WO2017140266A1 - 应用于电子锁具的授权方法、装置及*** - Google Patents

应用于电子锁具的授权方法、装置及*** Download PDF

Info

Publication number
WO2017140266A1
WO2017140266A1 PCT/CN2017/073960 CN2017073960W WO2017140266A1 WO 2017140266 A1 WO2017140266 A1 WO 2017140266A1 CN 2017073960 W CN2017073960 W CN 2017073960W WO 2017140266 A1 WO2017140266 A1 WO 2017140266A1
Authority
WO
WIPO (PCT)
Prior art keywords
account
electronic lock
information
key information
server
Prior art date
Application number
PCT/CN2017/073960
Other languages
English (en)
French (fr)
Inventor
钱凯
傅晨彬
杨鑫
方烨
丁超辉
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2017140266A1 publication Critical patent/WO2017140266A1/zh
Priority to US16/030,745 priority Critical patent/US10586415B2/en

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00428Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed periodically after a time period
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations

Definitions

  • Embodiments of the present invention relate to the field of Internet of Things, and in particular, to a method, device, and system for authorizing an electronic lock.
  • the electronic lock is a new type of lock that relies on the key information to identify the user's identity and then unlocks the lock body or locks the lock body according to the user's identity.
  • Common electronic locks include a password door lock, a fingerprint door lock, a palm print door lock and the like.
  • An authorization method provided by the related art includes: an administrator establishes a Bluetooth connection with a fingerprint door lock by using a mobile phone APP (Application), and controls the fingerprint door lock to enter a “management mode” by using the mobile phone APP; in the “management mode”,
  • the fingerprint door lock acquires the fingerprint input by the user through the fingerprint collector, and receives the authority assigned by the administrator to use the mobile phone APP to allocate the fingerprint information, and then stores the fingerprint information and the rights in association.
  • the administrator assigns the fingerprint information permission: the user has the right to open the fingerprint door lock every day from 8:00 to 10:00, that is, the user corresponding to the fingerprint information can only open the fingerprint at 8:00-10:00 every day. Door lock.
  • the embodiment of the invention provides a method, device and system for authorizing the electronic lock.
  • the technical solution is as follows:
  • an authorization method for an electronic lock comprising:
  • the key information is sent to the electronic lock, the electronic lock being used to add the key information to a trusted key store.
  • an authorization method for an electronic lock comprising:
  • the key information of the second account sent by the server is obtained by the server according to the authorization request sent by the first instant messaging client, and the first instant messaging client is logged in with the first account, An authorization request is used to request permission to use the electronic lock to the second account;
  • an authorizing apparatus for an electronic lock comprising:
  • a first receiving module configured to receive an authorization request sent by the first instant messaging client, where the first instant messaging client logs in with a first account, and the authorization request is used to request the electronic account to be granted to the second account Use rights;
  • a querying module configured to query, according to the authorization request, key information bound to the second account
  • a first sending module configured to send the key information to the electronic lock, where the electronic lock is used to add the key information to a trusted keystore.
  • an authorizing apparatus for an electronic lock comprising:
  • a first receiving module configured to receive key information of a second account sent by the server; the key information is obtained by the server according to an authorization request sent by the first instant messaging client, where the first instant messaging client logs in Having a first account, the authorization request is used to request permission to use the electronic lock to the second account;
  • Adding a module for adding the key information to a trusted keystore Adding a module for adding the key information to a trusted keystore.
  • a server comprising:
  • One or more processors are One or more processors.
  • the memory stores one or more programs, the one or more programs being configured to be executed by the one or more processors, the one or more programs including instructions for:
  • the key information is sent to the electronic lock, the electronic lock being used to add the key information to a trusted key store.
  • an electronic lock comprising:
  • One or more processors are One or more processors.
  • the memory stores one or more programs, the one or more programs being configured to be executed by the one or more processors, the one or more programs including instructions for:
  • the key information of the second account sent by the server is obtained by the server according to the authorization request sent by the first instant messaging client, and the first instant messaging client is logged in with the first account, An authorization request is used to request permission to use the electronic lock to the second account;
  • an authorization system for an electronic lock comprising: a server, an electronic lock, and a terminal;
  • the server includes the apparatus of the third aspect described above;
  • the electronic lock includes the apparatus of the fourth aspect described above;
  • the server includes the server according to the fifth aspect described above;
  • the electronic lock includes the electronic lock of the sixth aspect described above.
  • a non-transitory computer readable storage medium for computer instructions executable by a processor in a server or an electronic lock to perform the first and second aspects described above Authorization method.
  • Receiving, by the server, an authorization request sent by the first instant messaging client that has the first account, and querying the key information bound to the second account according to the authorization request, so as to send the key information to the electronic lock, and the electronic lock will be
  • the key information is added to the trusted key pool; it solves the problem that when the user is away from the electronic lock, it is difficult to input key information such as fingerprints into the electronic lock, thereby causing the problem that the authorization cannot be completed; even if the user is away from the electronic lock, The key information can be entered remotely into the electronic lock to ensure that the authorization is working properly.
  • FIG. 1 is a schematic diagram of an implementation environment of an authorization method applied to an electronic lock, according to some exemplary embodiments
  • FIG. 2 is a flow chart showing an authorization method applied to an electronic lock, according to an exemplary embodiment
  • FIG. 3A is a flowchart showing an authorization method applied to an electronic lock, according to another exemplary embodiment
  • FIG. 3B is a schematic diagram of an implementation of an authorization method applied to an electronic lock, according to another exemplary embodiment
  • FIG. 3C is a schematic diagram of an implementation of an authorization method applied to an electronic lock, according to another exemplary embodiment
  • FIG. 3D is a schematic diagram of an instant messaging message sending interface according to another exemplary embodiment
  • 4A is a flow chart showing an authorization method applied to an electronic lock, according to another exemplary embodiment
  • FIG. 4B is a schematic diagram of an instant messaging message sending interface according to another exemplary embodiment
  • FIG. 5 is a block diagram of an authorization device applied to an electronic lock, according to an exemplary embodiment
  • FIG. 6 is a block diagram of an authorizing device applied to an electronic lock, according to another exemplary embodiment.
