The disclosure relates to an unlocking method, and more particularly to an authorization and unlocking method and system for a door lock, an electronic device, and a computer-readable storage medium.
A traditional door lock is mainly unlocked through the key mechanism, and, however, now digital door locks are popular and accepted by consumers. There are two mainstream unlocking methods for the digital door locks, including physical identification, such as keys, cards and passwords, and biometric identification, such as fingerprints, iris, and facial recognition.
Regarding the traditional door lock and the digital door lock with the physical identification, if the key is lost or the password is leaked, there will be a risk of theft. With regard to biometric identification, the identification function is usually implemented on the digital door lock, which can be opened by forgery. In addition, most digital door locks are battery-powered, and cannot be used if the battery is dead.
Many aspects of the present disclosure can be better understood with reference to the following figures. The components in the figures are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views. Implementations of the present technology will now be described, by way of embodiments, with reference to the attached figures, wherein:
It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures, and components have not been described in detail so as not to obscure the related relevant feature being described. Also, the description is not to be considered as limiting the scope of the embodiments described herein. The drawings are not necessarily to scale and the proportions of certain parts may be exaggerated to better illustrate details and features of the present disclosure.
Several definitions that apply throughout this disclosure will now be presented.
The term “comprising,” when utilized, means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in the so-described combination, group, series, and the like.
An embodiment of an authorization and unlocking system for a door lock comprises a digital key 110, a digital lock 130 and a remote authorization server 150. The digital key 110 comprises a biometric element 111, a charging hole 112, a positioning point 113 and metal contacts 114, 115 and 116.
The biometric element 111 is configured to activate the digital key 110 and identify users. The biometric identification may be fingerprint recognition, iris recognition, facial recognition, and other technologies. The charging hole 112 charges the digital key 110. In addition to contact charging, wireless charging can also be accepted. The positioning point 113 confirms that the digital key 110 has been completely inserted into the digital door lock 130. When the digital key 110 is inserted into the digital door lock 130, the protruding positioning point 113 triggers the mechanism in the digital door lock 130, and the digital key 110 can be rotated by the user.
The metal contact 114 represents a ground (GND). The metal contact 115 represents a current condenser (VCC). The metal contacts 114 and 115 are mainly used to supply power to the charging hole 112. The metal contact point 116 is used to transmit data between the digital key 110 and the digital door lock 130. The digital key 110 also provides a slot for inserting a subscriber identity module (SIM) card to provide mobile network access.
An inner side of the digital door lock 130 has a row of metal shrapnel used to obtain power and transmit data. When the digital key 110 is inserted into the digital door lock 130, it must be rotated to touch the metal shrapnel. The interior of the digital door lock 130 has a snap button. When the digital key 110 is completely inserted into the digital door lock 130, the positioning point 113 is pressed to the snap button, and the digital key 110 can be rotated.
Referring to
The digital key 110 must be bound with the digital door lock 130 before being used. In addition to one copy of the binding data being stored in the digital key 110 and the digital door lock 130, a copy is also stored in the remote authorization server 150.
In an embodiment, a digital key can only be bound to one digital door lock, while a digital door lock can be bound to multiple digital keys.
When the digital key 110 is bound to the digital door lock 130, and the digital key 110 is inserted and the digital door lock 130 is activated, the digital door lock 130 starts to interact with the remote authorization server 150. When it is confirmed that the digital key 110 is authorized, the digital door lock 130 is activated by the digital key 110.
In step S101, a device binding operation is performed. Before use, the digital key 110 and the digital door lock 130 need to be bound. The device binding operation only needs to be completed when the device is first used.
In step S102, the digital key 110 is unlocked. It should be noted that before the digital key 110 is inserted into the digital door lock 130, the digital key 110 must be activated through biometric identification and can only be activated when the identification is successful.
The digital key 110 is unlocked through the biometric identification. The biometric identification technology can be any of the following: fingerprint identification, iris identification, face identification and voiceprint identification. In addition to the biometric identification, the digital key 110 can also be unlocked with a password. After unlocking, the digital key 110 enters an unlocking mode.
In step S103, the digital key 110 is inserted into the digital door lock 130 to activate the digital door lock 130. The digital key 110 is inserted into the digital door lock 130 and is rotated, after confirming the location, to activate the digital door lock 130.
In step S104, it is determined whether the device binding operation has been completed. The digital door lock 130 is activated and then confirm whether the inserted digital key 110 is a bound device. If the digital key 110 is not a bound device, the flow of the method is terminated.
In step S105, if the digital key 110 is a bound device, a network link between the digital door lock 130 and the digital key 110 is established.
