Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unlocking method, server, mobile terminal, electronic lock and unlocking system

A mobile terminal and electronic lock technology, applied in the field of communication, can solve the problems of difficulty in unlocking processing, high cost of electronic locks, high requirements for electronic lock memory and processor computing performance, etc., and meet the requirements of reducing computing performance, Avoid costly effects

Active Publication Date: 2014-08-06
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF5 Cites 165 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the technical defect in the above prior art is that the electronic lock needs to store the identity information of the bound user, and verify the collected user identity information according to the identity information of the bound user, so the electronic lock memory and processor There are high requirements for computing performance, which makes the cost of electronic locks higher
Especially when the electronic lock needs to be bound with many users, the memory of the electronic lock needs to store a large amount of identity information of the bound users. For the electronic lock with limited storage capacity and processing capacity, it is difficult to realize the unlocking process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unlocking method, server, mobile terminal, electronic lock and unlocking system
  • Unlocking method, server, mobile terminal, electronic lock and unlocking system
  • Unlocking method, server, mobile terminal, electronic lock and unlocking system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 1 It is a schematic flowchart of an unlocking method provided in Embodiment 1 of the present invention. figure 2 It is a schematic diagram of a system architecture used by the unlocking method provided in this embodiment. see figure 2 , the system architecture includes a server 210, at least one mobile terminal 220, and an electronic lock 230 corresponding to each mobile terminal, wherein the server 210 and the mobile terminal 220 can perform data interaction through wireless communication technology, and the mobile terminal 220 and its corresponding electronic lock 230 can Data interaction is carried out through short-range wireless communication technology. The unlocking method described in this embodiment is executed by the server. For convenience of description, this embodiment will take a mobile terminal and its corresponding electronic lock (target electronic lock) in the network architecture as an example to illustrate the technical solution of the un...

Embodiment 2

[0069] image 3 It is a schematic flowchart of an unlocking method provided in Embodiment 2 of the present invention. This embodiment adds an electronic lock registration step, a user registration step, and an electronic lock user binding step on the basis of the first embodiment above. The unlocking method is still executed by the server. join image 3 , the unlocking method specifically includes the following steps:

[0070] 310. The server receives the lock registration request sent by the registered mobile terminal, and generates electronic lock information according to the lock registration request, wherein the electronic lock information includes electronic lock identification information;

[0071] 320. The server receives the user registration request sent by the registered mobile terminal, and generates user identity information according to the user registration request;

[0072] 330. The server receives the binding request sent by the binding terminal, and establ...

Embodiment 3

[0119] Figure 7 It is a schematic flowchart of another unlocking method provided by the third embodiment of the present invention. This method can still be applied to figure 2 in the system architecture shown. The unlocking method described in this embodiment is executed by the mobile terminal, and may be executed in cooperation with the aforementioned unlocking method implemented by the server. see Figure 7 , the unlocking method specifically includes the following steps:

[0120] 710. The mobile terminal obtains the identification information of the target electronic lock;

[0121] 720. The mobile terminal obtains the identity information of the unlocking user;

[0122] 730. The mobile terminal sends an unlock verification request containing the target electronic lock identification information and the unlock user identity information to the server;

[0123] 740. The mobile terminal receives the unlocking instruction returned by the server according to the unlocking...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an unlocking method, a server, a mobile terminal, an electronic lock and an unlocking system. The unlocking method comprises the following steps: the server obtains identifying information of a target electronic lock and identity information of an unlocking user from an unlocking verification request sent by the mobile terminal; the server recognizes the binding relationship of the identifying information of the target electronic lock and the identity information of the unlocking user; the server generates an unlocking instruction according to the recognized binding relationship and sends the unlocking instruction to the mobile terminal so as to indicate that the mobile terminal transmits the unlocking instruction to the target electronic lock, so that the target electronic lock is unlocked according to the unlocking instruction, wherein the mobile terminal and the electronic lock are interacted with each other based on near field communication. According to the technical scheme, the operational performance requirements on an electronic lock memory and a processor can be lowered, and the cost of the electronic lock is saved.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular, to an unlocking method, a server, a mobile terminal, an electronic lock, and an unlocking system. Background technique [0002] Locks play a vital role in people's daily life. People can use locks to keep their important things, or install access locks to prevent outsiders from entering and leaving their homes and communities. When you need to retrieve the saved objects, or enter your own home and community, you can use the key to open the corresponding lock. [0003] With the development of computer and communication technology, electronic locks are swarming. At present, the electronic lock can collect the identity information input by the user, and verify the collected identity information according to the identity information of the bound user stored locally in the electronic lock, and determine whether the lock is unlocked or not accordi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00
Inventor 揭骏仁
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products