  • FIG. 7 is a block diagram showing an authorization device applied to an electronic lock, according to another exemplary embodiment.
  • FIG. 8 is a block diagram showing an authorization device applied to an electronic lock, according to another exemplary embodiment.
  • FIG. 9 is a block diagram showing an authorization device applied to an electronic lock, according to another exemplary embodiment.
  • FIG. 10 is a structural block diagram of a server according to an embodiment of the present invention.
  • Figure 11 is a block diagram showing the structure of an electronic lock provided by an embodiment of the present invention.
  • FIG. 12 is a block diagram of an authorization method system applied to an electronic lock, according to an exemplary embodiment.
  • Multiple as referred to herein means two or more. "and/or”, describing the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which may indicate that there are three cases where A exists separately, A and B exist at the same time, and B exists separately.
  • the character "/" generally indicates that the contextual object is an "or" relationship.
  • FIG. 1 is a schematic structural diagram of an implementation environment provided by an embodiment of the present invention.
  • the implementation environment includes: an electronic lock 110, a gateway device 120, a server 130, a first terminal 140, and a second terminal 150, wherein:
  • the electronic lock 110 is a lock that recognizes the user's identity by means of the key information, and then opens the lock body or locks the lock body according to the user's identity.
  • the electronic lock 110 has the capability of data storage and data transmission.
  • the electronic lock 110 is a password door lock (using a digital password as a key information), a fingerprint door lock (with a fingerprint as a key information), or a palm door lock (a palm print as a key information).
  • the electronic lock 110 also has the ability to time.
  • a wired or wireless connection is established between the electronic lock 110 and the gateway device 120, wherein the wireless connection includes a short-range, low-power wireless connection, such as Bluetooth or Zigbee.
  • a short-range, low-power wireless connection such as Bluetooth or Zigbee.
  • the gateway device 120 has a data conversion and transmission function, through the data conversion and transmission function, the network
  • the shutdown device 120 provides data transfer services for the server 130 and the electronic lock 110.
  • the gateway device 120 and the server 130 are connected by a wired network or a wireless network.
  • the server 130 is a background server of a third-party application, and the server 130 may be a server cluster or a cloud computing center composed of one server or multiple servers.
  • the server 130 stores the binding relationship between the electronic lock 110 and the administrator account, and the correspondence between the electronic lock 110 and the gateway device 120, wherein the administrator account has the electronic lock 110. Administrative rights.
  • the third-party application includes: an instant messaging application, or an application that provides a service corresponding to the electronic lock.
  • the server 130 and the first terminal 140 are connected by a wired network or a wireless network, and the server 130 and the second terminal 150 are connected by a wired network or a wireless network.
  • the first terminal 140 and the second terminal 150 are electronic devices having data storage and data transmission functions, for example, the electronic device is a smartphone or a tablet.
  • the first terminal 140 and the second terminal 150 each have an instant messaging client, wherein the instant messaging client running by the first terminal 140 logs in with the first account, and the second terminal 150 runs the instant messaging.
  • the client login has a second account.
  • the number of the first terminal 140 and the second terminal 150 is one or more.
  • the wireless or wired network described above uses standard communication techniques and/or protocols.
  • the network is usually the Internet, but can also be any network, including but not limited to a Local Area Network (LAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a mobile, a wired or a wireless. Any combination of networks, private networks, or virtual private networks).
  • data exchanged over a network is represented using techniques and/or formats including Hyper Text Markup Language (HTML), Extensible Markup Language (XML), and the like.
  • SSL Secure Socket Layer
  • TLS Transport Layer Security
  • VPN Virtual Private Network
  • IPsec Internet Protocol Security
  • Regular encryption techniques are used to encrypt all or some of the links.
  • the above described data communication techniques may also be replaced or supplemented using custom and/or dedicated data communication techniques.
  • FIG. 2 shows a flowchart of an authorization method applied to an electronic lock provided by an exemplary embodiment of the present invention.
  • This embodiment is applied to the authorization method applied to the electronic lock as shown in FIG.
  • the authorization method includes the following steps:
  • step 201 the server receives the authorization request sent by the first instant messaging client, and the first instant messaging client logs in with the first account, and the authorization request is used to request the second account to be granted the right to use the electronic lock.
  • the first account is bound to the electronic lock, and has the management right of the electronic lock, that is, the first account is an administrator account.
  • the second account is not the same account as the first account, the number of the second account is one or more, the second account has a friend relationship with the first account, or the second account does not have a friend relationship with the first account. .
  • step 202 the server queries the key information bound to the second account according to the authorization request.
  • the key information bound to the second account is pre-acquired and stored in the server by the second account.
  • the key information includes: password information, and/or fingerprint information, and/or pupil spacing information, and/or iris information, and/or facial image information, and/or palm print information. , and/or, gait information, and/or, heart rate information, and/or pulse information.
  • step 203 the server transmits the key information to the electronic lock.
  • the server queries the gateway device corresponding to the electronic lock, and sends the found key information to the electronic lock through the gateway device.
  • step 204 the electronic lock receives key information of the second account sent by the server.
