Method and device for controlling intelligent lock and intelligent lock

文档序号:192864 发布日期:2021-11-02 浏览:49次 中文

阅读说明:本技术 控制智能锁的方法、装置以及智能锁 (Method and device for controlling intelligent lock and intelligent lock ) 是由 孔维志 于 2020-04-30 设计创作,主要内容包括:本申请实施例公开了一种控制智能锁的方法、装置、智能锁以及存储介质。所述方法包括:检测是否触发有开锁请求操作;若检测到有所述开锁请求操作,检测当前时刻是否处于免验证时间段;若当前时刻处于所述免验证时间段,执行开锁操作。通过设置免验证开锁时间段的这种方式可以使得在免验证时间段内,期望进行触发智能锁开锁的用户不需要进行身份验证,就可以进行开锁操作,进而提升了用户体验。(The embodiment of the application discloses a method and a device for controlling an intelligent lock, the intelligent lock and a storage medium. The method comprises the following steps: detecting whether an unlocking request operation is triggered or not; if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period; and if the current time is in the verification-free time period, executing unlocking operation. Through the mode of setting up the verification-free time quantum of unblanking, can be so that in the verification-free time quantum, the user who expects to trigger the intelligence lock and unblank need not carry out authentication, just can unblank the operation, and then has promoted user experience.)

1. A method of controlling a smart lock, the method comprising:

detecting whether an unlocking request operation is triggered or not;

if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period;

and if the current time is in the verification-free time period, executing unlocking operation.

2. The method of claim 1, wherein before detecting whether an unlock request operation is triggered, further comprising:

acquiring the current verification-free unlocking mode grade;

and determining the time length of the current verification-free time period according to the current verification-free unlocking mode grade.

3. The method of claim 2, wherein prior to determining the length of time of the current authentication-free time period based on the current authentication-free unlock mode class, further comprising:

acquiring a preset verification-free unlocking mode grade and a preset verification-free time period corresponding to the preset verification-free unlocking mode grade from a target terminal device;

storing the preset verification-free unlocking mode grade and the time length of a verification-free time period corresponding to the preset verification-free unlocking mode grade;

the determining the time length of the current authentication-free time period according to the current authentication-free unlocking mode level includes:

and determining the time length of the current verification-free time period based on the stored time length of the verification-free time period corresponding to the preset verification-free unlocking mode grade and the current verification-free unlocking mode grade.

4. The method of claim 2, wherein obtaining the current authentication-free unlock mode level comprises:

acquiring the state of a bolt of the current intelligent lock;

and acquiring a verification-free unlocking mode grade corresponding to the state of the lock tongue as a current verification-free unlocking mode grade, wherein the verification-free unlocking mode grades corresponding to different states of the lock tongue are different, and the verification-free time period lengths corresponding to different verification-free unlocking mode grades are different.

5. The method of claim 4, wherein before obtaining the state of the bolt of the current smart lock, further comprising:

acquiring the on-off state of the verification-free unlocking mode of the intelligent lock from the target terminal equipment;

and if the verification-free unlocking mode of the intelligent lock is the unlocking state, acquiring the state of the bolt of the current intelligent lock.

6. The method of claim 4, wherein the locking bolts include a first locking bolt, a second locking bolt, and a third locking bolt; the acquiring of the verification-free unlocking mode grade corresponding to the state of the lock tongue as the current verification-free unlocking mode grade comprises:

if the state of the first bolt is an extended state, the states of the second bolt and the third bolt are retracted states, and the current verification-free unlocking mode level is acquired to be a first level;

if the states of the first bolt and the second bolt are both in an extending state, the state of the third bolt is in a retracting state, and the current verification-free unlocking mode level is acquired to be a second level;

if the states of the first bolt and the third bolt are extension states and the state of the second bolt is retraction state, acquiring that the current verification-free unlocking mode level is a third level;

if the states of the first bolt, the second bolt and the third bolt are all extension states, acquiring that the current verification-free unlocking mode level is a fourth level;

wherein the first level is higher in priority than the second level, the second level is higher in priority than the third level, and the third level is higher in priority than the fourth level.

7. The method according to any of claims 1-6, wherein said detecting whether the current time is before the authentication-free time period further comprises:

if the unlocking request operation is detected, judging whether a verification-free unlocking mode of the intelligent lock is unlocked or not;

and if the current time is in the verification-free time period, executing the detection to judge whether the current time is in the verification-free time period.

8. An apparatus for controlling a smart lock, the apparatus comprising:

the unlocking request detection unit is used for detecting whether an unlocking request operation is triggered or not;

the time detection unit is used for detecting whether the current time is in a verification-free time period or not if the unlocking request operation is detected;

and the control unit is used for executing unlocking operation if the current time is in the verification-free time period.

