the data store internal of oneself, the locking system of exchanges data can be carried out, and locking system must confirm that the mobile device connected with oneself has data record at the data store internal of oneself, the mobile device of exchanges data can be carried out, if the proof of identity mistake of any one party of both sides, a then relative side, a side not to mistake sends the data of encrypting.The process of both sides' proof of identity here; realized by the discriminating of both sides' identity characteristic information, and the discriminating of both sides' identity characteristic information, according to diverse ways; there is different forms; because this part discrimination method content belongs to existing technology, do not belong to protection content of the present invention, so the present invention does not explain; but as the personnel in industry; should be appreciated that, this part technology, exists.
Step 304: mobile device sends request interpolation/deletion user command to locking system, gives mobile device feedback after locking system receives.After locking system and mobile device set up wireless connections, mobile device sends request the order of keeper's identity validation simultaneously.After locking system receives the command information of mobile device, give mobile device feedback.
Step: 305: mobile device sends the user identity characteristic information being added/deleting to locking system.If user wants to add user, just the identity characteristic information of the user added is wanted in face input on the mobile apparatus, comprises one or more the combination in the enciphered data of account, password, device name, the MAC Address of equipment, equipment.Account number cipher is preserved after receiving this account number cipher by locking system, and gives mobile device feedback.If user wants to delete user, just only needing to read the user list inside locking system, deleting wanting the user deleted from list.After user adds user, these identity characteristic information can be preserved by locking system automatically, there is satisfactory mobile device around if searched, then can be connected with mobile device, then perform the flow process of locking of unblanking.
Fig. 4 is that the present invention reads the process flow diagram unblanking to record.The present invention reads the method unblanking to record, and mainly comprises the following steps.
Step 401: user's turn on-switch circuit, and the time that maintenance is specified.Locking system itself carries key and lock core, the structure of lock core is existing technology, only need to insert key, lock core can be allowed to rotate, and the plectrum switch in the present invention, itself be in a position on lock core side, this position can be arranged arbitrarily according to producer's internal mechanical structure and adjusts, but prerequisite is this position lock core can be allowed to rotate after, outstanding part directly can promote this switch and close.Simultaneously, the present invention also requires the time that switch cuts out, the time of specifying must be reached, this time of specifying can be arranged according to demand, as 5 seconds-10 seconds, insert key as user and rotate to the angle of specifying, allowing the outshot of lock core touch plectrum switch and close, and keep closed condition 5-10 second, namely representative starts step 401 of the present invention.In this flow process, present invention also offers a kind of mode: on-off circuit is arranged in the position that locking system uses speciality tool just can touch, user uses speciality tool or takes locking system apart and just can trigger this on-off circuit in the inner side of locking system.
Step 402: locking system open function also sets up wireless connections with mobile device.After the flow process of previous step, single-chip microcomputer can detect the closure state of plectrum switch automatically, after the closed time meets the time of specifying, the radio communication function of single-chip microcomputer and open-and-close system, and use this function and mobile device to set up wireless connections.
Step 403: mobile device and locking system carry out the discriminating of both sides' identity characteristic information.Because mobile device and locking system, itself all will carry out data confidentiality exchange, so before mobile device and locking system carry out exchanges data, the authentication of both sides must be carried out, mobile device must confirm that the locking system connected with oneself has data record at the data store internal of oneself, the locking system of exchanges data can be carried out, and locking system must confirm that the mobile device connected with oneself has data record at the data store internal of oneself, the mobile device of exchanges data can be carried out, if the proof of identity mistake of any one party of both sides, a then relative side, a side not to mistake sends the data of encrypting.The process of both sides' proof of identity here; realized by the discriminating of both sides' identity characteristic information, and the discriminating of both sides' identity characteristic information, according to diverse ways; there is different forms; because this part discrimination method content belongs to existing technology, do not belong to protection content of the present invention, so the present invention does not explain; but as the personnel in industry; should be appreciated that, this part technology, exists.
Step 404: mobile device sends request reading to locking system and to unblank record order, gives mobile device feedback after locking system receives.After locking system and mobile device set up wireless connections, mobile device sends request reading simultaneously and to unblank record order.After locking system receives the command information of mobile device, give mobile device feedback.
Step: 405: locking system sends to mobile device and unblanks to record data.Mobile device and locking system are after last step, locking system can automatically the record of unblanking of all mobile devices of storage inside, mobile device is sent to according to the form pre-set, after mobile device receives these data according to the format permutation pre-set, can according to the format analysis pre-set out, then face display on the mobile apparatus, checks for user.