  • the electronic lock receives the key information of the second account sent by the server through the gateway device.
  • step 205 the electronic lock adds the key information to the trusted key store.
  • steps 201 to 203 can be separately implemented as the authorization method applied to the electronic lock on the server side; the above steps 204 to 205 can be separately implemented as the authorization method applied to the electronic lock on the electronic lock side.
  • the authorization method applied to the electronic lock receives the authorization request sent by the first instant messaging client registered with the first account by the server, and binds to the second account according to the authorization request.
  • Key information thereby transmitting the key information to the electronic lock, and adding the key information to the trusted key pool by the electronic lock; solving the problem that when the user is away from the electronic lock, it is difficult to enter a key such as a fingerprint into the electronic lock
  • the information which in turn leads to the problem of not being able to complete the authorization; it is possible to remotely enter the key information into the electronic lock even if the user is away from the electronic lock, thereby ensuring that the authorization is normal.
  • FIG. 3A shows a flowchart of an authorization method applied to an electronic lock provided by another exemplary embodiment of the present invention.
  • This embodiment is exemplified by the application of the authorization method applied to the electronic lock to the implementation environment shown in FIG. 1.
  • the authorization method includes the following steps:
  • step 301 the server receives the binding request sent by the first instant messaging client, the first instant messaging client logs in with the first account, and the binding request includes the lock identifier of the electronic lock.
  • the terminal sends a binding request carrying the lock identifier to the server by logging in to the first instant messaging client of the first account, requesting the server to bind the first account and the electronic lock, and assigning the first The account has administrative rights to the electronic lock.
  • the first account sends a binding request to the server through the first instant messaging client, and the binding request sent by the first instant messaging client that logs in to the first account is used to bind the first account with the identifier of the electronic lock.
  • the server establishes a binding relationship between the first account and the lock identifier.
  • the first account After the binding relationship with the lock identifier is established, the first account has the management right for the electronic lock.
  • the first account is the first account that is bound to the electronic lock.
  • step 303 the server receives the binding request sent by the second instant messaging client registered with the second account, and the binding request includes the key information.
  • the terminal sends a binding request carrying the key information to the server by logging in to the second instant messaging client of the second account, and the binding request sent by the second instant messaging client that logs in to the second account is used to request the server to use the second account.
  • the key information is bound to the second account, so that the server subsequently determines the corresponding key information according to the account.
  • the key information sent by the second instant messaging client that is logged in to the second account is the key information corresponding to the second account, and the key information is collected by the second instant messaging client that is logged in with the second account.
  • the key information includes: password information, and/or fingerprint information, and/or pupil spacing information, and/or iris information, and/or facial image information, and/or palm print information, and/or Or, gait information, and/or, heart rate information, and/or pulse information.
  • the key information is password information
  • the key information is a character string input by the user
  • the key information is physiological characteristic information
  • the key information is a terminal (running with a second instant messaging client) End) at least one of fingerprint information, pupil spacing information, iris information, facial image information, palm print information, gait information, heart rate information, or pulse information collected
  • the key information is behavior characteristic information
  • the key information is the collected gait information.
  • the password information is one or more strings input by the user.
  • the behavioral feature can also be used as the key information, which is not limited in this embodiment of the present invention.
  • step 304 the server establishes a binding relationship between the second account and the key information.
  • the server generally converts the received key information into feature data through a specific process, and establishes and stores a binding between the second account and the feature data of the converted key information. relationship.
  • steps 303 to 304 can be performed before the step 301, which is not limited in this embodiment.
  • step 305 the first instant messaging client logged in with the first account determines the second account in the at least one account.
  • the first account may determine the second account in all the accounts in the contact list, or the first account may also search through the account when the second account is not in the contact list of the first account. Determine the second account number.
  • the second account number is at least one.
  • the first account registered in the first instant messaging client is 123456, and the first instant messaging client selects the “My Friend” column of the contact interface 31 of the first account according to the selection signal triggered by the user.
  • the second account is determined by the second account; or, as shown in FIG. 3C, the first account obtains the searched second account 2345678 in the discovery interface 33, and determines the searched personal account "Xiaoxue (2345678)" 34. For the second account.
  • step 306 the first instant messaging client sends an authorization request to the server for requesting permission to use the electronic lock to the second account.
  • the first instant messaging client that logs in to the first account sends an authorization request to the server by sending an instant message.
  • the user corresponding to the first account opens a dialog 35 of the electronic lock bound to the first account in the first instant messaging client, and enters the permission to use the electronic lock in the message input box 36.
  • the background of the first instant messaging client automatically generates an authorization request containing the second account and sends it to the server.
  • the authorization request includes an identifier of the second account, a lock identifier of the electronic lock corresponding to the first account, and a use right of the second account to the electronic lock.
  • the authorization request further includes a time control policy corresponding to the use permission, where the time control policy is used to indicate that the use right is enabled in at least one time period, and the time control policy corresponds to the use right of the second account.
  • step 307 the server receives an authorization request sent by the first instant messaging client.
  • step 308 the server detects whether the first account has administrative rights to the electronic lock.
  • step 309 is performed; if the server detects that the first account does not have the administrative right to the electronic lock, the server does not respond to the first instant messaging client that has the first account.
  • the server detects whether the binding relationship between the first account and the lock identifier is stored, and when detecting that the binding relationship between the first account and the lock identifier is stored, determining that the first account has the management of the electronic lock Permissions.
  • step 309 the server detects whether the second account and the first account meet the predetermined relationship.
  • the server Since the user usually only uses the electronic lock with other users who have a specific relationship with it, in order to avoid unauthorized authorization and thereby improve the security of the authorization, the server needs to further detect the second account and the first account before granting the second account to use the right account. Whether the predetermined relationship is satisfied.
