[go: up one dir, main page]

CN108550208B - User authority management method of intelligent door lock, server and readable medium - Google Patents

User authority management method of intelligent door lock, server and readable medium Download PDF

Info

Publication number
CN108550208B
CN108550208B CN201810313288.6A CN201810313288A CN108550208B CN 108550208 B CN108550208 B CN 108550208B CN 201810313288 A CN201810313288 A CN 201810313288A CN 108550208 B CN108550208 B CN 108550208B
Authority
CN
China
Prior art keywords
user
unlocking
door lock
intelligent door
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810313288.6A
Other languages
Chinese (zh)
Other versions
CN108550208A (en
Inventor
孔靓
曾文林
杨乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lianggong Innovation Application Technology Co ltd
Original Assignee
Shenzhen Lianggong Innovation Application Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lianggong Innovation Application Technology Co ltd filed Critical Shenzhen Lianggong Innovation Application Technology Co ltd
Priority to CN201810313288.6A priority Critical patent/CN108550208B/en
Publication of CN108550208A publication Critical patent/CN108550208A/en
Application granted granted Critical
Publication of CN108550208B publication Critical patent/CN108550208B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a user authority management method of an intelligent door lock, which comprises the following steps: when an unlocking instruction sent by a first user or a second user is received, acquiring information of the first user or the second user, wherein the information of the user comprises unlocking authority information of the user; generating a corresponding virtual key according to the unlocking authority information, and executing the unlocking instruction; and when the virtual key meets a preset unlocking condition, unlocking the unlocking authority. The invention also discloses a server and a computer readable storage medium. The method and the device realize the timeliness and frequency management of the unlocking permission of the user, and cannot acquire the unlocking permission without the agreement of the client.