9. An intelligent lock, comprising one or more processors and memory; one or more programs stored in the memory and configured to be executed by the one or more processors to perform the method of any of claims 1-7.

10. A computer-readable storage medium, having program code stored therein, wherein the program code when executed by a processor performs the method of any of claims 1-7.

Technical Field

The application belongs to the technical field of intelligent locks, and particularly relates to a method and a device for controlling an intelligent lock, the intelligent lock and a storage medium.

Background

In recent years, with the development of the smart lock industry, more and more consumers use smart locks, so the development of smart locks also receives various concerns. Meanwhile, the intelligent lock can provide various humanized functions along with the use scene of the user. The intelligent lock generally verifies the identity through a mode of inputting a password through a physical key or collecting a fingerprint through fingerprint equipment, the intelligent lock can be unlocked after the identity is verified, if the user needs to repeatedly open/close the lock within a period of time, the user needs to repeatedly input verification information to carry out unlocking operation after identity verification, and user experience is poor.

Disclosure of Invention

In view of the above problems, the present application provides a method and an apparatus for controlling a smart lock, and a storage medium to improve the above problems.

In a first aspect, an embodiment of the present application provides a method for controlling an intelligent lock, where the method includes: detecting whether an unlocking request operation is triggered or not; if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period; and if the current time is in the verification-free time period, executing unlocking operation.

In a second aspect, an embodiment of the present application provides an apparatus for controlling an intelligent lock, where the apparatus includes: the unlocking request detection unit is used for detecting whether an unlocking request operation is triggered or not; the time detection unit is used for detecting whether the current time is in a verification-free time period or not if the unlocking request operation is detected; and the control unit is used for executing unlocking operation if the current time is in the verification-free time period.

In a third aspect, an embodiment of the present application provides an intelligent lock, including one or more processors and a memory; one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the methods described above.

In a fourth aspect, the present application provides a computer-readable storage medium, in which a program code is stored, wherein the program code performs the above-mentioned method when running.

The embodiment of the application provides a method and a device for controlling an intelligent lock, the intelligent lock and a storage medium. Firstly, whether an unlocking request operation is triggered or not is detected, if the unlocking request operation is detected, whether the current time is in a verification-free time period or not is detected, and if the current time is in the verification-free time period, the unlocking operation is executed. Through the mode of setting up the verification-free time quantum of unblanking, can be so that in the verification-free time quantum, the user who expects to trigger the intelligence lock and unblank need not carry out authentication, just can unblank the operation, and then has promoted user experience.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.

Fig. 1 is a schematic structural diagram of a network system according to an embodiment of the present application;

FIG. 2 is a flow chart illustrating a method for controlling a smart lock according to an embodiment of the present application;

FIG. 3 is a flow chart illustrating a method for controlling a smart lock according to another embodiment of the present application;

FIG. 4 is a flow chart illustrating a method for controlling a smart lock according to yet another embodiment of the present application;

FIG. 5 is a schematic diagram illustrating a bolt and a bolt hole of an intelligent lock according to yet another embodiment of the present application;

FIG. 6 is a flow chart illustrating a method for controlling a smart lock according to yet another embodiment of the present application;

FIG. 7 is a flow chart illustrating a method for controlling a smart lock according to yet another embodiment of the present application;

fig. 8 is a block diagram illustrating a structure of an apparatus for controlling a smart lock according to an embodiment of the present application;

fig. 9 is a block diagram illustrating a structure of an apparatus for controlling a smart lock according to an embodiment of the present application;

fig. 10 is a block diagram illustrating a structure of an intelligent lock according to an embodiment of the present application;

FIG. 11 shows a block diagram of a smart lock for implementing an unlocking method according to an embodiment of the present application in real time;

fig. 12 is a diagram illustrating a hardware structure of a mobile terminal implementing various embodiments of the present application.

Detailed Description

The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

With the development of the smart lock industry, more and more consumers use smart locks. Meanwhile, the intelligent lock can provide various humanized functions along with different use scenes of the user. The intelligent lock generally verifies the identity through inputting a password through a physical key or collecting a fingerprint through a fingerprint device, and the intelligent lock is unlocked after the identity is verified.

In the research process of the related method for controlling the intelligent lock, it is found that if the user needs to repeatedly open/close the lock within a period of time, the user needs to repeatedly input authentication information to perform identity authentication before unlocking operation is performed, and user experience is still to be improved.

Therefore, the inventor provides an unlocking method, an unlocking device, an intelligent lock and a storage medium, wherein the unlocking method, the unlocking device, the intelligent lock and the storage medium are used for detecting whether the unlocking request operation is triggered or not, detecting whether the current time is in a verification-free time period or not if the unlocking request operation is detected, executing the unlocking operation if the current time is in the verification-free time period, and enabling a user who expects to trigger the unlocking of the intelligent lock to be capable of unlocking the intelligent lock without performing identity verification in the verification-free time period.