  • the predetermined relationship includes at least one of the following relationships:
  • the second account belongs to the friend relationship chain of the first account
  • the second account is intimate with the friend of the first account higher than a preset threshold
  • the nickname of the second account belongs to the collection of friends and relatives
  • the second account and the first account belong to the specified group.
  • the server determines that the second account and the second account meet the predetermined relationship.
  • the first account and the second account that meet the predetermined relationship may simultaneously satisfy any two of the foregoing relationships, or any three relationships, or four relationships.
  • the server may consider that the second account belongs to the friend relationship chain of the first account.
  • the friend affinity of the second account and the first account is measured by an interaction between the first account and the second account.
  • the interaction relationship is the number of conversations between the first account and the second account, or the number of likes, or the number of dynamic comments.
  • the preset threshold is a user-set or default value.
  • the relatives and friends nickname collection includes preset relatives and friends' vocabulary, including names of relatives and friends such as "mother, father, daughter, son".
  • the nickname of the second account is a note nickname corresponding to the second account in the first instant messaging client, or a nickname edited by the second account in the second instant messaging client.
  • the designated group is one or more groups pre-designated by the first account in the first instant messaging client, and the account in the specified group may have a friend relationship with the first account, or may be associated with the first account. There is no friend relationship.
  • the second account determined by the first account in the contact list may be regarded as the friend relationship chain of the second account belonging to the first account; or the first account may find the second account by using the account search mode, and After the second account is added to the specified group, the second account and the first account also satisfy the predetermined relationship.
  • step 310 is performed; if the server finds that the second account and the first account do not satisfy the predetermined relationship, the server does not respond to the first instant messaging client that has the first account. Authorization request sent by the end.
  • step 310 the server queries the key information bound to the second account according to the authorization request.
  • the server queries the key information bound to the second account according to the second account in the received authorization request.
  • the server queries the fingerprint information bound to the second account.
  • step 311 the server queries the gateway device corresponding to the electronic lock.
  • the server cannot directly communicate with the electronic lock, in order to send the queried key information to the electronic lock, the server needs to further query the gateway device corresponding to the electronic lock, and send the key information to the electronic lock through the gateway device.
  • the identifier of the electronic lock corresponds to the identifier of the gateway device, and the correspondence between the lock identifier of the electronic lock and the identifier of the gateway device is stored in the server.
  • step 312 the server transmits the key information to the electronic lock through the gateway device.
  • the key information sent by the server is key information bound to the second account.
  • the electronic lock receives the key information of the second account sent by the server through the gateway device.
  • step 314 the electronic lock adds the key information to the trusted keystore.
  • the electronic lock After receiving the key information sent by the gateway device, the electronic lock adds the key information bound to the second account to the trusted key pool of the electronic lock itself, and the electronic lock is subsequently stored according to the secret stored in the trusted key database.
  • the key information identifies the user.
  • the user who has stored the key information in the trusted keystore of the electronic lock can also open the electronic lock.
  • the server can also remotely enter the key information into the electronic lock to ensure the normal operation of the authorization; further, when it is necessary to use a large amount of
  • the administrator can implement volume authorization by using the above methods. It is not necessary to collect and record key information one by one for each authorized user, which improves the authorization efficiency.
  • the authorization method applied to the electronic lock receives the authorization request sent by the first instant messaging client registered with the first account by the server, and binds to the second account according to the authorization request.
  • Key information thereby transmitting the key information to the electronic lock, and adding the key information to the trusted key pool by the electronic lock; solving the problem that when the user is away from the electronic lock, it is difficult to enter a key such as a fingerprint into the electronic lock
  • the information which in turn leads to the problem of not being able to complete the authorization; it is possible to remotely enter the key information into the electronic lock even if the user is away from the electronic lock, thereby ensuring that the authorization is normal.
  • the authorization method applied to the electronic lock provided by the embodiment of the invention also detects whether the first account has the management authority for the electronic lock, and prevents the use right of the electronic lock from being arbitrarily changed, thereby ensuring the security of the electronic lock.
  • the authorization method applied to the electronic lock provided by the embodiment of the present invention further determines whether the second account and the first account meet the predetermined relationship, and grants the use permission to the electronic lock when the second account and the first account satisfy the predetermined relationship. To prevent the administrator from negligently issuing the right to use the electronic lock to the suspicious individual, which improves the security of the electronic lock.
  • the authorization request sent by the first instant messaging client that is logged in with the first account further includes a time control policy corresponding to the usage right, that is, the authorization method applied to the electronic lock. Also included are step 315, step 316, and step 317, as shown in FIG. 4A:
  • step 315 the server sends a time control policy to the electronic lock.
  • the time control policy is used to indicate that the usage rights are enabled in at least one time period, and the time control policy corresponds to the usage rights of the second account.
  • the time control policy is set by the first account on the first instant messaging client, and the time control policies corresponding to the different second accounts may be different or the same.
  • the time control policy may be sent by the first instant messaging client logged in with the first account when sending an authorization request to the server.
  • the server receives the time control policy corresponding to the use right of the electronic lock when receiving the authorization request sent by the first instant messaging client that has the first account, and the server uses the gateway device to set the key information of the second account. Simultaneously sent to the electronic lock with the corresponding time control strategy.
  • the user corresponding to the first account uses a fingerprint door lock on the door of the home
  • the second account corresponds to the hourly work of the user's home.
  • the hourly work needs to be played at the user's home corresponding to the first account at 15:00 every day.
