Door lock control method and device, electronic equipment and storage medium
A technology of a control method and a control device, which is applied in the field of electronic equipment, storage media, devices, and door lock control methods, and can solve problems such as cost and appearance limitations of smart door locks
Active Publication Date: 2022-02-15
GREE ELECTRIC APPLIANCES INC OF ZHUHAI +1
12 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
[0003]However, the above door opening methods have certain...
Method used
[0119] The door lock control method provided by the embodiments of the present disclosure is applied to a bluetooth mobile terminal, which can broadcast bluetooth information, wherein the above bluetooth information is used to determine whether the above bluetooth mobile terminal has control authority for the above door lock, after that, In the case that the above-mentioned Bluetooth mobile terminal has the above-mentioned control authority, the door lock control page is presented, and then, through the above-mentioned door lock control page, the verification key for the above-mentioned door lock is obtained. Finally, if the above-mentioned Bluetooth mobile terminal is located at the predetermined door Within the lock control range, the above-mentioned door lock is controlled based on the above-mentioned verification key. According to this method, the door lock is controlled by the bluetooth mobile terminal, which helps to realize the non-contact control of the door lock.
[0128] In the disclosed embodiment, the default verification key can be set by the bluetooth mobile terminal, thus, the bluetooth mobile terminal can directly send the default verification key for password verification, thereby improving Improve the efficiency of door lock control.
[0135] In addition, the user can set the default pop-up window when remotely controlling the smart door lock through the above-mentioned application program, for example, setting the default pop-up window as the password input interface for verifying the unlocking authority (that is, the above-mentioned door lock cont...
Abstract
The embodiment of the invention relates to a door lock control method and device, electronic equipment and a storage medium, the method is applied to a Bluetooth mobile terminal, the method comprises the steps of broadcasting Bluetooth information, wherein the Bluetooth information is used for determining whether the Bluetooth mobile terminal has a control authority for a door lock or not; under the condition that the Bluetooth mobile terminal has the control authority, presenting a door lock control page; acquiring a verification key for the door lock through the door lock control page; and if the Bluetooth mobile terminal is located in a predetermined door lock control range, controlling the door lock based on the verification key. According to the method, the door lock is controlled through the Bluetooth mobile terminal, and non-contact control over the door lock is facilitated.
Application Domain
Individual entry/exit registers
Technology Topic
Embedded systemComputer hardware +1
Image
Examples
- Experimental program(1)
Example Embodiment
[0075] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangement of the components and steps, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.
[0076] Those skilled in the art can understand that terms such as "first" and "second" in the embodiments of the present disclosure are only used to distinguish objects such as different steps, devices, or modules, and neither represent any specific technical meaning nor represent any of them. logical sequence between them.
[0077] It should also be understood that, in the embodiments of the present disclosure, "a plurality" may refer to two or more, and "at least one" may refer to one, two or more.
[0078] It should also be understood that any component, data or structure mentioned in the embodiments of the present disclosure can generally be understood as one or more in the case of no explicit definition or contrary indications given in the context.
[0079] In addition, the term "and/or" in the present disclosure is only an association relationship to describe associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, and A and B exist at the same time , there are three cases of B alone. In addition, the character "/" in the present disclosure generally indicates that the related objects are an "or" relationship.
[0080] It should also be understood that the description of the various embodiments in the present disclosure emphasizes the differences between the various embodiments, and the same or similar points can be referred to each other, and for the sake of brevity, they will not be repeated.
[0081] The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application or uses in any way.
[0082] Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods, and apparatus should be considered part of the specification.
[0083] It should be noted that like numerals and letters refer to like items in the following figures, so once an item is defined in one figure, it does not require further discussion in subsequent figures.
[0084] It should be noted that the embodiments of the present disclosure and the features of the embodiments may be combined with each other under the condition of no conflict. In order to facilitate the understanding of the embodiments of the present disclosure, the present disclosure will be described in detail below with reference to the accompanying drawings and in conjunction with the embodiments. Obviously, the described embodiments are some, but not all, embodiments of the present disclosure. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present disclosure.
[0085] figure 1 A schematic flowchart of a door lock control method provided by an embodiment of the present disclosure, such as figure 1 As shown, the method is applied to a Bluetooth mobile terminal, and the method specifically includes:
[0086] 101. Broadcast Bluetooth information.
[0087] In the embodiment of the present disclosure, the execution body of the door lock control method (that is, the Bluetooth mobile terminal) may broadcast Bluetooth information.