A network system according to an embodiment of the present application will be described below.

Referring to fig. 1, a network system 10 according to an embodiment of the present application includes: target terminal device 11, server 12, gateway 13, smart lock 14 and router 15. The target terminal device may be any device having communication and storage functions, for example: the smart phone, the desktop computer, the notebook computer, the tablet computer or other smart communication devices with network connection functions. The server 12 may be a network access server, a database server, a cloud server, or the like. The optional gateway 13 may be built based on a Zigbee protocol, and the intelligent lock 14 may be a device that is added in the gateway 13 in advance, for example, the intelligent lock 14 may be a device in a suite to which the gateway 13 belongs when the gateway 13 leaves a factory; or a device subsequently connected to the gateway 13 by a user operation.

Optionally, a client capable of managing the smart home device is installed in the target terminal device 11, where the client may be an application client (such as a mobile phone APP) or a web page client, and is not limited herein.

Optionally, the intelligent lock 14 may establish a network connection with the gateway 13 based on the Zigbee protocol, so as to join in the Zigbee network; the intelligent lock 14 may also establish a network connection with the gateway 13 through wireless communication technologies such as WIFI or bluetooth.

Both the gateway 13 and the target terminal device 11 may be connected to the router 15, and may access the ethernet through the router 15, and the router 15 may access the server through wired or wireless communication connection. For example, the gateway 13 and the target terminal device 11 may store the acquired information in the server 12. Optionally, the target terminal device 11 may also establish a network connection with the server 12 through 2G/3G/4G/5G, WIFI, so as to obtain data sent by the server 12.

Alternatively, the local area network path shown in fig. 1 indicates that the target terminal device 11 is in the same local area network as the router 15 and the gateway 13, and the wide area network path indicates that the target terminal device 11 is in the same wide area network as the router 15 and the gateway 13. When the target terminal device 11 is in the same local area network as the router 15 and the gateway 13, the target terminal device 11 may interact with the gateway 13 and the intelligent lock 14 connected to the gateway 13 through a local area network path as shown in fig. 1; it is also possible to interact with the gateway 13 and the smart lock 14 connected to the gateway 13 via a wide area network path as shown in fig. 1. When the target terminal device 11 is not in the same local area network as the router 15 and the gateway 13, the target terminal device 11 may interact with the gateway 13 and the smart lock 14 connected to the gateway 13 through a wide area network path as shown in fig. 1.

Based on the network system described above, embodiments of the present application will be described in detail below with reference to the accompanying drawings.

Referring to fig. 2, a method for controlling an intelligent lock according to an embodiment of the present application includes:

step S110: whether an unlocking request operation is triggered or not is detected.

As one mode, when the smart lock receives an instruction sent by the target terminal device, the smart lock starts to detect whether an unlocking request operation is triggered. Optionally, the intelligent lock may determine whether the received instruction is an instruction for triggering the intelligent lock to start the unlocking request operation by detecting whether the received instruction is the same as a stored instruction for detecting whether the unlocking request operation is triggered. If the two conditions are the same, the intelligent lock starts to detect whether the unlocking request is triggered.

As another mode, the smart lock may detect whether a user inputs a trigger through a key, a screen, or the like of the smart lock to detect whether an instruction of an unlocking request operation is triggered. For example, when the intelligent lock detects that a user inputs a specific password through the intelligent lock key, the intelligent lock starts to detect whether an unlocking request operation is triggered. The specific password can be a password which is pre-entered into the intelligent lock by the user for subsequent authentication.

Step S120: and if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period.

It should be noted that, in the present embodiment, the smart lock may correspond to an authentication-free mode and a non-authentication-free mode. When the intelligent lock is in the authentication-free mode, an authentication-free time period corresponds to the intelligent lock, and the intelligent lock is in the authentication-free mode in the authentication-free time period. When the intelligent lock is in the verification-free mode, any user can unlock the intelligent lock without identity verification, and user experience is improved. The verification-free unlocking mode can be unlocked through a wireless communication technology, such as Bluetooth and WIFI, and then the verification-free unlocking mode can be connected with the target terminal equipment and then sends an instruction, and the verification-free unlocking mode can also be set at an instruction input module of the door lock, such as a key and a screen.

As a mode, when the smart lock detects that there is an unlocking request operation, the smart lock detects whether the verification-free unlocking mode is in an open state, and if the verification-free unlocking mode is in the open state, the smart lock acquires the current time and detects whether the current time is in a verification-free time period.

Optionally, the intelligent lock may start timing and record the current time when detecting that the user performs a door lock closing operation, end timing and record the current time when detecting an unlocking request operation, and determine whether the current time is in the current verification-free time period by calculating a difference between two previous and subsequent times of recording the time.

Step S130: and if the current time is in the verification-free time period, executing unlocking operation.