  • Sweeping the health the user corresponding to the first account grants the use of the fingerprint door lock to the second account corresponding to the hourly worker through the first account, and sets the time control policy to: the second account corresponding to the work from 15:00 to 15:10 every day
  • the key information can open the fingerprint door lock.
  • this step can be performed simultaneously with step 312. This embodiment does not limit this.
  • step 316 the electronic lock receives a time control strategy.
  • the electronic lock receives a time control strategy corresponding to the usage rights of the second account.
  • the electronic lock receives the corresponding time control policy when receiving the key information sent by the server.
  • this step can be performed simultaneously with step 313. This embodiment does not limit this.
  • step 317 the electronic lock stores the time control policy in association with the key information.
  • the electronic control device After the electronic lock associates the time control policy with the key information of the corresponding second account, the electronic control device stores the time control policy and the correspondence relationship with the key information of the second account.
  • the authorization method applied to the electronic lock provided by the embodiment of the present invention further sends a time control policy to the electronic lock through the server, and the electronic lock associates the time control policy with the key information, so that different key information can be By opening the electronic locks in different time periods, the administrator can more flexibly and reasonably control the use rights of the electronic locks, and at the same time improve the safety performance of the electronic locks.
  • the first account may query, modify, and delete the use right of the electronic lock by the first instant messaging client, in other words, the user corresponding to the first account may
  • the first instant messaging client queries all the second accounts that are granted the right to use the electronic locks, or queries the specific second account to use the electronic locks, and can also modify the use rights based on the query results. Or delete.
  • the user corresponding to the first account opens a dialog 41 of the electronic lock bound to the first account in the first instant messaging client, and sends a message 42 "query 4567893" to obtain a corresponding second.
  • the query result 43 of the account "4567893" includes the permission grant status, the grant time, and the time control policy corresponding to the use right of the second account "4567893". If the user clicks the modify option 44, the usage right of the second account can be modified; if the user clicks the delete option 45, the usage right of the second account is deleted.
  • the step of using the server as the execution subject may be separately implemented as the authorization method on the server side
  • the step of using the electronic lock as the execution subject may be separately implemented as an authorization method on the electronic lock side to instant communication client.
  • the step of executing the main body can be implemented separately as the terminal side The method of the present invention is not described here.
  • FIG. 5 is a structural block diagram of an authorization device applied to an electronic lock according to an embodiment of the present invention.
  • the authorization device applied to the electronic lock can be implemented as all or part of the above-described server that can provide an authorization method for the electronic lock by software, hardware, or a combination of both.
  • the device includes:
  • the first receiving module 510 is configured to receive an authorization request sent by the first instant messaging client, where the first instant messaging client logs in with a first account, and the authorization request is used to request permission to use the electronic lock to the second account;
  • the querying module 520 is configured to query key information bound to the second account according to the authorization request;
  • the first sending module 530 is configured to send the key information to the electronic lock, and the electronic lock is used to add the key information to the trusted key pool.
  • the authorization device applied to the electronic lock receives the authorization request sent by the first instant messaging client registered with the first account, and queries the second account by the authorization request.
  • Key information thereby transmitting the key information to the electronic lock, and the electronic lock adds the key information to the trusted key pool; solving the problem that when the user is away from the electronic lock, it is difficult to input key information such as a fingerprint into the electronic lock
  • the problem of the inability to complete the authorization is achieved; even if the user is away from the electronic lock, the key information can be remotely entered into the electronic lock, thereby ensuring that the authorization is performed normally.
  • FIG. 6 is a structural block diagram of an authorization device applied to an electronic lock according to another embodiment of the present invention.
  • the authorization device applied to the electronic lock can be implemented as all or part of the above-described server that can provide an authorization method for the electronic lock by software, hardware, or a combination of both.
  • the device includes:
  • the first receiving module 510 is configured to receive an authorization request sent by the first instant messaging client, where the first instant messaging client logs in with a first account, and the authorization request is used to request permission to use the electronic lock to the second account;
  • the querying module 520 is configured to query key information bound to the second account according to the authorization request;
  • the first sending module 530 is configured to send the key information to the electronic lock, and the electronic lock is used to add the key information to the trusted key pool.
  • the device further includes:
  • the first detecting module 540 is configured to detect whether the first account has the management right of the electronic lock
  • the second execution module 550 is configured to perform the step of querying the key information bound to the second account according to the authorization request when the first account has the management right of the electronic lock.
  • the device further includes:
  • the second detecting module 560 is configured to determine whether the second account and the first account meet the predetermined relationship
  • the second executing module 570 is configured to: when the second account and the first account meet the predetermined relationship, perform the step of querying the key information bound to the second account according to the authorization request;
  • the predetermined relationship includes at least one of the following relationships:
  • the second account belongs to the friend relationship chain of the first account
  • the second account is intimate with the friend of the first account higher than a preset threshold
  • the nickname of the second account belongs to the collection of friends and relatives
  • the second account and the first account belong to the specified group.
  • the first sending module 530 includes:
  • the query unit 531 is configured to query a gateway device corresponding to the electronic lock
  • the sending unit 532 is configured to send the key information to the electronic lock by using the gateway device.
  • the authorization request further includes a time control policy corresponding to the usage right, and the time control policy is used to indicate that the usage permission is enabled in at least one time period;
  • the device also includes:
  • the second sending module 580 is configured to send a time control policy to the electronic lock, where the electronic lock is used to store the time control policy and the key information.
  • the device further includes:
  • the second receiving module 590 is configured to receive a binding request sent by the second instant messaging client, where the second instant messaging client logs in with the second account, and the binding request includes the key information.
  • the first binding module 591 is configured to establish a binding relationship between the second account and the key information.