[0088] Wherein, the above-mentioned Bluetooth information is used to determine whether the above-mentioned Bluetooth mobile terminal has control authority for the above-mentioned door lock.
[0089] The above-mentioned bluetooth mobile terminal may be any mobile terminal with bluetooth function. As an example, the bluetooth mobile terminal may be a bluetooth mobile phone, a computer having a bluetooth function, and so on.
[0090] In some optional implementation manners of this embodiment, whether the above-mentioned Bluetooth mobile terminal has the above-mentioned control authority may be determined in the following manner:
[0091] First, it is determined whether the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the above-mentioned Bluetooth information.
[0092] Wherein, the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock. For example, a door lock or an electronic device (such as a server) communicatively connected to the door lock may store the above-mentioned preset Bluetooth identifier set. Therefore, after the door lock scans the Bluetooth information broadcast by the Bluetooth mobile terminal, the Bluetooth identifier in the scanned Bluetooth information can be extracted to determine whether the preset Bluetooth identifier set includes the same Bluetooth identifier as the scanned Bluetooth identifier. Bluetooth logo.
[0093] Afterwards, if the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0094] Optionally, if the preset Bluetooth identification set does not include the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal does not have the control authority for the door lock.
[0095] In some other optional implementation manners of this embodiment, whether the above-mentioned Bluetooth mobile terminal has the above-mentioned control authority may also be determined in the following manner:
[0096] If the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, and the Bluetooth information indicates that the distance between the Bluetooth mobile terminal and the door lock is within the target distance range, then the Bluetooth mobile terminal is determined to be the same. Has the above control authority.
[0097] Wherein, the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock. The target distance range may be the distance range set by the Bluetooth mobile terminal, or the distance determined based on the time when the Bluetooth information broadcast by the Bluetooth mobile terminal is scanned in the historical records and the time when the Bluetooth mobile terminal is unlocked. scope.
[0098] In some cases, the target distance range does not include 0 meters. Thereby, a contactless control of the door lock can be realized. If the distance between the Bluetooth mobile terminal and the door lock is 0 meters (that is, the two are in contact), it can be determined that the Bluetooth mobile terminal does not currently have the control authority for the door lock. When the distance between the Bluetooth mobile terminal and the door lock is 0 meters, it means that the user who uses the Bluetooth mobile terminal is not familiar with the way of using the door lock, and the probability of belonging to a stranger is high.
[0099] 102. In the case that the Bluetooth mobile terminal has the control authority, present a door lock control page.
[0100] In the embodiment of the present disclosure, when the door lock or the electronic device communicatively connected to the door lock determines that the Bluetooth mobile terminal has the control authority, the execution body may present the door lock control page.
[0101] Among them, the door lock control page can realize the control of the door lock.
[0102] In some optional implementation manners of this embodiment, the foregoing execution body may further perform at least one of the following operations:
[0103] In the case of detecting the authentication operation triggered by the above door lock control page, present the preset authentication page;
[0104] In the case of detecting the permission setting operation triggered by the above door lock control page, present the preset door lock control permission setting page;
[0105] In the case of detecting an information query operation triggered by the above door lock control page, present a preset door lock setting information query page;
[0106] In the case that a program upgrade operation triggered by the above door lock control page is detected, a preset program upgrade page is presented.
[0107] The above-mentioned authentication page can be used for password input and password verification. If the password verification is passed, the door lock can be controlled, such as opening or closing.
[0108] The above door lock control authority setting page can be used to set the operation authority for the door lock. For example, the password of the door lock can be modified, added, deleted, etc., and the identification of the bluetooth mobile terminal with the above control authority can also be added or deleted, so as to control the control authority of other bluetooth mobile terminals on the door lock.
[0109] The above-mentioned door lock setting information inquiry page can be used to inquire about the password of the door lock and the identification of the Bluetooth mobile terminal with the above-mentioned control authority.
[0110] The above program upgrade page can be used to upgrade programs (such as the above door lock control method)
[0111] 103. Obtain the verification key for the above door lock through the above door lock control page.
[0112] In the embodiment of the present disclosure, the above-mentioned execution body may obtain the verification key for the above-mentioned door lock through the above-mentioned door lock control page.
[0113] In some optional implementations of this embodiment, the above-mentioned execution body may perform step 103 in the following manner, so as to obtain the verification key for the above-mentioned door lock through the above-mentioned door lock control page:
[0114] Obtain the verification key for the above door lock entered into the above door lock control page.
