Unlock instant, AI-driven research and patent intelligence for your innovation.

Security and protection method, device and system based on networked intelligent lock and server

A technology of smart locks and servers, applied in transmission systems, instruments, time registers, etc., can solve problems such as hidden dangers of smart locks, inability to monitor usage, and inability to control user security.

Pending Publication Date: 2020-07-07
湖南寓住寓美网络科技有限公司 +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, although the smart lock can be connected to the server, and the fingerprint, password, ID card, IC card and other information are sent to the server, and the lock is unlocked after the server verification is successful, but once the fingerprint, password, ID card, IC card, etc. If the information such as the card is stolen, the unlocking function can also be completed. Therefore, the existing smart lock has a relatively large security risk.
[0003] In addition, during the use of the existing smart lock, it is impossible to monitor its use, so that the user cannot fully control the security level, thereby reducing the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection method, device and system based on networked intelligent lock and server
  • Security and protection method, device and system based on networked intelligent lock and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Such as figure 1 As shown, the present invention provides a security method based on a networked smart lock, which is applied to a server and includes the following steps:

[0036] Receiving the unlocking instruction sent by the unlocker client and the unlocking information sent by the smart lock terminal;

[0037] Match the unlocking instruction and the unlocking information. If the match is consistent, send the unlocking execution instruction to the smart lock terminal and send the unlocking information, unlocking instruction, unlocking person information, and authorizing person information to the authorized person client; otherwise; , Generating first alarm information, and sending the first alarm information to the authorizer client;

[0038] Regularly check all the unlocking information of each smart lock terminal, determine whether there is a designated unlocker information within a set time point or time period, if not, generate a second alarm information, and authorize...

Embodiment 2

[0075] Such as figure 2 As shown, the present invention provides a security device based on a networked smart lock, which is used to implement the security method described in Embodiment 1. The security device includes:

[0076] The unlocker client information transceiver module is used to receive the unlocking instruction sent by the unlocker client;

[0077] The authorizer client information transceiver module is used to send the unlock information, the unlock instruction, the unlocker information, and the authorizer information to the authorizer client when the unlocking instruction matches the unlocking information. The authorizer client sends the first alarm information and the second alarm information;

[0078] The smart lock terminal information transceiver module is configured to receive unlock information sent by the smart lock terminal, and is also used to send an unlock execution instruction to the smart lock terminal when the unlock instruction matches the unlock inform...

Embodiment 3

[0096] The embodiment of the present invention provides a security system based on a networked smart lock (see figure 1 ) Includes a server, a client of the unlocker, a client of a smart lock, and a client of an authorizer, and the server is used to receive the unlocking instruction sent by the client of the unlocker and the unlocking information sent by the smart lock;

[0097] The server is also used to match the unlocking instruction with the unlocking information, and if the match is consistent, send an unlocking execution instruction to the smart lock terminal and send the unlocking information, unlocking instruction, and unlocking person information to the authorized person client And authorizer information; otherwise, generate first alarm information, and send the first alarm information to the authorizer client;

[0098] The server is also used to regularly check all the unlocking information of each smart lock terminal, to determine whether there is a designated unlocker in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security and protection method, device and system based on a networked intelligent lock and a server. The method comprises the steps: sending an unlocking instruction sent byan unlocking person client to a server through a network and sending the instruction to an intelligent lock end; sending the unlocking information of the intelligent lock end to the server end through a network; enabling the server to send the unlocking information to an authorizer client side (such as a smart phone, a telephone or a third-party server and the like) in a message pushing mode, a telephone short message mode, a telephone message mode and the like. Therefore, a user can master the unlocking information of the intelligent lock in real time. Meanwhile, by analyzing the door opening data, it is judged that a person does not have unlocking information at a specific lock end within a specified time period or a lock does not have unlocking information within a period of time, andthe analysis result of the unlocking information is informed to the user in a message pushing mode or a telephone short message mode or a telephone message leaving mode or the like. The track of a designated unlocking person is monitored, so the safety monitoring of related personnel is ensured, for example, students do not go home in time after school.

Description

Technical field [0001] The present invention relates to the field of security technology, in particular to a security method, device, system and server based on an intelligent lock. Background technique [0002] At present, although the smart lock can be connected to the server, and through the fingerprint, password, ID card, IC card and other information sent to the server, after the server verification is successful, the lock can be unlocked, but if the fingerprint, password, ID card, IC If such information as the card is stolen, the unlocking function can also be completed. Therefore, the existing smart lock has a greater security risk. [0003] In addition, the existing smart lock cannot monitor its use during use, so that the user cannot fully control the degree of security, thereby reducing the user's use experience. Summary of the invention [0004] One aspect of the present invention provides a security method based on a networked smart lock, which is applied to a server an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00H04L29/08
CPCG07C9/00563G07C9/00571G07C9/00817G07C9/00896G07C2009/00976H04L67/55
Inventor 李子祥周勇
Owner 湖南寓住寓美网络科技有限公司