A kind of unlocking code processing method, door lock and front server

A technology for unlocking passwords and processing methods, which is applied in the direction of instruments, time registers, and individual input/output registers, etc., and can solve the problems of easy leakage of unlocking passwords, hidden dangers of personal and property safety of tourists staying in the room, leakage of unlocking passwords, etc. problems, to achieve the effect of reducing the leakage of unlocking passwords, ensuring personal and property safety, and reducing daily costs

Active Publication Date: 2018-11-13
上海别样红信息技术有限公司 +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The fixed unlock password is easy to leak after being used for a period of time, and once the unlock password is leaked, the personal and property safety of the guests staying in the room cannot be guaranteed; while the front-end server sends the generated unlock password to the corresponding door lock, if the unlock password If it is monitored by criminals, it will also cause the leakage of the unlock password, resulting in the way that the front-end server that communicates with the door lock in real time generates the room unlock password, which poses risks to the personal and property safety of tourists staying in the room.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of unlocking code processing method, door lock and front server
  • A kind of unlocking code processing method, door lock and front server
  • A kind of unlocking code processing method, door lock and front server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] This embodiment provides a method for processing an unlock password, and the execution subject of this embodiment is a door lock. The door lock can generate an unlock password valid in the current password generation period in each password generation period through the unlock password processing method provided in this embodiment.

[0072] see Figure 4 The shown flow chart of a method for processing an unlock password provided by this embodiment includes the following steps:

[0073] Step 400, the door lock acquires current time information.

[0074] Wherein, the above-mentioned door lock obtains current time information from a clock module preset in the processor.

[0075] The above-mentioned clock module is used to generate current time information, so that the door lock can obtain the current time information in real time.

[0076] Step 402: When it is determined according to the obtained time information that the time since the last generation of the unlock pas...

Embodiment 2

[0115] In related technologies, after the front-end server that communicates with the door lock in real time generates the unlock code of the room, it will send the generated unlock code to the door lock of the room that the visitor is about to stay in, and the front-end server will send the generated unlock code to the corresponding door lock. During the lock process, if the unlock password is monitored by criminals, it will also cause the leakage of the unlock password, so that the room unlock password generated by the front server that communicates with the door lock in real time cannot protect the tourists staying in the room. Personal and property safety plays a protective role.

[0116] In order to solve the above problems, this embodiment provides a method for processing unlock passwords. The execution subject of this embodiment is the front-end server. Sent to the unlock password user.

[0117] see Figure 5 , which shows a flow chart of a method for processing an un...

Embodiment 3

[0141] This embodiment provides a door lock, which is used to implement the unlocking password processing method described in Embodiment 1 above.

[0142] see Figure 6 , a door lock provided in this embodiment shown, including:

[0143] A time information acquisition module 600, configured to acquire current time information;

[0144] The password generation module 602 is configured to encrypt the password generation information of the current password generation period to obtain the current password generation period when it is determined according to the acquired time information that the time since the last generation of the unlock password reaches the preset password generation period valid unlock code.

[0145] To sum up, the door lock provided by this embodiment automatically generates an effective unlock password in the current password generation cycle in each password generation cycle, which is different from the unlock code in the prior art door lock, which is a f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an unlocking password processing method, door lock and foreground server, wherein the method comprises the following steps that the door lock obtains current time information; when the time length from generation of unlocking passwords last time is determined to reach a preset password generation cycle according to the obtained time information, the door lock encrypts password generation information of the current password generation cycle to obtain effective unlocking passwords in the current password generation cycle. By adopting the unlocking password processing method, the door lock and the foreground server provided by the embodiment of the invention, the possibility of divulging the unlocking passwords can be lowered.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to an unlocking password processing method, a door lock and a front server. Background technique [0002] At present, tourists will check into local hotels in tourist attractions for rest during their travels. When tourists check into the hotel, the staff of the hotel will arrange the rooms for the tourists to stay in and inform the tourists of the unlocking code of the room, so that the tourists can open the door lock of the room through the unlocking code and check in to the room for rest. [0003] In the related technology, the staff of the hotel informs the tourists of the unlocking password of the room, which can be a fixed unlocking password preset in the door lock of the room; it can also be generated by the front server of the hotel staff communicating with the door lock in real time through the network equipment. Room unlock password; during the use of the password...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
CPCG07C9/00182G07C9/00857G07C2009/00865
Inventor 孙鹏翀宋雷
Owner 上海别样红信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products