[0115] 104. If the Bluetooth mobile terminal is located within a predetermined door lock control range, control the door lock based on the verification key.
[0116] In the embodiment of the present disclosure, if the above-mentioned Bluetooth mobile terminal is located within a predetermined control range of the door lock, the above-mentioned door lock can be controlled based on the above-mentioned verification key. For example, if the above verification key is the same as the key used to open or close the door lock, the door lock can be controlled to open or close.
[0117] Wherein, the door lock control range may be the distance range set by the Bluetooth mobile terminal, or may be based on the time of scanning the Bluetooth information broadcast by the Bluetooth mobile terminal in the historical record, and the time of unlocking by the Bluetooth mobile terminal. Determined distance range.
[0118] In some cases, the door lock control range does not include 0 meters. Thereby, a contactless control of the door lock can be realized.
[0119] The door lock control method provided by the embodiment of the present disclosure is applied to a Bluetooth mobile terminal, which can broadcast Bluetooth information, wherein the Bluetooth information is used to determine whether the Bluetooth mobile terminal has control authority for the door lock, and then the Bluetooth information is used to determine whether the Bluetooth mobile terminal has the control authority for the door lock. In the case that the mobile terminal has the above control authority, the door lock control page is presented, and then, the verification key for the above door lock is obtained through the above door lock control page, and finally, if the above Bluetooth mobile terminal is located in the predetermined door lock control range Inside, the above door lock is controlled based on the above verification key. In this way, the door lock is controlled by the Bluetooth mobile terminal, which is helpful to realize the non-contact control of the door lock.
[0120] Figure 2A A schematic flowchart of another door lock control method provided by the embodiment of the present disclosure, such as Figure 2A As shown, the method is applied to a Bluetooth mobile terminal, and the method specifically includes:
[0121] 201. Broadcast Bluetooth information. Wherein, the above-mentioned Bluetooth information is used to determine whether the above-mentioned Bluetooth mobile terminal has control authority for the above-mentioned door lock.
[0122] 202. Present a door lock control page when the above-mentioned Bluetooth mobile terminal has the above-mentioned control authority.
[0123] 203. Obtain a default authentication key for the door lock from the door lock control page.
[0124] In the embodiment of the present disclosure, the execution body of the door lock control method (that is, the Bluetooth mobile terminal) can obtain the default verification key for the door lock from the door lock control page.
[0125] The above-mentioned default verification key can be set and saved in the Bluetooth mobile terminal via the user who uses the Bluetooth mobile terminal.
[0126] As an example, the user may set the above-mentioned default authentication key through an application program of the Bluetooth mobile terminal. Therefore, in the process of using the Bluetooth mobile terminal to approach the door lock, the Bluetooth mobile terminal can automatically pop up an interface including the default verification key, and through the above application program, the default verification key is sent to the door lock for password validity judgment. , if the smart door lock passes the judgment, the door will be opened immediately. This control method improves the convenience of using the door lock.
[0127] 204. If the above-mentioned Bluetooth mobile terminal is located within a predetermined door lock control range, control the above-mentioned door lock based on the above-mentioned verification key.
[0128] In the embodiment of the present disclosure, the default verification key can be set by the Bluetooth mobile terminal, so that the Bluetooth mobile terminal can directly send the default verification key for password verification, thereby improving the door lock. control efficiency.
[0129] Figure 2B This is a schematic flowchart of another door lock control method provided by an embodiment of the present disclosure. The method can be applied to application scenarios of smart door locks. The above-mentioned smart door lock may have a Bluetooth function. It can be turned on and off through an application program installed in the Bluetooth mobile terminal. Here, the following exemplary description is given by taking the Bluetooth mobile terminal as a mobile phone. like Figure 2B As shown, the method specifically includes:
[0130] First, the user can select the smart door lock for pairing by using an application installed on the mobile phone (for example, for executing the above-mentioned door lock control method). During the pairing process of the mobile phone with the smart door lock, keep the Bluetooth function turned on. Through the application, the Bluetooth information of the mobile phone can be sent to the smart door lock. After the smart door lock receives the bluetooth information, it compares the bluetooth information (for example, determines whether the preset bluetooth identifier set includes the same bluetooth identifier as the bluetooth identifier included in the above-mentioned bluetooth information to achieve comparison), and verifies whether the key is correct , to verify whether the user has door lock administrator privileges. If the verification is passed, the Bluetooth information of the mobile phone is saved, which is used to identify and connect the short-range Bluetooth of the user's mobile phone.