Fig. 5 is the volume process flow diagram that the present invention arranges basic parameter.The present invention arranges basic parameter mainly through following steps.
Step 501: user's turn on-switch circuit, and the time that maintenance is specified.Locking system itself carries key and lock core, the structure of lock core is existing technology, only need to insert key, lock core can be allowed to rotate, and the plectrum switch in the present invention, itself be in a position on lock core side, this position can be arranged arbitrarily according to producer's internal mechanical structure and adjusts, but prerequisite is this position lock core can be allowed to rotate after, outstanding part directly can promote this switch and close.Simultaneously, the present invention also requires the time that switch cuts out, the time of specifying must be reached, this time of specifying can be arranged according to demand, as 5 seconds-10 seconds, insert key as user and rotate to the angle of specifying, allowing the outshot of lock core touch plectrum switch and close, and keep closed condition 5-10 second, namely representative starts step 501 of the present invention.In this flow process, present invention also offers a kind of mode: on-off circuit is arranged in the position that locking system uses speciality tool just can touch, user uses speciality tool or takes locking system apart and just can trigger this on-off circuit in the inner side of locking system.
Step 502: locking system open function also sets up wireless connections with mobile device.After the flow process of previous step, single-chip microcomputer can detect the closure state of plectrum switch automatically, after the closed time meets the time of specifying, the radio communication function of single-chip microcomputer and open-and-close system, and use this function and mobile device to set up wireless connections.
Step 503: mobile device and locking system carry out the discriminating of both sides' identity characteristic information.Because mobile device and locking system, itself all will carry out data confidentiality exchange, so before mobile device and locking system carry out exchanges data, the authentication of both sides must be carried out, mobile device must confirm that the locking system connected with oneself has data record at the data store internal of oneself, the locking system of exchanges data can be carried out, and locking system must confirm that the mobile device connected with oneself has data record at the data store internal of oneself, the mobile device of exchanges data can be carried out, if the proof of identity mistake of any one party of both sides, a then relative side, a side not to mistake sends the data of encrypting.The process of both sides' proof of identity here; realized by the discriminating of both sides' identity characteristic information, and the discriminating of both sides' identity characteristic information, according to diverse ways; there is different forms; because this part discrimination method content belongs to existing technology, do not belong to protection content of the present invention, so the present invention does not explain; but as the personnel in industry; should be appreciated that, this part technology, exists.
Step 504: mobile device sends request the setting command of the parameter of setting to locking system, gives mobile device feedback after locking system receives.After locking system and mobile device set up wireless connections, mobile device sends request parameters order simultaneously.After locking system receives the command information of mobile device, give mobile device feedback.Wherein ask parameters order, the difference of the parameter arranged as required, has different command codes.
Step: 505: mobile device sends new parameter information to locking system.Mobile device and locking system are after last step, mobile device can automatically new parameter information, locking system is sent to according to the form pre-set, after locking system receives these data according to the format permutation pre-set, according to the format analysis pre-set out, can then be saved to the lane database of locking system inside.
Claims (5)
1. the method for controlling locking system by mobile equipment authority, is characterized in that, comprising:
1) keeper is added first: a) user's turn on-switch circuit, and the time that maintenance is specified; B) locking system open function set up wireless connections with mobile device; C) mobile device sends request the order of keeper's identity validation to locking system, gives mobile device feedback after locking system receives; D) mobile device sends own identification characteristic information to locking system, preserves the identity characteristic information of mobile device after locking system receives, and gives mobile device feedback;
2) add/delete user by keeper's mobile device: a) user's turn on-switch circuit, and the time that maintenance is specified; B) locking system open function set up wireless connections with mobile device; C) mobile device and locking system carry out the discriminating of both sides' identity characteristic information; D) mobile device sends request interpolation/deletion user command to locking system, gives mobile device feedback after locking system receives; E) mobile device sends the user identity characteristic information being added/deleting, and locking system receives rear preservation and gives mobile device feedback;
3) read by keeper's mobile device record of unblanking: a) user's turn on-switch circuit, and the time that maintenance is specified; B) locking system open function set up wireless connections with mobile device; C) mobile device and locking system carry out the discriminating of both sides' identity characteristic information; D) mobile device sends request reading to locking system and to unblank record order, gives mobile device feedback after locking system receives; E) locking system sends to mobile device and unblanks to record data, gives mobile device feedback after locking system receives;
4) locking system basic parameter is set by keeper's mobile device: a) user's turn on-switch circuit, and the time that maintenance is specified; Locking system open function also sets up wireless connections with mobile device; B) mobile device and locking system carry out the discriminating of both sides' identity characteristic information; C) mobile device sends request the order of parameters to locking system, gives mobile device feedback after locking system receives; D) mobile device sends new parameter information to locking system, gives mobile device feedback after locking system receives.