  • the key information includes: password information, and/or fingerprint information, and/or pupil spacing information, and/or iris information, and/or facial image information, and/or palm print information, and/or Or, gait information, and/or, heart rate information, and/or pulse information.
  • the device further includes:
  • the third receiving module 592 is configured to receive a binding request sent by the first instant messaging client, where the binding request includes a lock identifier of the electronic lock;
  • the second binding module 593 is configured to establish a binding relationship between the first account and the lock identifier.
  • the authorization device applied to the electronic lock receives the authorization request sent by the first instant messaging client registered with the first account, and queries the second account by the authorization request.
  • Key information thereby transmitting the key information to the electronic lock, and the electronic lock adds the key information to the trusted key pool; solving the problem that when the user is away from the electronic lock, it is difficult to input key information such as a fingerprint into the electronic lock
  • the problem of the inability to complete the authorization is achieved; even if the user is away from the electronic lock, the key information can be remotely entered into the electronic lock, thereby ensuring that the authorization is performed normally.
  • the authorization device applied to the electronic lock provided by the embodiment of the invention also detects whether the first account has the management authority for the electronic lock, and prevents the use right of the electronic lock from being arbitrarily changed, thereby ensuring the security of the electronic lock.
  • the authorization device applied to the electronic lock provided by the embodiment of the present invention further determines whether the second account and the first account meet the predetermined relationship, and grants the use permission to the electronic lock when the second account and the first account satisfy the predetermined relationship. To prevent the administrator from negligently issuing the right to use the electronic lock to the suspicious individual, which improves the security of the electronic lock.
  • FIG. 7 is a structural block diagram of an authorization device applied to an electronic lock according to another embodiment of the present invention.
  • the authorization device applied to the electronic lock can be implemented in whole or in part by the above-described electronic lock that can provide an authorization method for the electronic lock by software, hardware or a combination of both.
  • the device includes:
  • the first receiving module 710 is configured to receive key information of the second account that is sent by the server; the key information is obtained by the server according to the authorization request sent by the first instant messaging client, and the first instant messaging client has the first login. An account number, an authorization request is used to request permission to use the electronic lock to the second account;
  • An adding module 720 is configured to add key information to the trusted keystore.
  • the authorization device applied to the electronic lock adds the key information to the trusted key pool by receiving the key information of the second account sent by the server;
  • key information such as a fingerprint into the electronic lock, thereby causing the problem that the authorization cannot be completed; even if the user is away from the electronic lock, the key information can be remotely entered into the electronic lock, thereby ensuring that the authorization is normally performed.
  • FIG. 8 is a structural block diagram of an authorization device applied to an electronic lock according to another embodiment of the present invention.
  • the authorization device applied to the electronic lock can be implemented by software, hardware or two The combination of the implementations becomes all or part of the above-described electronic lock that provides an authorization method for electronic locks.
  • the device includes:
  • the first receiving module 710 is configured to receive key information of the second account that is sent by the server; the key information is obtained by the server according to the authorization request sent by the first instant messaging client, and the first instant messaging client has the first login. An account number, an authorization request is used to request permission to use the electronic lock to the second account;
  • An adding module 720 is configured to add key information to the trusted keystore.
  • the first receiving module 710 is specifically configured to receive key information sent by the server through the gateway device; and the corresponding relationship exists between the gateway device and the electronic lock;
  • the key information includes: password information, and/or fingerprint information, and/or pupil spacing information, and/or iris information, and/or facial image information, and/or palm print information, and/or Or, gait information, and/or, heart rate information, and/or pulse information.
  • the authorization request further includes a time control policy corresponding to the usage right
  • the device further includes:
  • the second receiving module 730 is configured to receive a time control policy, where the time control policy is used to indicate that the usage permission is enabled in at least one time period;
  • the storage module 740 is configured to store the time control policy in association with the key information.
  • the authorization device applied to the electronic lock adds the key information to the trusted key pool by receiving the key information of the second account sent by the server;
  • key information such as a fingerprint into the electronic lock, thereby causing the problem that the authorization cannot be completed; even if the user is away from the electronic lock, the key information can be remotely entered into the electronic lock, thereby ensuring that the authorization is normally performed.
  • the authorization device applied to the electronic lock provided by the embodiment of the invention also detects whether the first account has the management authority for the electronic lock, and prevents the use right of the electronic lock from being arbitrarily changed, thereby ensuring the security of the electronic lock.
  • the authorization device applied to the electronic lock provided by the embodiment of the present invention further determines whether the second account and the first account meet the predetermined relationship, and grants the use permission to the electronic lock when the second account and the first account satisfy the predetermined relationship. To prevent the administrator from negligently issuing the right to use the electronic lock to the suspicious individual, which improves the security of the electronic lock.
  • FIG. 9 is a structural block diagram of an authorization device applied to an electronic lock according to another embodiment of the present invention.
  • the authorization device applied to the electronic lock can be implemented by software, hardware or two The combination of the implementations becomes all or part of the above-described terminal that can provide an authorization method for an electronic lock.
  • the device includes:
  • a determining module 910 configured to determine a second account in the at least one account
  • the first request sending module 920 is configured to send an authorization request to the server, where the authorization request is used to request permission to use the electronic lock to the second account; the server is configured to query the key information bound to the second account according to the authorization request, and The key information is sent to the electronic lock, and the electronic lock adds the key information to the trusted keystore.
  • the authorization device applied to the electronic lock sends an authorization request to the server by determining the second account in at least one account, and the authorization request is used to request the electronic lock to be granted to the second account.