[0131] Here, for a smart door lock, the number of administrators of one type is generally one, and the user who first adds pairing is the administrator. The smart door lock is paired with the mobile phone user from the initial state. After the pairing is successful, the user ID is automatically set from 0 when the user information is saved. One mobile phone user information is stored corresponding to a user ID, and the default ID is 0 is the administrator. Among them, the door lock administrator authority can include: deleting, adding and setting ordinary users, all require the administrator to verify and agree before the operation can be successful, which is equivalent to the head of a family. When a user's mobile phone with administrator privileges is close to the door lock, the application program interface that automatically pops up has the following features: image 3 The complete operation function shown shows that the password modification, addition, deletion and other settings of all users in the home bound to the door lock can be set, and the usage records of all users in the home bound to the door lock can also be queried, that is, it has The current maximum authority to control the door lock. After an ordinary user is successfully added, there are only a simple identity information verification interface (ie, unlocking function) and an information query interface for the relevant usage records of the user when using it.
[0132] After that, use the mobile phone to approach the smart door lock, the mobile phone broadcasts the Bluetooth information, the smart door lock automatically scans and recognizes the surrounding Bluetooth information, and determines whether to bind the mobile phone corresponding to the scanned Bluetooth information. If it has been bound, it can automatically send a verification success message to the mobile phone that has been bound, and realize the automatic connection between the smart door lock and the mobile phone through Bluetooth information.
[0133] Then, after the mobile phone receives the message that the smart door lock is successfully bound, the application program pops up the operation selection interface (that is, the above-mentioned door lock control page), and the selection operations of "authentication", "common settings" and "information query" can be performed. Select any function to enter the corresponding operation interface, and perform detailed functional operation control of the smart door lock. The application can send the corresponding operation command to the smart door lock through Bluetooth encryption, and the smart door lock will judge and save it.
[0134] Then, the user clicks "authentication" of the application to enter the password input interface (that is, the above-mentioned authentication page) to perform password authentication. Click "General Settings" in the application to enter the function setting interface (that is, the above-mentioned door lock control permission setting page), which can operate the smart door lock function, issue temporary passwords, delete passwords, etc. Click the "Information Query" of the application to enter the door lock setting information query and firmware upgrade interface (that is, the above door lock setting information query page and program upgrade page).
[0135] In addition, the user can set the default pop-up window for short-range control of the smart door lock through the above application program, for example, set the default pop-up window as a password input interface for verifying unlocking authority (ie, the above door lock control page). Within the proximity sensing range of the smart door lock, use the mobile phone to approach the smart door lock, the mobile phone can automatically pop up the password input interface (that is, the above-mentioned door lock control page), and the password information (that is, the above-mentioned default verification key) will be sent by the application. ) to the smart door lock to judge the validity of the password, and the smart door lock will open the door immediately after the judgment is passed. This control method improves the convenience of the smart door lock.
[0136] Here, since the Bluetooth scanning of the door lock is always on and scans the surrounding range of devices once every 2 seconds, generally speaking, the distance between the mobile phone and the door lock is within 10 meters, the smart door lock can detect the Bluetooth, in order to strengthen the security , the detection range and signal strength can be controlled, and the connection can be made when the conditions are met. In practice, it can be developed based on the Bluetooth 8762 chip, and the constraints of the Bluetooth connection can be changed by setting the Bluetooth broadcast parameters of the chip through the application layer. Wherein, the above-mentioned Bluetooth broadcast parameters may include at least one of the following: Bluetooth search connection distance, and Bluetooth continuous scanning time.
[0137] Finally, after the smart door lock is bound to the user's mobile phone, the user can add multiple family members to the family, and multiple family members in a family can use the application in their mobile phone to select the same smart door lock for pairing , to realize the remote control of the door lock through the application installed on the mobile phone.
[0138] At present, the smart door locks on the market basically rely on passwords, fingerprints, finger veins, magnetic cards, etc. to operate the smart door locks locally in order to obtain the door opening authority. This kind of door opening method has a certain cost and appearance of the smart door lock. limited.
[0139] The door lock control method provided by the embodiment of the present disclosure can solve the problem that the control of the smart door lock is limited to local operation or needs to be contacted, so that the user can realize the short-range control of the smart door lock through the application program installed on the mobile phone, and the function of automatic pop-up can be realized. The control interface reflects the functional diversity of the smart door lock.