Description

User authority management method of intelligent door lock, server and readable medium
Technical Field
The invention relates to the field of intelligent door locks, in particular to a user authority management method of an intelligent door lock, a server and a computer readable storage medium.
Background
In the era of informatization rapid development, intelligent door locks have been moved into buildings or buildings such as residential districts and office buildings. The convenient and simple mode is more and more popular with users, but brings safety problems at the same time. The intelligent door lock needs to be bound with a mobile terminal of a user when in use, when a visitor comes, the unlocking permission of the intelligent door lock needs to be shared by the visitor through the mobile terminal under the conditions that the visitor does not get at home and the like, and the unlocking permission is not limited by timeliness and times, so that great potential safety hazards exist. Or the unlocking authority of the intelligent door lock is acquired without passing the consent of the user. For example, after the unlocking permission is shared by the visitor through the mobile terminal, the visitor shares the unlocking permission with others. Or the mobile terminal of the visitor is lost, the unlocking permission is shared with others, and therefore unnecessary troubles are brought to the user.
Disclosure of Invention
The invention mainly aims to provide a user authority management method of an intelligent door lock, and aims to solve the technical problems that the user unlocking authority of the intelligent door lock is not limited by timeliness and times, and the unlocking authority is obtained without the consent of a first user.
In order to achieve the above object, the present invention provides a user right management method for an intelligent door lock, which comprises the following steps:
when an unlocking instruction sent by a first user or a second user is received, acquiring information of the first user or the second user, wherein the information of the user comprises unlocking authority information of the user;
generating a corresponding virtual key according to the unlocking authority information, and executing the unlocking instruction;
and when the virtual key meets a preset unlocking condition, unlocking the unlocking authority. Preferably, before the step of receiving an unlocking instruction sent by the first user or the second user, the method includes:
and when the first user sends the corresponding unlocking authority to the second user through the mobile terminal, acquiring an unlocking instruction sent by the first user or the second user.
Preferably, when receiving an unlocking instruction, the step information of obtaining the user information includes:
when an unlocking instruction sent by a first user or a second user through a mobile terminal is received, acquiring identity information of the first user or the second user;
and searching corresponding unlocking authority information in an unlocking authority database according to the identity information of the first user or the second user.
Preferably, the step of obtaining the unlocking authority information corresponding to the unlocking authority information in the unlocking authority database includes:
when the searched unlocking permission information corresponding to the first user does not correspond to the second user identity information, the unlocking permission information corresponding to the first user and the second user identity information are sent to a client of a third user;
and when receiving authorization information sent by the third user through a client, acquiring the unlocking authority corresponding to the second user authorized by the client or the unlocking authority corresponding to the first user.
Preferably, the step of generating a corresponding virtual key according to the unlocking authority, and executing the unlocking instruction includes:
and when the unlocking authority corresponding to the first user or the second user is the unlocking times, generating a corresponding virtual key according to the unlocking times, and executing the unlocking instruction.
Preferably, the step of executing the unlocking instruction further includes:
and when the unlocking authority corresponding to the first user or the second user is the unlocking time limit, generating a corresponding virtual key according to the unlocking time limit, and executing the unlocking instruction.
Preferably, the step of releasing the unlocking authority when the virtual key satisfies a preset release condition includes:
and when the recorded using times of the virtual key meet the unlocking times, unlocking permission of the first user or the second user is released.
Preferably, the step of releasing the unlocking right of the first user or the second user further includes:
and when the recorded use time of the virtual key meets the unlocking time limit, unlocking permission of the first user or the second user is released.
In addition, to achieve the above object, the present invention provides a server, including: the intelligent door lock comprises a memory, a processor and a user authority management program of the intelligent door lock, wherein the user authority management program of the intelligent door lock is stored on the memory and can run on the processor, and when being executed by the processor, the user authority management program of the intelligent door lock realizes the steps of the user authority management method of the intelligent door lock.
In addition, in order to achieve the above object, the present invention further provides a computer-readable storage medium, wherein a user right management program of the intelligent door lock is stored on the computer-readable storage medium, and when the user right management program of the intelligent door lock is executed by a processor, the steps of the user right management method of the intelligent door lock are implemented.
According to the user right management method, the server and the computer readable storage medium of the intelligent door lock, provided by the embodiment of the invention, when an unlocking instruction sent by a first user or a second user is received, information of the first user or the second user is obtained, wherein the information of the user comprises unlocking right information of the user; generating a corresponding virtual key according to the unlocking authority information, and executing the unlocking instruction; and when the virtual key meets the preset unlocking condition, the unlocking permission is unlocked, so that the timeliness and frequency management of the user unlocking permission is realized, and the unlocking permission cannot be obtained without the consent of the client.
Drawings
Fig. 1 is a schematic diagram of a server structure according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a user right management method of an intelligent door lock according to a first embodiment of the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of a user right management method for an intelligent door lock according to the present invention;
FIG. 4 is a flowchart illustrating a user right management method for an intelligent door lock according to a third embodiment of the present invention;
FIG. 5 is a flowchart illustrating a fourth embodiment of a user right management method for an intelligent door lock according to the present invention;
FIG. 6 is a flowchart illustrating a fifth embodiment of a user right management method for an intelligent door lock according to the present invention;
FIG. 7 is a flowchart illustrating a sixth embodiment of a user right management method for an intelligent door lock according to the present invention;
FIG. 8 is a flowchart illustrating a seventh embodiment of a user right management method for an intelligent door lock according to the present invention;