2. the method for controlling locking system by mobile equipment authority according to claim 1, it is characterized in that: the mode of turn on-switch circuit can also be: on-off circuit is arranged in the position not using speciality tool to touch, user uses speciality tool from inner side touching or takes the time that locking system turn on-switch circuit also keeps specifying apart.
3. the method for controlling locking system by mobile equipment authority according to claim 1, is characterized in that: the time that user's turn on-switch circuit keeps, and can set according to different environment.
4. the method for controlling locking system by mobile equipment authority according to claim 1, is characterized in that: implementing procedure in steps and success or not, the sound that all can be sent by hummer is pointed out.
5. the method for controlling locking system by mobile equipment authority according to claim 1, is characterized in that: both sides' identity characteristic information, comprises one or more the combination in the enciphered data of account, password, device name, the MAC Address of equipment, equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210455033.6A CN102945574B (en) | 2012-11-14 | 2012-11-14 | Device and method for controlling locking system permission by mobile equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210455033.6A CN102945574B (en) | 2012-11-14 | 2012-11-14 | Device and method for controlling locking system permission by mobile equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102945574A CN102945574A (en) | 2013-02-27 |
CN102945574B true CN102945574B (en) | 2015-04-08 |
Family
ID=47728512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210455033.6A Active CN102945574B (en) | 2012-11-14 | 2012-11-14 | Device and method for controlling locking system permission by mobile equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102945574B (en) |
Families Citing this family (9)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI530610B (en) * | 2013-04-23 | 2016-04-21 | 堂奧創新股份有限公司 | Access control system using near field communication |
CN104637125B (en) * | 2013-11-11 | 2019-02-26 | 比亚迪股份有限公司 | A kind of system and method for mobile terminal control vehicle |
CN104881909B (en) * | 2014-02-28 | 2017-08-04 | 上海斐讯数据通信技术有限公司 | A kind of system and method for intelligent control gate inhibition |
CN104794798A (en) * | 2015-05-11 | 2015-07-22 | 河海大学常州校区 | Bluetooth door lock control device based on mobile intelligent terminal and management method thereof |
CN105118120A (en) * | 2015-07-31 | 2015-12-02 | 东莞安尔发智能科技股份有限公司 | An intelligent lock system and its method for automatically setting parameters through WIFI at close range |
CN105096421A (en) * | 2015-07-31 | 2015-11-25 | 东莞安尔发智能科技股份有限公司 | An intelligent lock system and its method for automatically setting parameters through bluetooth at close range |
CN111563980B (en) * | 2019-01-26 | 2022-04-29 | 合肥智辉空间科技有限责任公司 | Bluetooth lock key generation and authentication method |
CN110060401A (en) * | 2019-04-29 | 2019-07-26 | 中国电子信息产业集团有限公司第六研究所 | Two dimensional code method for unlocking and device |
CN112950818A (en) * | 2021-03-23 | 2021-06-11 | 德施曼机电(中国)有限公司 | Intelligent lock management system and method for mechanical key projection recognition |
Citations (4)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1674495A (en) * | 2005-04-07 | 2005-09-28 | 肖禄生 | Uncopying several-into-one identification method and apparatus |
CN1744641A (en) * | 2004-08-31 | 2006-03-08 | 乐金电子(中国)研究开发中心有限公司 | Mobile communication terminal based locking method and system |
CN102542649A (en) * | 2012-03-11 | 2012-07-04 | 李凯 | Method for controlling locking system by mobile equipment |
CN102677987A (en) * | 2012-05-17 | 2012-09-19 | 黎荣金 | Control device of intelligent electronic password lock, control method thereof and management system thereof |
-
2012
- 2012-11-14 CN CN201210455033.6A patent/CN102945574B/en active Active
Patent Citations (4)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1744641A (en) * | 2004-08-31 | 2006-03-08 | 乐金电子(中国)研究开发中心有限公司 | Mobile communication terminal based locking method and system |
CN1674495A (en) * | 2005-04-07 | 2005-09-28 | 肖禄生 | Uncopying several-into-one identification method and apparatus |
CN102542649A (en) * | 2012-03-11 | 2012-07-04 | 李凯 | Method for controlling locking system by mobile equipment |