[0140] image 3 A schematic flowchart of still another door lock control method provided by the embodiment of the present disclosure, such as image 3 As shown, the method is applied to a Bluetooth door lock, and the method includes:
[0141] 301. Obtain Bluetooth information broadcast by a Bluetooth mobile terminal.
[0142] 302. Determine whether the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0143] 303. In the case that the above-mentioned bluetooth mobile terminal has the above-mentioned control authority, send information to the above-mentioned bluetooth mobile terminal for instructing the above-mentioned bluetooth mobile terminal to present a door lock control page.
[0144] 304. Obtain the verification key for the door lock through the door lock control page.
[0145] 305. If the Bluetooth mobile terminal is located within a predetermined door lock control range, control the door lock based on the verification key.
[0146] In some optional implementation manners of this embodiment, the above-mentioned determining whether the above-mentioned Bluetooth information indicates that the above-mentioned Bluetooth mobile terminal has control authority for the above-mentioned door lock includes:
[0147] determining whether the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, wherein the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock;
[0148]If the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0149] In some optional implementation manners of this embodiment, the above-mentioned obtaining the verification key for the above-mentioned door lock through the above-mentioned door lock control page includes:
[0150] Obtain the verification key for the above door lock entered into the above door lock control page; or
[0151] Obtain the default authentication key for the above door lock from the above door lock control page.
[0152] It should be noted that, in addition to the content described above, for each step described in the embodiments of the present disclosure, reference may be made to: figure 1 , Figure 2A and Figure 2B The steps of a door lock control method are performed, which may include and figure 1 , Figure 2A and Figure 2B The technical features described in the middle door lock control method are the same or corresponding technical features, and then realize figure 1 , Figure 2A and Figure 2B The technical effect of the door lock control method shown, please refer to figure 1 , Figure 2A and Figure 2B Relevant descriptions are not repeated here for brevity.
[0153] The door lock control method provided by the embodiment of the present disclosure is applied to a Bluetooth door lock, which can obtain Bluetooth information broadcast by a Bluetooth mobile terminal, and then determine whether the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock, and then, In the case that the above-mentioned bluetooth mobile terminal has the above-mentioned control authority, the information for instructing the above-mentioned bluetooth mobile terminal to present a door lock control page is sent to the above-mentioned bluetooth mobile terminal, and then, the verification for the above-mentioned door lock is obtained through the above-mentioned door lock control page key, and finally, if the above-mentioned Bluetooth mobile terminal is located within the predetermined control range of the door lock, the above-mentioned door lock is controlled based on the above-mentioned verification key. In this way, the door lock is controlled by the Bluetooth mobile terminal, which is helpful to realize the non-contact control of the door lock.
[0154] Figure 4A A schematic structural diagram of a door lock control device provided in an embodiment of the present disclosure, specifically including:
[0155] The broadcasting unit 401 is configured to broadcast Bluetooth information, wherein the Bluetooth information is used to determine whether the Bluetooth mobile terminal has the control authority for the door lock;
[0156] The first presentation unit 402 is configured to present a door lock control page when the above-mentioned Bluetooth mobile terminal has the above-mentioned control authority;
[0157] The first obtaining unit 403 is configured to obtain the verification key for the above-mentioned door lock through the above-mentioned door lock control page;
[0158] The first control unit 404 is configured to control the door lock based on the verification key if the Bluetooth mobile terminal is located within a predetermined door lock control range.
[0159] Optionally, in the apparatus of any embodiment of the present disclosure, the above-mentioned first obtaining unit 403 is further configured to:
[0160] Obtain the verification key for the above door lock entered into the above door lock control page; or
[0161] Obtain the default authentication key for the above door lock from the above door lock control page.
[0162] Optionally, in the apparatus of any embodiment of the present disclosure, whether the above-mentioned Bluetooth mobile terminal has the above-mentioned control authority is determined in the following manner:
[0163] determining whether the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, wherein the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock;
[0164] If the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0165] Optionally, in the apparatus of any embodiment of the present disclosure, the above-mentioned apparatus further includes at least one of the following:
[0166] a second presentation unit (not shown in the figure), configured to present a preset authentication page when an authentication operation triggered by the door lock control page is detected;
[0167] a third presentation unit (not shown in the figure), configured to present a preset door lock control authority setting page when the authority setting operation triggered by the door lock control page is detected;
[0168] a fourth presentation unit (not shown in the figure), configured to present a preset door lock setting information inquiry page when an information inquiry operation triggered by the door lock control page is detected;
[0169] The fifth presentation unit (not shown in the figure) is configured to present a preset program upgrade page when a program upgrade operation triggered by the door lock control page is detected.