fig. 9 is a flowchart illustrating an eighth embodiment of a user right management method for an intelligent door lock according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: the method comprises the steps that when an unlocking instruction sent by a first user or a second user is received, information of the first user or the second user is obtained, wherein the information of the users comprises unlocking authority information of the users; generating a corresponding virtual key according to the unlocking authority information, and executing the unlocking instruction; and when the virtual key meets a preset unlocking condition, unlocking the unlocking authority.
The prior art cannot solve the problem that the unlocking permission of the user of the intelligent door lock is not limited by timeliness and times, and the unlocking permission is obtained without the consent of the client.
The invention provides a solution, which can carry out time-efficient and frequency management on the unlocking permission of a user and can not acquire the unlocking permission without the consent of a client.
Fig. 1 is a schematic diagram of a server structure according to an embodiment of the present invention.
The embodiment of the invention discloses a terminal server.
As shown in fig. 1, the server may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a user authority management program of the smart door lock.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call the user authority management program of the intelligent door lock stored in the memory 1005, and perform the following operations:
when an unlocking instruction sent by a first user or a second user is received, acquiring information of the first user or the second user, wherein the information of the user comprises unlocking authority information of the user;
generating a corresponding virtual key according to the unlocking authority information, and executing the unlocking instruction;
further, the processor 1001 may call a user authority management program of the smart door lock stored in the memory 1005, and further perform the following operations:
and when the first user sends the corresponding unlocking authority to the second user through the mobile terminal, acquiring an unlocking instruction sent by the first user or the second user.
Further, the processor 1001 may call the user authority management program of the intelligent door lock stored in the memory 1005, and also perform the following operations:
when an unlocking instruction sent by a first user or a second user through a mobile terminal is received, acquiring identity information of the first user or the second user;
and searching corresponding unlocking authority information in an unlocking authority database according to the identity information of the first user or the second user.
Further, the processor 1001 may call the user authority management program of the intelligent door lock stored in the memory 1005, and also perform the following operations:
when the searched unlocking permission information corresponding to the first user does not correspond to the second user identity information, the unlocking permission information corresponding to the first user and the second user identity information are sent to a client of a third user;
and when receiving authorization information sent by the third user through a client, acquiring the unlocking authority corresponding to the second user authorized by the client or the unlocking authority corresponding to the first user.
Further, the processor 1001 may call the user authority management program of the intelligent door lock stored in the memory 1005, and also perform the following operations:
and when the unlocking authority corresponding to the first user or the second user is the unlocking times, generating a corresponding virtual key according to the unlocking times, and executing the unlocking instruction.
Further, the processor 1001 may call the user authority management program of the intelligent door lock stored in the memory 1005, and also perform the following operations:
and when the unlocking authority corresponding to the first user or the second user is the unlocking time limit, generating a corresponding virtual key according to the unlocking time limit, and executing the unlocking instruction.
Further, the processor 1001 may call the user authority management program of the intelligent door lock stored in the memory 1005, and also perform the following operations:
and when the recorded using times of the virtual key meet the unlocking times, unlocking permission of the first user or the second user is released.
Further, the processor 1001 may call the user authority management program of the intelligent door lock stored in the memory 1005, and also perform the following operations:
and when the recorded use time of the virtual key meets the unlocking time limit, unlocking permission of the first user or the second user is released.
Referring to fig. 2, the present invention is a flowchart illustrating a first embodiment of a user right management method for an intelligent door lock, where the user right management method for an intelligent door lock includes:
step S10, when receiving an unlocking instruction sent by a first user or a second user, acquiring information of the first user or the second user, wherein the information of the user comprises unlocking authority information of the user;
when the server receives an unlocking instruction of a first user or a second user, the system without the unlocking permission of the intelligent door lock is a visitor. When the client authorizes the unlocking permission to the visitor, the server binds the IP parameter of the visitor and the unlocking permission and stores the IP parameter into the permission management database, and the IP parameter of the mobile terminal is used as the identity information of the visitor. When the server forwards the authorized unlocking permission sent by the client to the visitor, the visitor becomes a user of the intelligent door lock. And when an unlocking instruction sent by the mobile terminal is received, acquiring the IP information of the mobile terminal according to the unlocking instruction, thereby determining the identity information of the user of the mobile terminal. According to the identity information of the user, the unlocking authority corresponding to the identity information of the user can be obtained in an unlocking authority database of the server. The unlocking permission is the unlocking permission of the intelligent door lock given to the visitor by the client according to the identity information, the service time and the like of the visitor when the visitor sends an unlocking request to the client bound with the intelligent door lock. Only one client is owned by the first user bound with the intelligent door lock.
Step S20, generating a corresponding virtual key according to the unlocking authority information, and executing the unlocking instruction;
the server acquires unlocking authority corresponding to the user identity information from an unlocking authority database of the server according to the user identity information, and generates a corresponding virtual key according to the unlocking authority. The virtual keys generated by the unlocking authorities corresponding to different user identity information are different, for example, some unlocking authorities corresponding to user identity information can only unlock the intelligent door lock once or for many times, that is, the generated virtual keys have the limitation of times. The unlocking authority corresponding to some user identity information is that the intelligent door lock can be unlocked only in a certain time period, namely the generated virtual key is limited in time limit, and an unlocking instruction is executed according to the generated virtual key.
And step S30, when the virtual key meets the preset releasing condition, releasing the unlocking authority.