As a mode, if the current time is in the verification-free time period, any user can directly trigger the intelligent lock to execute the unlocking operation without identity verification.

The method for controlling the intelligent lock comprises the steps of firstly detecting whether an unlocking request operation is triggered or not, detecting whether the current time is in a verification-free time period or not if the unlocking request operation is detected, and executing the unlocking operation if the current time is in the verification-free time period. Through the mode of setting up the verification-free time quantum of unblanking, can be so that in the verification-free time quantum, the user who expects to trigger the intelligence lock and unblank need not carry out authentication, just can unblank the operation, and then has promoted user experience.

Referring to fig. 3, a method for controlling an intelligent lock according to an embodiment of the present application includes:

step S210: and acquiring the current verification-free unlocking mode level.

As a mode, the intelligent lock can be connected with the target terminal device through wireless communication technologies such as bluetooth and WIFI, after the connection, the user can set the level of the verification-free unlocking mode through the target terminal device, and the target terminal device can send the intelligent lock after acquiring the level of the verification-free unlocking mode set by the user, so that the intelligent lock can store the intelligent lock. Wherein the level of the verification-free unlocking mode can be set based on the bolt state of the intelligent lock.

Moreover, the user can set different time lengths of the authentication-free time periods for the authentication-free unlocking modes of different levels through the target terminal device, so that the intelligent lock can determine the time length of the current authentication-free time period by acquiring the level of the current authentication-free unlocking mode.

It should be noted that the authentication-free mode of the smart lock may be opened in response to an instruction sent by the target terminal device as shown in the foregoing, or may be opened in response to a timing event. When the intelligent lock detects that the authentication-free mode is opened, the intelligent lock can start to acquire the current authentication-free unlocking mode level.

Step S220: and determining the time length of the current verification-free time period according to the current verification-free unlocking mode grade.

As one way, different time lengths of the authentication-free time periods are set for the authentication-free unlock modes of different levels in the above-described manner. Therefore, if the smart lock determines the level of the current authentication-free unlocking mode by acquiring the bolt state of the smart lock, the time length of the current authentication-free time period can be determined by the level of the current authentication-free unlocking mode.

Step S230: whether an unlocking request operation is triggered or not is detected.

Step S240: and if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period.

Step S250: and if the current time is in the verification-free time period, executing unlocking operation.

Step S260: and if the operation related to the door closing lock request is detected, the verification-free time period is counted again from the current moment.

As a mode, when the intelligent lock detects that there is a door closing request operation, the intelligent lock starts timing when the intelligent lock is closed for the first time after the verification-free unlocking mode switch state is opened, the timing duration of the intelligent lock is not cleared when the intelligent lock subsequently operates, and the verification-free unlocking mode switch state is closed after the timing duration exceeds the time length of the current verification-free time period. For example, in a movie theater auditorium, a maximum allowable time lag of 20min can be set, a verification-free time period lasting for 20min can be set, any user can directly enter the movie theater auditorium without identity verification in the verification-free time period of 20min, and if the verification-free time period of 20min is exceeded, the intelligent lock needs to be authenticated and then is triggered to unlock the movie theater auditorium.

As another mode, when the intelligent lock detects that there is a door closing request operation, the intelligent lock resets the timing and resets the timing from the time of door closing each time after the state of the verification-free unlocking mode switch is opened, until the state of the verification-free unlocking mode switch is closed after the time of the verification-free unlocking mode switch is reached. For example, daily work, a door which is normally opened during the work time period, such as an office door, can be set in a verification-free unlocking mode, and a worker can freely enter and exit the office, so that inconvenience is reduced, and if the worker needs to enter the office during the work time period, the worker needs to perform identity verification to unlock the door.

The method for controlling the intelligent lock obtains a current verification-free unlocking mode grade, determines the time length of a current verification-free time period according to the current verification-free unlocking mode grade, detects whether an unlocking request operation is triggered, detects whether the current time is in the verification-free time period if the unlocking request operation is detected, executes the unlocking operation if the current time is in the verification-free time period, and times the verification-free time period again from the current time if the related door closing request operation is detected. By setting the verification-free unlocking mode grade and setting different time lengths of verification-free time periods for each verification-free unlocking mode grade, the entering and exiting of personnel in a specific scene can be controlled, and the user experience is improved.

Referring to fig. 4, a method for controlling an intelligent lock according to an embodiment of the present application includes:

step S310: and acquiring a preset verification-free unlocking mode grade and a preset verification-free time period corresponding to the preset verification-free unlocking mode grade from the target terminal equipment.

As a mode, the smart lock may obtain a level of the authentication-free unlocking mode and a time length of a corresponding authentication-free time period set by the user through an application program, an APP, and the like on the target terminal device.

Step S320: and storing the preset verification-free unlocking mode grade acquired from the target terminal equipment and the preset time length of the verification-free time period corresponding to the preset verification-free unlocking mode grade.