[0170] The door lock control device provided in this embodiment may be as follows Figure 4B The door lock control shown in the figure 1 , Figure 2A and Figure 2B All steps of the door lock control method, and then realize figure 1 , Figure 2A and Figure 2B The technical effect of the door lock control method shown, please refer to figure 1 , Figure 2A and Figure 2B Relevant descriptions are not repeated here for brevity.
[0171] Figure 4B A schematic structural diagram of a door lock control device provided in an embodiment of the present disclosure, specifically including:
[0172] The second obtaining unit 411 is configured to obtain the Bluetooth information broadcast by the Bluetooth mobile terminal;
[0173] The determining unit 412 is configured to determine whether the above-mentioned Bluetooth information indicates that the above-mentioned Bluetooth mobile terminal has the control authority for the above-mentioned door lock;
[0174] The sending unit 413 is configured to send information for instructing the Bluetooth mobile terminal to present a door lock control page to the Bluetooth mobile terminal when the Bluetooth mobile terminal has the control authority;
[0175] The third obtaining unit 414 is configured to obtain the verification key for the above door lock through the above door lock control page;
[0176] The second control unit 415 is configured to control the door lock based on the verification key if the Bluetooth mobile terminal is located within a predetermined door lock control range.
[0177] Optionally, in the apparatus of any embodiment of the present disclosure, the foregoing determining unit 412 is further configured to:
[0178] determining whether the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, wherein the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock;
[0179] If the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0180] Optionally, in the apparatus of any embodiment of the present disclosure, the third obtaining unit 414 is further configured to:
[0181] Obtain the verification key for the above door lock entered into the above door lock control page; or
[0182] Obtain the default authentication key for the above door lock from the above door lock control page.
[0183] The door lock control device provided in this embodiment may be as follows Figure 4B The door lock control shown in the image 3 All steps of the door lock control method, and then realize image 3 The technical effect of the door lock control method shown, please refer to image 3 Relevant descriptions are not repeated here for brevity.
[0184] Figure 5 A schematic structural diagram of an electronic device provided by an embodiment of the present disclosure, Figure 5 The illustrated electronic device 500 includes: at least one processor 501 , memory 502 , at least one network interface 504 and other user interfaces 503 . The various components in electronic device 500 are coupled together by bus system 505 . It is understood that the bus system 505 is used to implement the connection communication between these components. In addition to the data bus, the bus system 505 also includes a power bus, a control bus and a status signal bus. But for the sake of clarity, in Figure 5 The various buses are designated as bus system 505 in the .
[0185] Among them, the user interface 503 may include a display, a keyboard, or a pointing device (eg, a mouse, a trackball, a touch pad or a touch screen, etc.).
[0186] It will be appreciated that the memory 502 in embodiments of the present disclosure may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory. Wherein, the non-volatile memory may be Read-Only Memory (ROM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (Erasable PROM, EPROM), Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of example and not limitation, many forms of RAM are available, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM, SLDRAM) And direct memory bus random access memory (DirectRambus RAM, DRRAM). The memory 502 described herein is intended to include, but not be limited to, these and any other suitable types of memory.
[0187] In some embodiments, memory 502 stores the following elements, executable units or data structures, or subsets thereof, or extended sets of them: operating system 5021 and applications 5022 .
[0188]The operating system 5021 includes various system programs, such as a framework layer, a core library layer, a driver layer, etc., for implementing various basic services and processing hardware-based tasks. The application program 5022 includes various application programs, such as a media player (Media Player), a browser (Browser), etc., for implementing various application services. A program implementing the method of the embodiment of the present disclosure may be included in the application program 5022 .
[0189] In the embodiment of the present disclosure, by calling the program or instruction stored in the memory 502, specifically, the program or instruction stored in the application program 5022, the processor 501 is configured to execute the embodiment of the door lock control method applied to the Bluetooth mobile terminal The provided method steps include, for example: broadcasting Bluetooth information, wherein the Bluetooth information is used to determine whether the Bluetooth mobile terminal has the control authority for the door lock; in the case that the Bluetooth mobile terminal has the control authority, presenting the door The lock control page; the verification key for the door lock is obtained through the door lock control page; if the Bluetooth mobile terminal is located within the predetermined door lock control range, the door lock is controlled based on the verification key.