The server acquires authority information of the user for unlocking the intelligent door lock, and when the virtual key generated by the unlocking authority corresponding to the user identity information meets the unlocking authority corresponding to the user identity information, the unlocking authority of the user is released. For example, some unlocking authorities corresponding to the user identity information only unlock the smart door lock one or more times, that is, the generated virtual key has a limit on the number of times. And when the virtual key with the frequency limit is used up, releasing the unlocking authority of the user. The unlocking authority corresponding to some user identity information is that the intelligent door lock can be unlocked only in a certain time period, namely, the generated virtual key is limited in time limit. And when the virtual key with the time limit limitation is in the non-use time, releasing the unlocking authority of the user.
In this embodiment, when receiving an unlocking instruction of a user, the server acquires unlocking authority information of the user, generates a virtual key corresponding to the user information according to the unlocking authority, and executes the unlocking instruction. And when the virtual key meets the preset unlocking condition, unlocking the unlocking authority of the user. The unlocking permission of the user is released under the condition that the unlocking permission of the user meets the releasing condition, and the unlocking permission of the user is better managed.
Referring to fig. 3, fig. 3 is a schematic flowchart of a second embodiment of the user right management method of the intelligent door lock according to the present invention, and based on the embodiment shown in fig. 2, before the step S10, the method includes:
step S40, when the first user sends the corresponding unlocking authority to the second user through the mobile terminal, the unlocking instruction sent by the first user or the second user is obtained;
when the server receives a link or a two-dimensional code which is sent to the mobile terminal of the second user by the first user and has the unlocking authority corresponding to the first user on the mobile terminal, the first user or the second user sends the unlocking authority to the server to execute an unlocking instruction. For example, when a first user sends a link with unlocking permission or a two-dimensional code to a mobile terminal of a second user through WeChat on the mobile terminal, the first user or the second user sends the unlocking permission corresponding to the first user to a server to send an unlocking instruction to the server.
In this embodiment, when the server receives that the first user sends the unlocking right to the second user through the mobile number terminal, the server obtains the identity information of the second user and the unlocking right corresponding to the first user. When the first user sends the unlocking authority to the second user, the server needs to check the identity information and the unlocking authority of the second user, and the safety of the unlocking authority of the intelligent door lock is improved.
Referring to fig. 4, fig. 4 is a schematic flowchart of a third embodiment of the user right management method of the intelligent door lock of the present invention, based on the embodiment shown in fig. 3, where the step S10 includes:
step S11, when receiving an unlocking instruction sent by a first user or a second user through a mobile terminal, obtaining identity information of the first user or the second user.
Step S12, searching corresponding unlocking authority information in an unlocking authority database according to the identity information of the first user or the second user;
when receiving an unlocking instruction sent by a first user or a second user on a mobile terminal, the server acquires the IP parameters of the mobile terminal of the first user or the second user according to the received unlocking instruction, and acquires the identity information of the first user or the second user matched with the IP parameters in the authority management database according to the IP parameters of the first user or the second user. When the identity information of the first user or the second user is acquired, the unlocking permission corresponding to the identity information of the first user or the second user in the permission management database is acquired according to the identity information of the first user or the second user.
In this embodiment, when receiving an unlocking instruction of a first user or a second user, a server acquires identity information of the first user or the second user, and acquires an unlocking right corresponding to the identity information of the first user or the second user in a right management database according to the identity information of the first user or the second user. Different users have different unlocking authorities, and the unlocking authorities of the users can be better managed.
Referring to fig. 5, fig. 5 is a schematic flowchart of a fourth embodiment of the user right management method of the intelligent door lock of the present invention, based on the embodiment shown in fig. 2, where the step S12 includes:
step S121, when the searched unlocking permission information corresponding to the first user is not corresponding to the second user identity information, the unlocking permission information corresponding to the first user and the second user identity information are sent to a client of a third user;
and step S122, when receiving the authorization information sent by the third user through the client, acquiring the unlocking authority corresponding to the second user authorized by the client or the unlocking authority corresponding to the first user.
When the server acquires the unlocking authority corresponding to the second user identity information in the authority management database according to the identity information of the second user, the unlocking authority corresponding to the acquired second user identity information is different from the unlocking authority corresponding to the first user, or the unlocking authority corresponding to the second user is not acquired, and the unlocking authority information of the first user is judged not to correspond to the second user identity information. And sending the unlocking authority information of the first user and the identity information of the second user to a client of a third user for auditing. The third user is a user bound with the intelligent door lock, and can grant door lock permission to all users or visitors, when the server receives unlocking permission granted to the second user sent by the third user through the client, the server grants the unlocking permission corresponding to the first user of the second user or grants the unlocking permission corresponding to the identity information of the second user when the third user client is obtained.
In this embodiment, when determining that the unlocking permission of the first user does not correspond to the identity information of the second user, the server sends the unlocking permission information of the first user and the identity information of the second user to the client of the third user for auditing. And receiving the unlocking permission granted to the second user by the client of the third user at the server, and when the unlocking permission granted to the second user by the client corresponding to the first user or the unlocking permission granted to the second user corresponding to the identity information is obtained. The unlocking permission sending method and the unlocking permission sending device have the advantages that under the condition that the client side does not agree, the user with the unlocking permission cannot send the unlocking permission of the user to other people, and the safety of the intelligent door lock is improved.
Referring to fig. 6, fig. 6 is a schematic flowchart of a fifth embodiment of the user right management method of the intelligent door lock according to the present invention, based on the embodiment shown in fig. 2, where the step S20 includes:
and step S21, when the unlocking authority corresponding to the first user or the second user is the unlocking times, generating a corresponding virtual key according to the unlocking times, and executing the unlocking instruction.
When the unlocking right corresponding to the identity information of the first user or the second user is the unlocking times, for example, when the first user or the second user requests the client to obtain the unlocking right, the unlocking right of the intelligent door lock is authorized to the user on the client according to the needs of the user, when the user needs to come frequently, the unlocking right issued to the user is the unlocking times, and the unlocking times can be selected by the client and can be 1 time, 2 times, 3 times and the like. And the server generates a virtual key with the frequency limit according to the unlocking frequency of the first user or the second user and executes the unlocking instruction. The unlocking instruction is executed.
In this embodiment, when determining that the unlocking right corresponding to the identity information of the first user or the second user is the unlocking frequency, the server generates a virtual key with frequency limitation according to the unlocking frequency. The unlock instruction is executed. The corresponding virtual key is generated according to the unlocking times authority of the user, and the unlocking authority diversity of the intelligent door lock is managed.
Referring to fig. 7, fig. 7 is a flowchart illustrating a sixth embodiment of the user right management method for an intelligent door lock according to the present invention, based on the embodiment shown in fig. 2, where the step S20 further includes:
and step S22, when the unlocking authority corresponding to the first user or the second user is the unlocking time limit, generating a corresponding virtual key according to the unlocking time limit, and executing the unlocking instruction.
When the unlocking permission corresponding to the identity information of the first user or the second user is the unlocking time limit, for example, when the first user or the second user requests the client to obtain the unlocking permission, the unlocking permission of the intelligent door lock is authorized to the user on the client according to the needs of the user, when the user needs to come frequently for a certain period of time, the unlocking permission issued to the user is the unlocking time limit, and the unlocking time limit can be selected by the client, and can be 1 day, 2 days, 3 days, or a certain period of time, and the like. And the server generates a virtual key with time limit limitation according to the unlocking time limit of the first user or the second user and executes the unlocking instruction. The unlocking instruction is executed.
In this embodiment, when determining that the unlocking authority corresponding to the identity information of the first user or the second user is the unlocking time limit, the server generates a virtual key with a time limit according to the unlocking time limit. The unlock instruction is executed. The corresponding virtual key is generated according to the unlocking timeliness authority of the user, and the unlocking authority diversity of the intelligent door lock is managed.
Referring to fig. 8, fig. 8 is a schematic flowchart of a seventh embodiment of the user right management method of the intelligent door lock of the present invention, based on the embodiment shown in fig. 2, the step S30 further includes:
and S31, when the recorded use times of the virtual key meet the unlocking times, unlocking authority of the first user or the second user is released.
The server records the number of times of use of the virtual key with the time limit of the first user or the second user, and when the server records that the number of times of use of the virtual key with the time limit meets the unlocking number corresponding to the first user or the second user, for example, when the server records that the number of times of use of the virtual key with the time limit of the first user or the second user is 3 times, and the unlocking number corresponding to the first user or the second user is also 3 times, the server records that the number of times of use of the virtual key with the time limit of the first user or the second user meets the unlocking number corresponding to the first user or the second user for 3 times. And the server releases the unlocking authority corresponding to the first user or the second user.
In this embodiment, when the number of times of use of the virtual key with the number limit recorded by the server satisfies the unlocking number right corresponding to the first user or the second user, the unlocking number right corresponding to the first user or the second user is released. The unlocking times authority of the user is managed, so that the management is more flexible and safer.
Referring to fig. 9, fig. 9 is a schematic flowchart of an eighth embodiment of the user right management method of the intelligent door lock of the present invention, based on the embodiment shown in fig. 2, the step S30 further includes:
and S32, when the recorded use time of the virtual key meets the unlocking time limit, unlocking authority of the first user or the second user is released.
The server records the use time of the virtual key with time limit of the first user or the second user, and when the server records that the use time of the virtual key with time limit meets the unlocking time limit corresponding to the first user or the second user, for example, when the server records that the use time limit of the virtual key with time limit of the first user or the second user is 3 days, and the unlocking time limit corresponding to the first user or the second user is also 3 days, the server records that the use 3 days of the virtual key with time limit of the first user or the second user meets the unlocking 3 days corresponding to the first user or the second user. Or when the server records that the service time limit of the virtual key with the time limit limitation of the first user or the second user is 9:00-18:00 and the unlocking time limit corresponding to the first user or the second user is also 9:00-18:00 days, the server records that the service time limit of the virtual key with the time limit limitation of the first user or the second user is 9:00-18:00 days, which meets the unlocking time limit of the first user or the second user for 9:00-18:00 days, and the server releases the unlocking authority corresponding to the first user or the second user.
In this embodiment, when the usage time of the virtual key with the time limit recorded by the server satisfies the unlocking time limit corresponding to the first user or the second user, the unlocking time limit authority corresponding to the first user or the second user is released. The unlocking timeliness authority of the user is managed, so that the management is more flexible and safer.
The present invention also provides a server, comprising: the intelligent door lock comprises a memory, a processor and a user authority management program of the intelligent door lock, wherein the user authority management program of the intelligent door lock is stored on the memory and can run on the processor, and when being executed by the processor, the user authority management program of the intelligent door lock realizes the steps of the user authority management method of the intelligent door lock.
The invention also provides a computer readable storage medium, the computer readable storage medium stores a user right management program of the intelligent door lock, and the user right management program of the intelligent door lock realizes the steps of the user right management method of the intelligent door lock when being executed by the processor.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (7)