As one mode, the smart lock may store the level of the authentication-free unlocking mode set in the target terminal device and the time length of the corresponding authentication-free time period in a storage area of the smart lock.

Step S330: and acquiring the state of the bolt of the current intelligent lock.

It should be noted that the lock tongue is a component of the intelligent lock, and the general lock tongue can be divided into an oblique tongue, a corner tongue, a square tongue and a reverse lock tongue. And each bolt can be extended and retracted, and the state combination of each bolt in the embodiment of the application can reflect the operation action of the intelligent lock and the function of the door lock. The latch bolt can be kept extending all the time, and only when the door lock is closed, the latch bolt can slide into the latch bolt hole and retract, and then can be extended quickly; the angle tongue is kept extending all the time when the door is opened and is kept retracting after the door is closed; the square bolt can extend out after a user lifts the door lock handle, and can retract after the user presses the door lock handle or the user unlocks by using a key; the user can extend or retract the anti-lock bolt through an anti-lock device (such as an anti-lock knob) and can retract after a door lock handle is pressed down or a key is used for door opening operation. For example, fig. 5 shows a schematic diagram of the bolt and the bolt hole of the intelligent lock, and it can be seen from fig. 5 that the latch bolt, the square bolt and the counter bolt all have corresponding latch bolt hole, square bolt hole and counter bolt hole on the door frame, and the corner bolt has no bolt hole because the corresponding position of the corner bolt does not need to leave a hole.

As one mode, when the smart lock detects an operation instruction that triggers detection of the state of the lock tongue of the smart lock, detection of the states of a plurality of lock tongues of the smart lock is started.

In order to more accurately acquire the state of the bolt of the intelligent lock, a state detection sensor may be configured for each bolt, and the state of the bolt of the intelligent lock may be detected in real time by using the state detection sensor, wherein the state detection sensor may include a bolt state detection sensor (which may be used for detecting whether the door is closed or not, or whether the door is in a virtual state), a bolt state detection sensor (which may be used for detecting the state of the door being locked), and a tongue state detection sensor (which may be used for detecting the state of the door being opened or closed).

Step S340: and acquiring a verification-free unlocking mode grade corresponding to the state of the lock tongue as a current verification-free unlocking mode grade, wherein the verification-free unlocking mode grades corresponding to different states of the lock tongue are different, and the verification-free time period lengths corresponding to different verification-free unlocking mode grades are different.

As one way, under the condition that the intelligent lock is closed, the states of the oblique bolt, the square bolt and the inverse locking bolt of the intelligent lock can include the following different conditions, which can include the condition that only the oblique bolt extends out and both the square bolt and the inverse locking bolt retract; the situation that only the latch bolt and the dead bolt extend and the anti-latch bolt retracts can be included; the situation that only the latch bolt and the reverse latch bolt extend and the dead bolt retracts can be included; the conditions of extending the oblique bolt, the square bolt and the reverse locking bolt can be included.

Optionally, the intelligent lock acquires the current state of the bolt of the intelligent lock, and determines the current corresponding level of the verification-free unlocking mode according to the current states of the dead bolt, the dead bolt and the anti-dead bolt.

Step S350: and determining the time length of the current verification-free time period based on the stored time length of the verification-free time period corresponding to the preset verification-free unlocking mode grade and the current verification-free unlocking mode grade.

As one mode, the intelligent lock may determine the level of the verification-free unlocking mode corresponding to the currently acquired lock tongue state by querying the stored lock tongue state of the intelligent lock, and further acquire the time length of the corresponding verification-free time period.

Step S360: whether an unlocking request operation is triggered or not is detected.

Step S370: and if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period.

Step S380: and if the current time is in the verification-free time period, executing unlocking operation.

The method for controlling the intelligent lock obtains the preset verification-free unlocking mode grade from the target terminal equipment, the preset time length of the verification-free time period corresponding to the preset verification-free unlocking mode grade, the preset verification-free unlocking mode grade obtained from the target terminal equipment, the preset verification-free time period corresponding to the preset verification-free unlocking mode grade, the state of the bolt of the current intelligent lock is obtained, the verification-free unlocking mode grade corresponding to the state of the bolt is obtained and serves as the current verification-free unlocking mode grade, and the time length of the current verification-free unlocking mode is determined based on the stored time length of the verification-free time period corresponding to the preset verification-free unlocking mode grade and the current verification-free unlocking mode grade, detecting whether an unlocking request operation is triggered or not, if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period or not, and if the current time is in the verification-free time period, executing the unlocking operation. By setting the verification-free unlocking mode grade and setting different time lengths of verification-free time periods for each verification-free unlocking mode grade, the entering and exiting of personnel in a specific scene can be controlled, and the user experience is improved.