In step S106, it is determined whether the digital door lock 130 has passed the authorization of the remote authorization server 150. As the network link between the digital door lock 130 and the digital key 110 has been established, the digital door lock 130 is going to be authorized by the remote authorization server 150. If the authorization fails, the flow of the method is terminated.
In step S107, if the authorization is successful, the digital door lock 130 is unlocked. When the digital door lock 130 is authorized by the remote authorization server 150, the remote authorization server 150 notifies the digital door lock 130 to be unlocked.
In step S201, a start button (not shown) of the digital key 110 is pressed and held for a fixed time, for example, 10 seconds, so that the digital key 110 enters into a binding mode.
In step S202, the digital key 110 is inserted into the digital door lock 130 to activate the digital door lock 130.
In step S203, the digital door lock 130 determines whether the digital key 110 is approved. The digital door lock 130 determines whether the digital key 110 is approved. The digital door lock 130 determines whether the digital key 110 is an approved device according to a hardware identification code (a first hardware identification code) of the digital key 110, for example, whether the digital key 110 and the digital door lock 130 are produced with the same manufacturer. If the digital key 110 is not an approved device, the flow of the method is terminated.
In step S204, if the digital key 110 is approved, the digital door lock 130 replies its hardware identification code (a second hardware identification code) to the digital key 110 and a network link between the digital key 110 and the digital door lock 130 is established.
In step S205, as the network link between the digital key 110 and the digital door lock 130 has been established, the digital door lock 130 sends the binding data to the remote authorization server 150 to complete the binding operation. The binding data includes the first hardware identification code and the second hardware identification code. The remote authorization server 150 receives the binding data and responds with a binding code to the digital door lock 130. The digital door lock 130 stores the binding code and transmits the binding code to the digital key 110, and then the flow of the method is terminated.
The memory 220 stores a computer program, such as the authorization and unlocking system for a door lock 230, which is executable by the processor 210. When the processor 210 executes the authorization and unlocking system for a door lock 230, the blocks in one embodiment of the booting mode configuration method applied in the electronic device 200 are implemented, such as blocks S101 to S107 shown in
It will be understood by those skilled in the art that
The processor 210 may be a central processing unit (CPU), or other general-purpose processors, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a Field-Programmable Gate Array (FPGA), or another programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor 210 may be a microprocessor or other processor known in the art.
The memory 220 can be used to store the authorization and unlocking system for a door lock 230 and/or modules/units by running or executing computer programs and/or modules/units stored in the memory 220. The memory 220 may include a storage program area and a storage data area. In addition, the memory 220 may include a high-speed random access memory, a non-volatile memory such as a hard disk, a plug-in hard disk, a smart memory card (SMC), and a secure digital (SD) card, flash card, at least one disk storage device, flash device, or another volatile solid state storage device.
The authorization and unlocking system for a door lock 230 can be partitioned into one or more modules/units that are stored in the memory 220 and executed by the processor 210. The one or more modules/units may be a series of computer program instructions capable of performing particular functions of the authorization and unlocking system for a door lock 230.
The electronic device 200 comprises a binding module 310, a detecting and activating module 320 and an unlocking module 330.
The binding module 310 performs a device binding operation to bind the digital key 110 with the digital door lock 130.
The detecting and activating module 320 detects that the digital key 110 is inserted into the digital door lock 130 and activates the digital door lock 130. It should be noted that before the digital key 110 is inserted into the digital door lock 130, the digital key 110 must be activated through biometric identification and can only be activated when the identification is successful. The digital key 110 is unlocked through the biometric identification. The biometric identification technology can be any of the following: fingerprint identification, iris identification, face identification and voiceprint identification. In addition to the biometric identification, the digital key 110 can also be unlocked with a password. After unlocking, the digital key 110 enters an unlocking mode.
The detecting and activating module 320 determines whether the digital key 110 is a bound device. If the digital key 110 is a bound device, a network link between the digital door lock 130 and the digital key 110 is established.
The unlocking module 330 determines whether the digital door lock 130 is authorized by the remote authorization server 150. After the network link between the digital door lock 130 and the digital key 110 has been established, the digital door lock 130 is authorized by the remote authorization server 150.
If the authorization is successful, the unlocking module 330 performs an unlocking operation on the digital door lock 130. When the digital door lock 130 is authorized by the remote authorization server 150, the remote authorization server 150 notifies the digital door lock 130 to be unlocked.
It is to be understood, however, that even though numerous characteristics and advantages of the present disclosure have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in detail, especially in matters of shape, size, and arrangement of parts within the principles of the present disclosure to the full extent indicated by the broad general meaning of the terms in which the appended claims are expressed.