Security and protection method, device and system based on networked intelligent lock and server
A technology of smart locks and servers, applied in transmission systems, instruments, time registers, etc., can solve problems such as hidden dangers of smart locks, inability to monitor usage, and inability to control user security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] Such as figure 1 As shown, the present invention provides a security method based on a networked smart lock, which is applied to a server and includes the following steps:
[0036] Receiving the unlocking instruction sent by the unlocker client and the unlocking information sent by the smart lock terminal;
[0037] Match the unlocking instruction and the unlocking information. If the match is consistent, send the unlocking execution instruction to the smart lock terminal and send the unlocking information, unlocking instruction, unlocking person information, and authorizing person information to the authorized person client; otherwise; , Generating first alarm information, and sending the first alarm information to the authorizer client;
[0038] Regularly check all the unlocking information of each smart lock terminal, determine whether there is a designated unlocker information within a set time point or time period, if not, generate a second alarm information, and authorize...
Embodiment 2
[0075] Such as figure 2 As shown, the present invention provides a security device based on a networked smart lock, which is used to implement the security method described in Embodiment 1. The security device includes:
[0076] The unlocker client information transceiver module is used to receive the unlocking instruction sent by the unlocker client;
[0077] The authorizer client information transceiver module is used to send the unlock information, the unlock instruction, the unlocker information, and the authorizer information to the authorizer client when the unlocking instruction matches the unlocking information. The authorizer client sends the first alarm information and the second alarm information;
[0078] The smart lock terminal information transceiver module is configured to receive unlock information sent by the smart lock terminal, and is also used to send an unlock execution instruction to the smart lock terminal when the unlock instruction matches the unlock inform...
Embodiment 3
[0096] The embodiment of the present invention provides a security system based on a networked smart lock (see figure 1 ) Includes a server, a client of the unlocker, a client of a smart lock, and a client of an authorizer, and the server is used to receive the unlocking instruction sent by the client of the unlocker and the unlocking information sent by the smart lock;
[0097] The server is also used to match the unlocking instruction with the unlocking information, and if the match is consistent, send an unlocking execution instruction to the smart lock terminal and send the unlocking information, unlocking instruction, and unlocking person information to the authorized person client And authorizer information; otherwise, generate first alarm information, and send the first alarm information to the authorizer client;
[0098] The server is also used to regularly check all the unlocking information of each smart lock terminal, to determine whether there is a designated unlocker in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