CN102677987A (en) * | 2012-05-17 | 2012-09-19 | 黎荣金 | Control device of intelligent electronic password lock, control method thereof and management system thereof |
Also Published As
Publication number | Publication date |
---|---|
CN102945574A (en) | 2013-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102945574B (en) | 2015-04-08 | Device and method for controlling locking system permission by mobile equipment |
EP3605475A1 (en) | 2020-02-05 | Secure communication method based on smart door lock system and smart door lock system thereof |
CN102936980B (en) | 2015-02-11 | Method and device for controlling electronic lock |
CN105205898A (en) | 2015-12-30 | Electronic code permission management system for intelligent lock |
CN105184935B (en) | 2018-05-04 | It is a kind of can wechat share the blue-tooth intelligence lock system of password |
CN104636679B (en) | 2018-07-24 | Method and apparatus for controlling the access to encryption data |
US9256723B2 (en) | 2016-02-09 | Security key using multi-OTP, security service apparatus, security system |
US20140136840A1 (en) | 2014-05-15 | Computer system for storing and retrieval of encrypted data items using a tablet computer and computer-implemented method |
CN104282061B (en) | 2017-05-24 | Unlocking method for safety intelligent lock system |
CN104299300B (en) | 2016-09-07 | The unblanking and close locking method of safety intelligent lock system based on NFC |
CN104952128A (en) | 2015-09-30 | Intelligent handheld terminal based electronic unlocking system and unlocking method thereof |
CN104182676A (en) | 2014-12-03 | Intelligent terminal data encryption method and device |
CN106255975A (en) | 2016-12-21 | Method and system for securing electronic data exchange between an industrial programmable device and a portable programmable device |
CN103985169B (en) | 2016-03-09 | Handheld terminal and USB port is utilized to carry out door lock open and close system and control method |
CN109905869A (en) | 2019-06-18 | Data transmission method between a kind of charging equipment and smart machine |
CN104636682A (en) | 2015-05-20 | Password management system and method based on hardware device |
CA3054934A1 (en) | 2020-03-20 | Key fob |
CN104282060B (en) | 2016-10-19 | A kind of method for unlocking of safety intelligent lock system |
CN106033625A (en) | 2016-10-19 | Lockset, mobile terminal, lockset control method, and lockset control system |
CN103838988A (en) | 2014-06-04 | Information security protection method and device |
CN114550353A (en) | 2022-05-27 | Intelligent lock control system of transformer substation |
CN205140033U (en) | 2016-04-06 | Electron password privilege management system of intelligence lock |
CN104392525A (en) | 2015-03-04 | Intelligent lock system |
CN102202057B (en) | 2013-11-27 | System and method for safely dumping data of mobile memory |
CN109035501A (en) | 2018-12-18 | A kind of intelligent door lock and intelligent door lock system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2013-02-27 | C06 | Publication | |
2013-02-27 | PB01 | Publication | |
2013-03-27 | C10 | Entry into substantive examination | |
2013-03-27 | SE01 | Entry into force of request for substantive examination | |
2015-04-08 | C14 | Grant of patent or utility model | |
2015-04-08 | GR01 | Patent grant | |
2017-08-22 | TR01 | Transfer of patent right |
Effective date of registration: 20170803 Address after: Hangzhou City, Zhejiang province Yuhang District 311121 Street Wuchang Wenyi Road No. 998 Zhejiang overseas high-level personnel innovation park building 17-4 Patentee after: Hangzhou brain intelligent control technology Co.,Ltd. Address before: Hangzhou City, Zhejiang province 310023 Xihu District Road No. 502 in forest 18-1-502 Patentee before: Li Kai |
2017-08-22 | TR01 | Transfer of patent right | |
2023-02-14 | CP01 | Change in the name or title of a patent holder |
Address after: Floor 17-4, Zhejiang Overseas High-level Talents Innovation Park, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province, 311121 Patentee after: Hangzhou Sainao Intelligent Technology Co.,Ltd. Address before: Floor 17-4, Zhejiang Overseas High-level Talents Innovation Park, No. 998, Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province, 311121 Patentee before: Hangzhou brain intelligent control technology Co.,Ltd. |
2023-02-14 | CP01 | Change in the name or title of a patent holder |