Configuration method and control method of intelligent lock, intelligent lock, equipment and storage medium

A technology of a control method and a configuration method, which is applied to a secure communication device and key distribution, can solve the problems of additional deployment, a single device sending specific information, inconvenience, etc., and achieves the effect of enriching application methods.

Active Publication Date: 2020-05-19
HANGZHOU FUZAMEI TECH CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The disadvantage of the above-mentioned first type of solution is that additional computer equipment needs to be deployed in addition to the configuration of the smart lock, which is inconvenient in many scenarios;
[0007] The problem with the above-mentioned second type of scheme is that there is a principle error. In the general sense, the blockchain cannot actively send specific information to a single device. It can only record the information on the blockchain, and the device can synchronize the data by itself and perform local queries. , or, the device queries the blockchain node configured with the query interface

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration method and control method of intelligent lock, intelligent lock, equipment and storage medium
  • Configuration method and control method of intelligent lock, intelligent lock, equipment and storage medium
  • Configuration method and control method of intelligent lock, intelligent lock, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0038] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0039] figure 1 It is a flow chart of a smart lock configuration method provided by an embodiment of the present invention.

[0040] like figure 1 As shown, in this embodiment, the present invention provides a method for configuring an intelligent lock, including:

[0041] S12: Generate a first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a configuration method and a control method of an intelligent lock, the intelligent lock, equipment and a storage medium. The method comprises the following steps: generating afirst private key and a corresponding first public key, wherein the first private key cannot be exported; storing the corresponding relationship between the first public key and the current intelligent lock into an intelligent lock contract on the blockchain; storing an authorization relationship between the current intelligent lock and a second public key of an administrator into the intelligentlock contract such that a terminal of the administrator generates an authorized transaction including a third public key of a first user and intelligent lock information according to a second privatekey signature corresponding to the second public key and sends the authorized transaction to a blockchain node, so operating through the intelligent lock contract, and storing the authorization relationship between the current intelligent lock and the first user in the intelligent lock contract and after the identity of the administrator is successfully verified, wherein the corresponding relationship and the authorization relationship are used for verifying whether a user requesting to unlock the current intelligent lock is authorized or not. According to the invention, a decentralized intelligent lock scheme without additionally deploying computer equipment is realized.

Description

technical field [0001] The present application relates to the technical field of smart devices, in particular to a configuration method and a control method of a smart lock, a smart lock, a device, and a storage medium. Background technique [0002] The current unlocking principle of the smart lock is usually configured to send an unlock command to the device after the centralized server is verified. When the centralized server fails, or the network connection between the user and the centralized server is interrupted, it will result in failure to unlock. [0003] In addition, some published patent applications have proposed some smart lock solutions combined with blockchain. However, the unlocking principles of these solutions are usually in the following two categories: [0004] 1. Configure a computer device for controlling the smart lock outside the smart lock, and control the smart lock after interacting with the blockchain network through the computer device; [0005]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04L9/08
CPCG07C9/00571H04L9/0861H04L9/0894
Inventor 雷磊王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products