Referring to fig. 6, a method for controlling an intelligent lock according to an embodiment of the present application includes:

step S410: and acquiring the on-off state of the verification-free unlocking mode of the intelligent lock from the target terminal equipment.

Step S420: and if the verification-free unlocking mode of the intelligent lock is the unlocking state, acquiring the state of the bolt of the current intelligent lock.

Step S430: and acquiring a verification-free unlocking mode grade corresponding to the state of the lock tongue as a current verification-free unlocking mode grade, wherein the verification-free unlocking mode grades corresponding to different states of the lock tongue are different, and the verification-free time period lengths corresponding to different verification-free unlocking mode grades are different.

As a mode, the following four verification-free unlocking mode levels can be set according to the extended and retracted states of the lock tongues including the first lock tongue, the second lock tongue and the third lock tongue: if the state of the first bolt is an extended state, the states of the second bolt and the third bolt are retracted states, and the current verification-free unlocking mode level is acquired to be a first level; if the states of the first bolt and the second bolt are both in an extending state, the state of the third bolt is in a retracting state, and the current verification-free unlocking mode level is acquired to be a second level; if the states of the first bolt and the third bolt are extension states and the state of the second bolt is retraction state, acquiring that the current verification-free unlocking mode level is a third level; and if the states of the first bolt, the second bolt and the third bolt are all extension states, acquiring that the current verification-free unlocking mode level is a fourth level. Wherein the first level is higher in priority than the second level, the second level is higher in priority than the third level, and the third level is higher in priority than the fourth level.

Optionally, the first lock tongue may be a latch tongue, the second lock tongue may be a square tongue, and the third lock tongue may be a counter lock tongue, and different time lengths of the non-verification time periods may be set according to non-verification unlocking mode levels of different priorities, as shown in the following table:

bolt retraction and extension state Grade Time length of authentication-free time period
Only the oblique bolt extends out, and the square bolt and the reverse bolt retract A Ta
Only the oblique tongue and the square tongue extend out, and the reverse lock tongue retracts B Tb
Only the oblique bolt and the reverse locking bolt extend out and the square bolt retracts C Tc
The latch bolt and the dead bolt are extended D Td

The time lengths of Ta, Tb, Tc, and Td may be set by the user according to the needs of the user, for example, the time lengths of 10min or 20 s.

Step S440: and determining the time length of the current verification-free time period according to the current verification-free unlocking mode grade.

As a mode, after the intelligent lock detects the retraction and extension state of the lock tongue, the level of the verification-free unlocking mode corresponding to the retraction and extension state of the lock tongue is obtained, for example, the state that the retraction and extension state of the lock tongue is detected by the intelligent lock is the extension state, and the states of the dead bolt and the anti-lock tongue are both the retraction states, so that the current verification-free unlocking mode level is known to be a by querying stored data, and then the time length of the current verification-free time period can be obtained to be Ta.

Step S450: whether an unlocking request operation is triggered or not is detected.

Step S460: and if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period.

Step S470: and if the current time is in the verification-free time period, executing unlocking operation.

The method for controlling the intelligent lock comprises the steps of obtaining the switch state of a verification-free unlocking mode of the intelligent lock from a target terminal device, if the verification-free unlocking mode of the intelligent lock is in an opening state, executing to obtain the state of a lock tongue of the current intelligent lock, obtaining a verification-free unlocking mode grade corresponding to the state of a lock house, using the verification-free unlocking mode grade as the current verification-free unlocking mode grade, determining the time length of the current verification-free time period according to the current verification-free unlocking mode grade, detecting whether an unlocking request operation is triggered, detecting whether the current time is in the verification-free time period if the unlocking request operation is detected, and executing the unlocking operation if the current time is in the verification-free time period. Whether the lock tongue state of the current intelligent lock is obtained or not is determined by detecting the on-off state of the verification-free unlocking mode, the unlocking efficiency can be improved, the corresponding verification-free unlocking mode grade is determined according to the lock tongue state, the time length of the verification-free time period is further obtained, and the user experience is improved.

Referring to fig. 7, a method for controlling an intelligent lock according to an embodiment of the present application includes:

step S510: whether an unlocking request operation is triggered or not is detected.

Step S520: and if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period.

Step S530: and if the current time is in the verification-free time period, executing unlocking operation.

As a mode, according to the unlocking operation, generating a log representing verification-free unlocking success, and sending the log to the target terminal device.

When the intelligent lock is connected with the target terminal equipment through wireless communication technologies such as WIFI and Bluetooth, the intelligent lock can send a log representing verification-free unlocking success to the target terminal equipment, and the target terminal equipment is indicated to store and display the log.

Step S540: if the current time is not in the verification-free time period, obtaining verification information, verifying the verification information, and if the verification is successful, executing unlocking operation.