1. A user authority management method of an intelligent door lock is characterized by comprising the following steps:
when a first user sends a corresponding unlocking authority to a second user through a mobile terminal, acquiring an unlocking instruction sent by the first user or the second user;
when an unlocking instruction sent by a first user or a second user through a mobile terminal is received, acquiring identity information of the first user or the second user;
when the searched unlocking permission information corresponding to the first user does not correspond to the second user identity information, the unlocking permission information corresponding to the first user and the second user identity information are sent to a client of a third user;
when authorization information sent by a third user through a client is received, acquiring unlocking permission corresponding to the second user authorized by the client or unlocking permission corresponding to the first user;
generating a corresponding virtual key according to the unlocking authority information, and executing the unlocking instruction;
and when the virtual key meets a preset unlocking condition, unlocking the unlocking authority.
2. The user right management method of the intelligent door lock as claimed in claim 1, wherein the step of generating a corresponding virtual key according to the unlocking right and executing the unlocking command comprises:
and when the unlocking authority corresponding to the first user or the second user is the unlocking times, generating a corresponding virtual key according to the unlocking times, and executing the unlocking instruction.
3. The user right management method of an intelligent door lock according to claim 2, wherein the step of executing the unlocking instruction further comprises:
and when the unlocking authority corresponding to the first user or the second user is the unlocking time limit, generating a corresponding virtual key according to the unlocking time limit, and executing the unlocking instruction.
4. The user right management method of an intelligent door lock according to claim 3, wherein the step of releasing the unlocking right when the virtual key satisfies a preset release condition comprises:
and when the recorded using times of the virtual key meet the unlocking times, unlocking permission of the first user or the second user is released.
5. The user right management method of an intelligent door lock according to claim 4, wherein the step of releasing the unlocking right of the first user or the second user further comprises:
and when the recorded use time of the virtual key meets the unlocking time limit, unlocking permission of the first user or the second user is released.
6. A server, characterized in that the server comprises: memory, processor and user right management program of intelligent door lock stored on the memory and capable of running on the processor, the user right management program of intelligent door lock realizes the steps of the user right management method of intelligent door lock according to any one of claims 1 to 5 when executed by the processor.
7. A computer-readable storage medium, characterized in that the computer-readable storage medium stores thereon a user right management program of an intelligent door lock, and the user right management program of the intelligent door lock, when executed by a processor, implements the steps of the user right management method of the intelligent door lock according to any one of claims 1 to 5.
CN201810313288.6A 2018-04-09 2018-04-09 User authority management method of intelligent door lock, server and readable medium Active CN108550208B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810313288.6A CN108550208B (en) 2018-04-09 2018-04-09 User authority management method of intelligent door lock, server and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810313288.6A CN108550208B (en) 2018-04-09 2018-04-09 User authority management method of intelligent door lock, server and readable medium