[0190] Optionally, in the method of any embodiment of the present disclosure, the above-mentioned obtaining the verification key for the above-mentioned door lock through the above-mentioned door lock control page includes:
[0191] Obtain the verification key for the above door lock entered into the above door lock control page; or
[0192] Obtain the default authentication key for the above door lock from the above door lock control page.
[0193] Optionally, in the method of any embodiment of the present disclosure, whether the above-mentioned Bluetooth mobile terminal has the above-mentioned control authority is determined in the following manner:
[0194] determining whether the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, wherein the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock;
[0195] If the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0196] Optionally, in the method of any embodiment of the present disclosure, the above method further includes at least one of the following:
[0197] In the case of detecting the authentication operation triggered by the above door lock control page, present the preset authentication page;
[0198] In the case of detecting the permission setting operation triggered by the above door lock control page, present the preset door lock control permission setting page;
[0199] In the case of detecting an information query operation triggered by the above door lock control page, present a preset door lock setting information query page;
[0200] In the case that a program upgrade operation triggered by the above door lock control page is detected, a preset program upgrade page is presented.
[0201] In other embodiments of the present disclosure, by calling the program or instruction stored in the memory 502, specifically, the program or instruction stored in the application program 5022, the processor 501 can also be used to execute the door lock applied to the Bluetooth door lock The method steps provided by the control method embodiment include, for example: acquiring Bluetooth information broadcast by a Bluetooth mobile terminal; determining whether the Bluetooth information indicates that the Bluetooth mobile terminal has the control authority for the door lock; the Bluetooth mobile terminal has the control authority In the case of the above-mentioned bluetooth mobile terminal, the information used to instruct the above-mentioned bluetooth mobile terminal to present the door lock control page is sent to the above-mentioned bluetooth mobile terminal; through the above-mentioned door lock control page, the verification key for the above-mentioned door lock is obtained; if the above-mentioned bluetooth mobile terminal is located in a predetermined Within the control range of the door lock, the above door lock is controlled based on the above verification key.
[0202] Optionally, in the method of any embodiment of the present disclosure, the above-mentioned determining whether the above-mentioned Bluetooth information indicates that the above-mentioned Bluetooth mobile terminal has control authority for the above-mentioned door lock includes:
[0203] determining whether the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, wherein the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock;
[0204] If the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0205] Optionally, in the method of any embodiment of the present disclosure, the above-mentioned obtaining the verification key for the above-mentioned door lock through the above-mentioned door lock control page includes:
[0206] Obtain the verification key for the above door lock entered into the above door lock control page; or
[0207] Obtain the default authentication key for the above door lock from the above door lock control page.
[0208] The methods disclosed in the above embodiments of the present disclosure may be applied to the processor 501 or implemented by the processor 501 . The processor 501 may be an integrated circuit chip with signal processing capability. In the implementation process, each step of the above-mentioned method can be completed by an integrated logic circuit of hardware in the processor 501 or an instruction in the form of software. The above-mentioned processor 501 may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other possible Programming logic devices, discrete gate or transistor logic devices, discrete hardware components. The disclosed methods, steps and logical block diagrams in the embodiments of the present disclosure can be implemented or executed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the methods disclosed in conjunction with the embodiments of the present disclosure can be directly embodied as executed by a hardware decoding processor, or executed by a combination of hardware and software units in the decoding processor. The software unit may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art. The storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502, and completes the steps of the above method in combination with its hardware.
[0209] It will be appreciated that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or a combination thereof. For hardware implementation, the processing unit may be implemented in one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDevices, DSPDs), programmable logic devices (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processor, controller, microcontroller, microprocessor, other electronic units for performing the above-mentioned functions of the present application or its in combination.
[0210] For a software implementation, the techniques described herein may be implemented by means of units that perform the functions described herein. Software codes may be stored in memory and executed by a processor. The memory can be implemented in the processor or external to the processor.
[0211] The electronic device provided in this embodiment may be as follows Figure 5 The electronic equipment shown in the Figure 1-3 All steps of the door lock control method, and then realize Figure 1-3 The technical effect of the door lock control method shown, please refer to Figure 1-3 Relevant descriptions are not repeated here for brevity.
[0212] Embodiments of the present disclosure also provide a storage medium (computer-readable storage medium). The storage medium here stores one or more programs. Wherein, the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, hard disk or solid-state hard disk; the memory may also include the above-mentioned types of memory. combination.