As another mode, if the verification fails, prompting to input the verification information again, and adding one to the verification times; if the verification times are larger than the preset verification error early warning times, generating an alarm instruction; generating an alarm log according to the alarm instruction; and sending the alarm log to the target terminal equipment.

Furthermore, preset verification time can be set, if the user conducts identity verification for multiple times within the preset verification time and the multiple times of verification fails, an alarm instruction is generated, an alarm log is generated according to the alarm instruction, and the alarm log is sent to the target terminal device through wireless communication technologies such as WIFI and Bluetooth.

Optionally, when the intelligent lock detects that the current time is not in the current verification-free time period, the identity information of the user is obtained, and whether to unlock the lock is determined by performing identity verification on the user, wherein the identity verification can be performed through fingerprint, password, face recognition verification and other modes. Illustratively, if a user inputs authentication information, such as a fingerprint, a password or face authentication information, the intelligent lock is triggered to authenticate the user, and if the user successfully authenticates within a preset authentication time, the intelligent lock executes an unlocking instruction; if the user conducts identity verification for multiple times within the preset identity verification time and the verification times are larger than the preset verification error early warning times, the intelligent lock sends an instruction with information of multiple identity verification errors to the target terminal device, light can be sent out through the indicating lamp to prompt the user, the user can be prompted through voice, for example, the preset verification time is 10s, the preset verification error times are 3 times, and if the user conducts identity verification for 3 times within 10s and all the verification errors exist, the intelligent lock sends the instruction with the information of 3 identity verification errors to the target terminal device.

Optionally, when the intelligent lock is connected with the target terminal device through wireless communication technologies such as WIFI and bluetooth, the intelligent lock may send an alarm log to the target terminal device, and instruct the target terminal device to store and display the alarm log. Specifically, the intelligent lock receives an alarm log request instruction sent by the target terminal device, searches for the latest stored alarm log after receiving the request instruction, then sends the log to the target terminal device, and instructs the target terminal device to display the alarm log.

In addition, when the smart lock is connected with the server, the smart lock can send the log information to the target terminal device. When a new alarm log is generated, the intelligent lock can send the newly generated alarm log to the server, the server can push the alarm log to the target terminal device through wireless communication technologies such as WIFI and Bluetooth after successfully receiving the alarm log, and the target terminal device can store and display the alarm log after receiving the push of the alarm log. According to the scheme, the intelligent lock can flexibly remind according to the specific attention position of the user, namely if the user uses the target terminal equipment, the target terminal equipment is reminded, if the user does not use the target terminal equipment, the intelligent lock is reminded, the situation that the intelligent lock cannot timely feed back alarm information is avoided, and the safety is improved.

According to the method for controlling the intelligent lock, whether unlocking request operation is triggered or not is detected, if unlocking request operation is detected, whether the current time is in a verification-free time period or not is detected, if the current time is in the verification-free time period, unlocking operation is executed, if the current time is not in the verification-free time period, verification information is obtained, verification is carried out on the verification information, and if verification is successful, unlocking operation is executed. By setting the verification-free unlocking mode, all users can be guaranteed to perform verification-free unlocking operation within a verification-free time period, and user experience is improved.

Referring to fig. 8, an apparatus 600 for controlling an intelligent lock according to an embodiment of the present application includes:

an unlocking request detection unit 610, configured to detect whether an unlocking request operation is triggered.

The time detection unit 620 is configured to detect whether the current time is in a verification-free time period if the unlocking request operation is detected.

And the control unit 630 is configured to execute an unlocking operation if the current time is in the verification-free time period.

Referring to fig. 9, the apparatus 600 for controlling an intelligent lock according to the embodiment of the present application further includes:

a level obtaining unit 640, configured to obtain a current authentication-free unlocking mode level.

Further, the level obtaining unit 640 is configured to obtain a current state of a bolt of the smart lock; and acquiring a verification-free unlocking mode grade corresponding to the state of the lock tongue as a current verification-free unlocking mode grade, wherein the verification-free unlocking mode grades corresponding to different states of the lock tongue are different, and the verification-free time period lengths corresponding to different verification-free unlocking mode grades are different.

A time length determining unit 650, configured to determine a time length of a current authentication-free time period according to the current authentication-free unlocking mode level.

The preset grade and time obtaining unit 660 is configured to obtain a preset verification-free unlocking mode grade and a preset verification-free unlocking mode duration corresponding to the preset verification-free unlocking mode grade from the target terminal device.

Further, the preset level and time obtaining unit 660 is configured to determine the time length of the current verification-free time period based on the stored verification-free unlocking mode duration corresponding to the preset verification-free unlocking mode level and the current verification-free unlocking mode level.

And a mode determining unit 670, configured to determine whether the verification-free unlocking mode of the intelligent lock is unlocked if the unlocking request operation is detected.

Further, the mode determining unit 670 is configured to obtain verification information and verify the verification information if the current time is not in the verification-free time period; and if the verification is successful, executing unlocking operation.