  • the permission is used;
  • the server is configured to query the key information bound to the second account according to the authorization request, send the key information to the electronic lock, and the key information is added to the trusted key pool by the electronic lock;
  • key information such as a fingerprint into the electronic lock, thereby causing the problem that the authorization cannot be completed; even if the user is away from the electronic lock, the key information can be remotely entered into the electronic lock, thereby ensuring that the authorization is normally performed.
  • the device further includes:
  • the second request sending module 930 is configured to send a binding request to the server, where the binding request includes a lock identifier of the electronic lock, and the server is configured to establish a binding relationship between the first account and the lock identifier.
  • the authorization device applied to the electronic lock provided by the above embodiment provides an authorization service for the electronic lock
  • only the division of the above functional modules is illustrated.
  • the above functions may be allocated according to requirements. It is completed by different functional modules, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • the authorization device applied to the electronic lock provided by the above embodiment is the same as the embodiment of the authorization method applied to the electronic lock. The specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • FIG. 10 is a structural block diagram of a server according to an embodiment of the present invention.
  • the server 1000 is implemented as the server 130 in FIG. Specifically:
  • the server 1000 includes a central processing unit (CPU) 1001, a system memory 1004 including a random access memory (RAM) 1002 and a read only memory (ROM) 1003, and a system bus 1005 that connects the system memory 1004 and the central processing unit 1001.
  • the server 1000 also includes a basic input/output system (I/O system) 1006 that facilitates the transfer of information between various devices within the computer, and for storage.
  • the basic input/output system 1006 includes a display 1008 for displaying information and an input device 1009 such as a mouse, a keyboard for inputting information by a user.
  • the display 1008 and the input device 1009 are both connected to the central processing unit 1001 via an input/output controller 1010 connected to the system bus 1005.
  • the basic input/output system 1006 can also include an input output controller 1010 for receiving and processing input from a plurality of other devices, such as a keyboard, mouse, or electronic stylus.
  • input-output controller 1010 also provides output to a display screen, printer, or other type of output device.
  • the mass storage device 1007 is connected to the central processing unit 1001 by a mass storage controller (not shown) connected to the system bus 1005.
  • the mass storage device 1007 and its associated computer readable medium provide non-volatile storage for the server 1000. That is, the mass storage device 1007 may include a computer readable medium (not shown) such as a hard disk or a CD-ROM drive.
  • the computer readable medium can include computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media include RAM, ROM, EPROM, EEPROM, flash memory or other solid state storage technologies, CD-ROM, DVD or other optical storage, tape cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices.
  • RAM random access memory
  • ROM read only memory
  • EPROM Erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • the server 1000 may also be operated by a remote computer connected to the network through a network such as the Internet. That is, the server 1000 can be connected to the network 1012 through the network interface unit 1011 connected to the system bus 1005, or can also be connected to other types of networks or remote computer systems (not shown) using the network interface unit 1011. .
  • the memory further includes one or more programs, the one or more programs being stored in a memory, the one or more programs including instructions for performing a server-side authorization method provided by an embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of an electronic lock provided by an embodiment of the present invention.
  • the electronic lock can be used to implement the authorization method provided in the foregoing embodiment. Specifically:
  • the electronic lock 1100 can include a lock body 1110, a memory 1120 having one or more computer readable storage media, an input unit 1130, a display unit 1140, a transfer unit 1170, a processor 1180 including one or more processing cores, and a power supply 1190 and other components.
  • a lock body 1110 can include a lock body 1110, a memory 1120 having one or more computer readable storage media, an input unit 1130, a display unit 1140, a transfer unit 1170, a processor 1180 including one or more processing cores, and a power supply 1190 and other components.
  • a lock body 1110 can include more or fewer components than those illustrated, or some components may be combined, or different component arrangements. among them:
  • the lock body 1110 is a one-way lock body, a three-way lock body or a four-way lock body, etc., and the lock body 1110 is in an open or locked state under the control of the processor 1118.
  • the memory 1120 can be used to store software programs and modules, and the processor 1180 executes various functional applications and data processing by running software programs and modules stored in the memory 1120.
  • the memory 1120 may mainly include a storage program area and a storage data area, wherein the storage program area may store a program required for at least one function; the storage data area may store the entered key information and corresponding usage authority information.
  • memory 1120 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 1120 can also include a memory controller to provide access to the memory 1120 by the processor 1180 and the input unit 1130.
  • the input unit 1130 is configured to receive key information input by the user.
  • Input unit 1130 can include touch-sensitive surface 1131 and other input devices 1132.
  • Touch-sensitive surface 1131 also known as a touch display or touchpad, can collect touch operations on or near the user (such as a user using a finger, stylus, etc., on any touch-sensitive surface 1131 or on The operation near the touch-sensitive surface 731) and driving the corresponding connecting device according to a preset program.
  • the touch-sensitive surface 1131 may include two parts of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1180 is provided and can receive commands from the processor 1180 and execute them.
  • the touch sensitive surface 1131 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1130 can also include other input devices 1132. Specifically, other input devices 1132 may include, but are not limited to, one or more of a fingerprint collector, a palm print collector, an iris collector, and a heart rate collector.
  • Display unit 1140 can be used to display information entered by the user or information provided to the user and various graphical user interfaces of electronic lock 1100, which can be constructed from graphics, text, icons, video, and any combination thereof.
  • the display unit 1140 can include a display panel 1141, optionally, The display panel 1141 can be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
  • the touch-sensitive surface 1131 may cover the display panel 1141, and when the touch-sensitive surface 1131 detects a touch operation thereon or nearby, it is transmitted to the processor 1180 to determine the type of the touch event, and then the processor 1180 according to the touch event The type provides a corresponding visual output on the display panel 1141.