[0213] When one or more programs in the storage medium can be executed by one or more processors, so as to realize the above-mentioned door lock control method executed on the side of the electronic device.
[0214] The above-mentioned processor is used for executing the door lock control program stored in the memory, so as to realize the following steps of the door lock control method executed on the electronic device side: broadcasting bluetooth information, wherein the above-mentioned bluetooth information is used to determine whether the above-mentioned bluetooth mobile terminal has The control authority of the door lock; when the above-mentioned bluetooth mobile terminal has the above-mentioned control authority, the door lock control page is presented; through the above-mentioned door lock control page, the verification key for the above-mentioned door lock is obtained; if the above-mentioned bluetooth mobile terminal is located in a predetermined Within the control range of the door lock, the above door lock is controlled based on the above verification key.
[0215] Optionally, in the method of any embodiment of the present disclosure, the above-mentioned obtaining the verification key for the above-mentioned door lock through the above-mentioned door lock control page includes:
[0216] Obtain the verification key for the above door lock entered into the above door lock control page; or
[0217] Obtain the default authentication key for the above door lock from the above door lock control page.
[0218] Optionally, in the method of any embodiment of the present disclosure, whether the above-mentioned Bluetooth mobile terminal has the above-mentioned control authority is determined in the following manner:
[0219] determining whether the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, wherein the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock;
[0220] If the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0221] Optionally, in the method of any embodiment of the present disclosure, the above method further includes at least one of the following:
[0222] In the case of detecting the authentication operation triggered by the above door lock control page, present the preset authentication page;
[0223] In the case of detecting the permission setting operation triggered by the above door lock control page, present the preset door lock control permission setting page;
[0224] In the case of detecting an information query operation triggered by the above door lock control page, present a preset door lock setting information query page;
[0225] In the case that a program upgrade operation triggered by the above door lock control page is detected, a preset program upgrade page is presented.
[0226]Alternatively, the above-mentioned processor can also be used to execute the door lock control program stored in the memory, so as to realize the following steps of the door lock control method executed on the electronic device side: obtaining the Bluetooth information broadcast by the Bluetooth mobile terminal; determining whether the above-mentioned Bluetooth information indicates whether the The above-mentioned bluetooth mobile terminal has the control authority for the above-mentioned door lock; in the case that the above-mentioned bluetooth mobile terminal has the above-mentioned control authority, the information used to instruct the above-mentioned bluetooth mobile terminal to present the door lock control page is sent to the above-mentioned bluetooth mobile terminal; On the lock control page, the verification key for the door lock is obtained; if the Bluetooth mobile terminal is located within the predetermined door lock control range, the door lock is controlled based on the verification key.
[0227] Optionally, in the method of any embodiment of the present disclosure, the above-mentioned determining whether the above-mentioned Bluetooth information indicates that the above-mentioned Bluetooth mobile terminal has control authority for the above-mentioned door lock includes:
[0228] determining whether the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, wherein the terminal corresponding to the Bluetooth identification in the preset Bluetooth identification set has the control authority for the door lock;
[0229] If the preset Bluetooth identification set includes the same Bluetooth identification as the Bluetooth identification included in the Bluetooth information, it is determined that the Bluetooth information indicates that the Bluetooth mobile terminal has control authority for the door lock.
[0230] Optionally, in the method of any embodiment of the present disclosure, the above-mentioned obtaining the verification key for the above-mentioned door lock through the above-mentioned door lock control page includes:
[0231] Obtain the verification key for the above door lock entered into the above door lock control page; or
[0232] Obtain the default authentication key for the above door lock from the above door lock control page.
[0233] Professionals should be further aware that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, computer software, or a combination of the two. Interchangeability, the above description has generally described the components and steps of each example in terms of function. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this disclosure.
[0234] The steps of a method or algorithm described in connection with the embodiments disclosed herein may be implemented in hardware, a software module executed by a processor, or a combination of the two. A software module can be placed in random access memory (RAM), internal memory, read only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or any other in the technical field. in any other known form of storage medium.
[0235] The specific embodiments described above further describe the purpose, technical solutions and beneficial effects of the present disclosure in detail. It should be understood that the above descriptions are only specific embodiments of the present disclosure, and are not intended to limit the scope of the present disclosure. Within the scope of protection, any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present disclosure shall be included within the scope of protection of the present disclosure.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.