The log generating unit 680 is used for generating a log representing verification-free unlocking success according to the unlocking operation; and sending the log to the target terminal equipment.

Further, the log generating unit 680 is configured to prompt to input the verification information again if the verification fails, and add one to the verification frequency; and if the verification times are greater than the preset verification error early warning times, generating an alarm instruction. Generating an alarm log according to the alarm instruction; and sending the alarm log to the target terminal equipment.

Referring to fig. 10, an intelligent lock 700 provided in an embodiment of the present application includes:

the door lock bolt state detection module 710 is configured to detect a change condition of an extension/retraction state of a latch bolt, a dead bolt, and a lock bolt of the smart lock, and send a detection result to the processing unit 720 for processing.

The processing unit 720 is used for arithmetic logic processing such as data processing and instruction generation. For example, the following steps may be performed: detecting whether an unlocking request operation is triggered or not; if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period; and if the current time is in the verification-free time period, executing unlocking operation.

And a data communication module 730 for transmitting and receiving the instruction.

And a door lock control module 740 for performing an opening/closing operation of the door lock, through which the user performs the opening/closing operation of the door lock.

A data storage module 750, configured to store necessary data generated by the processing unit 720, such as a preset authentication-free unlocking mode level acquired from the target terminal device and a preset time length of an authentication-free time period corresponding to the preset authentication-free unlocking mode level.

A timing module 760 for timing operations.

The human-computer interaction module 770 is used for human-computer interaction, such as prompting a user through an indicator light, voice and the like, and inputting verification information through a keyboard by the user.

It should be noted that the device embodiment and the method embodiment in the present application correspond to each other, and specific principles in the device embodiment may refer to the contents in the method embodiment, which is not described herein again.

An embodiment of the present invention provides an intelligent lock, where the intelligent lock includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or an instruction set, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by the processor to implement the method for controlling the intelligent lock provided in the above method embodiment.

The memory may be used to store software programs and modules, and the processor may execute various functional applications and data processing by operating the software programs and modules stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system, application programs needed by functions and the like; the storage data area may store data created according to use of the apparatus, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide the processor access to the memory.

Fig. 11 is a block diagram of a hardware structure of an intelligent lock according to a method for controlling the intelligent lock according to an embodiment of the present invention.

As shown in fig. 11, the intelligent lock 1100 mainly includes a processor 1110, a memory 1120, a communication module 1130, a power source 1140, a sensor 1150 and a buzzer 1160, wherein the sensor 1150 includes a first sensor 1151, a second sensor 1152, a third sensor 1153 and a fourth sensor 1154, which are mainly used for detecting the extension or retraction state of the latch bolt, the angle bolt, the dead bolt and the anti-latch bolt of the intelligent lock.

The processor 1110 is mainly configured to detect whether an unlocking request operation is triggered; if the unlocking request operation is detected, detecting whether the current time is in a verification-free time period; and if the current time is in the verification-free time period, executing unlocking operation.

The memory 1120 is mainly used for storing software programs and various data.

Communication module 1130, mainly used accomplishes the communication between intelligent lock 1100 and the target terminal equipment, and is specifically used for when intelligent lock 1100 passes through wireless communication technologies such as WIFI, bluetooth and is connected with the target terminal equipment, intelligent lock 1100 can send the sign and exempt from to verify the log of unblanking success to the target terminal equipment to instruct this target terminal equipment to save and show the log.

And a power supply 1140, which is mainly used for supplying power to the smart lock 1100.

The buzzer 1160 is mainly used for giving out sound and light alarm to alarm information immediately.

It will be understood by those skilled in the art that the structure shown in fig. 11 is only an illustration and is not intended to limit the structure of the smart lock. For example, smart lock 1100 may also include more or fewer components than shown in FIG. 11, or have a different configuration than shown in FIG. 11.

Fig. 12 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention. In the invention, the target terminal equipment is the mobile terminal.

The mobile terminal 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 101, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 12 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted mobile terminal, a wearable device, a pedometer, and the like.

The processor 110 is configured to obtain log information and alarm log information, which are sent by the mobile terminal and represent successful verification-free unlocking, and send the log information to the server.

An input unit 104 for receiving an audio or video signal. The input unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the graphics processing unit 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 101. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode.

A display unit 106 for displaying information input by the user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), or the like.

A user input unit 107 for receiving input numeric or character information and generating key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment).

The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.

The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the unlocking method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.

It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.

Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.

The method, the device, the intelligent lock and the storage medium for controlling the intelligent lock provided by the embodiment of the application firstly detect whether the unlocking request operation is triggered, detect whether the current time is in the verification-free time period if the unlocking request operation is detected, and execute the unlocking operation if the current time is in the verification-free time period.

Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

24页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于区块链的五防锁具管理方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!