Publications (2)

Publication Number Publication Date
CN108550208A CN108550208A (en) 2018-09-18
CN108550208B true CN108550208B (en) 2021-04-23

Family

ID=63514518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810313288.6A Active CN108550208B (en) 2018-04-09 2018-04-09 User authority management method of intelligent door lock, server and readable medium

Country Status (1)

Country Link
CN (1) CN108550208B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113338721B (en) * 2021-06-30 2023-05-26 珠海优特电力科技股份有限公司 Door lock unlocking control method and device, storage medium, processor and door lock
CN114882621A (en) * 2022-04-27 2022-08-09 广东好太太智能家居有限公司 Method and system for releasing back locking of electronic lock and electronic lock system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104464045A (en) * 2014-11-11 2015-03-25 曾桓涛 Two-dimension code-based access control method and two-dimension code-based access control system
CN105447928A (en) * 2014-08-29 2016-03-30 青岛海尔智能家电科技有限公司 Entrance guard control method and control system thereof
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal
CN107341884A (en) * 2017-06-30 2017-11-10 王韧 A kind of Quick Response Code intelligent access control system and its implementation

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9353551B2 (en) * 2014-03-19 2016-05-31 Meghan Martinez Wireless door locking system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447928A (en) * 2014-08-29 2016-03-30 青岛海尔智能家电科技有限公司 Entrance guard control method and control system thereof
CN104464045A (en) * 2014-11-11 2015-03-25 曾桓涛 Two-dimension code-based access control method and two-dimension code-based access control system
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal
CN107341884A (en) * 2017-06-30 2017-11-10 王韧 A kind of Quick Response Code intelligent access control system and its implementation

Also Published As

Publication number Publication date
CN108550208A (en) 2018-09-18

Similar Documents

Publication Publication Date Title
CN108200050B (en) Single sign-on server, method and computer readable storage medium
CN105516103B (en) Method, device and system for binding smart home appliances
KR101031490B1 (en) Mobile smart key system and service provision method
CN108549799B (en) Android permission management method and device, terminal and computer storage medium
CN109740333B (en) Rights management method for integrated system and subsystem, server and storage medium
EP3726484A1 (en) Method for managing vehicle control permissions, and apparatus
CN105743841A (en) Intelligent hotel room facility control authority distribution method, client and system
CN105074713A (en) Systems and methods for identifying a secure application when connecting to a network
CN103078859A (en) Service system authority management method, equipment and system
CN114448725B (en) Equipment authentication method, system and storage medium
CN103581166A (en) Location aware authentication
KR20140127987A (en) System and method for public terminal security
CN106713315B (en) Login method and device of plug-in application program
CN107438054B (en) Method and system for realizing menu information control based on public platform
JP2005032241A (en) Grant of permission to access resource
CN108550208B (en) User authority management method of intelligent door lock, server and readable medium
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN113132977A (en) Network distribution method, network distribution system and computer readable storage medium
US9483889B2 (en) Method for controlling an electronically secured device and transponder for it
CN113037736B (en) Authentication method, device, system and computer storage medium
CN103324878A (en) Method and system for remotely controlling unlocking permission of hand-held equipment
CN111083541B (en) Interface calling method and device, smart television and readable storage medium
US20090150979A1 (en) Network system, network method, and terminal and program therefor
CN114338060A (en) Authority verification method, device, system, equipment and storage medium
CN111045725A (en) Control method, device and storage medium of code management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant