Control method and device of intelligent door lock and electronic equipment
A technology of intelligent door locks and control methods, which is applied in the direction of cooperative devices, instruments, computer components, etc., can solve problems such as cumbersome steps, high safety hazards, and inability to unlock, so as to simplify the unlocking method, make up for loopholes in supervision, and avoid The effect of safety hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] The embodiment of the present application provides a control method for an intelligent door lock, such as figure 1 As shown, the method includes: step S101 to step S104.
[0054] Step S101 , receiving the two-dimensional code identification uploaded by the smart door lock, wherein the two-dimensional code identification is obtained by scanning a specified two-dimensional code, and the specified two-dimensional code is provided by a preset real-name authentication system.
[0055] In this embodiment of the application, the smart door lock server receives the QR code identification uploaded by the smart door lock.
[0056] In the embodiment of this application, the two-dimensional code identification does not contain any user identity information, which solves the problem of user identity leakage caused by the specified two-dimensional code carrying the user's identity information in the prior art, thereby improving the security of user identity information. safety.
[...
Embodiment 2
[0087] The embodiment of the present application provides another control method for smart door locks, such as Figure 5 As shown, the method includes: step S201, step S202 and step S203.
[0088] Step S201, receiving an identity identification request, wherein the identity identification request includes at least a two-dimensional code identification.
[0089] In the embodiment of the present application, the real-name authentication system receives the identification request uploaded by the smart door lock server. Specifically, the real-name authentication database may be stored on the real-name authentication server, or may be stored on a database server connected to the real-name authentication server. Specifically, the real-name authentication server may be the household registration management platform of the Ministry of Public Security.
[0090] Step S202. According to the two-dimensional code identification in the identification request, query the pre-stored real-nam...
Embodiment 3
[0107] In order to further illustrate the method provided by the present application, as follows Figure 7 The system shown is described in detail. The system includes a smart door lock 100 , a smart door lock server 200 , a real-name authentication system 300 and an application APP 400 for real-name authentication.
[0108] Among them, the real-name authentication system 300 displays the specified QR code through the real-name authentication application APP 400, so that the smart door lock 100 uses the QR code scanning module to scan the specified QR code, and uses the fingerprint collection module to collect the fingerprint of the unlocker.
[0109] In actual application, the system provided by this application can have the following three unlocking implementations:
[0110] Option One:
[0111] Such as Figure 8 As shown, the unlocking process of Scheme 1 includes the following steps:
[0112] (1) The smart door lock scans the specified QR code provided by the real-name...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