  • the touch-sensitive surface 1131 and the display panel 1141 are implemented as two separate components to implement input and input functions, in some embodiments, the touch-sensitive surface 1131 can be integrated with the display panel 1141 to implement input. And output function.
  • the electronic lock 1100 performs data transmission with the gateway device through the communication module 1170.
  • the communication module 1170 has a low power near field communication module, such as a Bluetooth module or a Zigbee module.
  • the processor 1180 is a control center for the electronic lock 1100 that connects various portions of the entire handset with various interfaces and lines, by running or executing software programs and/or modules stored in the memory 1120, and recalling data stored in the memory 1120.
  • the various functions and processing data of the electronic lock 1100 are executed to perform overall monitoring.
  • the processor 1180 may include one or more processing cores; preferably, the processor 1180 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1180.
  • the electronic lock 1100 also includes a power source 1190 (such as a battery) for powering various components.
  • the power source can be logically coupled to the processor 1180 through a power management system to manage functions such as charging, discharging, and power management through a power management system.
  • the power supply 1190 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • the electronic lock 1100 may also include components such as a camera, and details are not described herein.
  • the input unit of the electronic lock 1100 is a fingerprint collector
  • the display unit is a touch screen display
  • the electronic lock 1100 further includes a memory, and one or more programs, wherein one or more programs are stored in the memory. And configured to be executed by one or more processors.
  • the one or more programs include instructions for performing the various operations in the authorization methods described above.
  • non-transitory computer readable storage medium comprising instructions, such as a memory comprising instructions executable by a processor in a server or electronic lock
  • the authorization method shown in the above embodiment of FIG. 2A, the embodiment of FIG. 3A or the embodiment of FIG. 4A is completed.
  • the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • FIG. 12 is a structural block diagram of an authorization system applied to an electronic lock according to an embodiment of the present invention.
  • the authorization system for electronic locks includes:
  • Server 1210 electronic lock 1220, and terminal 1230.
  • the server 1210 includes the apparatus as shown in any of FIG. 4 or FIG. 5;
  • the electronic lock 1220 includes the device as shown in any of FIG. 6 or FIG. 7;
  • Terminal 1230 includes the apparatus as shown in FIG. 8;
  • the server 1210 includes a server as shown in FIG. 10;
  • the electronic lock 1220 includes an electronic lock as shown in FIG.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

一种应用于电子锁具的授权方法、装置及***,属于物联网领域。该方法包括:接收第一即时通讯客户端发送的授权请求,第一即时通讯客户端登录有第一帐号,授权请求用于请求向第二帐号授予所述电子锁具的使用权限(步骤201);根据授权请求查询与第二帐号绑定的密钥信息(步骤202);将密钥信息发送给电子锁具(步骤203),电子锁具用于将密钥信息添加至可信密钥库(步骤205);解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。

Description

应用于电子锁具的授权方法、装置及***
本申请要求于2016年2月17日提交中国专利局、申请号为201610089412.6、发明名称为“应用于电子锁具的授权方法、装置及***”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明实施例涉及物联网领域,特别涉及一种应用于电子锁具的授权方法、装置及***。
背景技术
电子锁具是一种依靠密钥信息识别用户身份,进而根据用户身份开启锁体或锁止锁体的新型锁具,常见的电子锁具包括密码门锁、指纹门锁、掌纹门锁等等。
以指纹门锁为例,用户使用指纹门锁前,需要预先在指纹门锁中录入自身的指纹信息,并由管理员为该指纹信息对应的用户进行授权。相关技术提供的一种授权方法包括:管理员使用手机APP(Application,应用程序)与指纹门锁建立蓝牙连接,并使用手机APP控制指纹门锁进入“管理模式”;在“管理模式”下,指纹门锁通过指纹采集器获取用户录入指纹,并接收管理员使用手机APP为该指纹信息分配的权限,进而对该指纹信息和权限进行关联存储。比如,管理员为该指纹信息分配的权限为:每天8:00-10:00拥有开启指纹门锁的权限,即该指纹信息对应的用户仅能够在每天8:00-10:00开启该指纹门锁。
上述方法中,由于用户需要在指纹门锁的指纹采集器上录入指纹,当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权。
发明内容
为了解决当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题,本发明实施例提供了一种应用于电子锁具的授权方法、装置及***。所述技术方案如下:
根据本发明的第一方面,提供了一种应用于电子锁具的授权方法,所述方法包括:
接收第一即时通讯客户端发送的授权请求,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向第二帐号授予所述电子锁具的使用权限;
根据所述授权请求查询与所述第二帐号绑定的密钥信息;
将所述密钥信息发送给所述电子锁具,所述电子锁具用于将所述密钥信息添加至可信密钥库。
根据本发明的第二方面,提供了一种应用于电子锁具的授权方法,所述方法包括:
接收服务器发送的第二帐号的密钥信息;所述密钥信息是服务器根据第一即时通讯客户端发送的授权请求查询得到的,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向所述第二帐号授予所述电子锁具的使用权限;
将所述密钥信息添加至可信密钥库。
根据本发明的第三方面,提供了一种应用于电子锁具的授权装置,所述装置包括:
第一接收模块,用于接收登第一即时通讯客户端发送的授权请求,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向第二帐号授予所述电子锁具的使用权限;
查询模块,用于根据所述授权请求查询与所述第二帐号绑定的密钥信息;
第一发送模块,用于将所述密钥信息发送给所述电子锁具,所述电子锁具用于将所述密钥信息添加至可信密钥库。
根据本发明的第四方面,提供了一种应用于电子锁具的授权装置,所述装置包括:
第一接收模块,用于接收服务器发送的第二帐号的密钥信息;所述密钥信息是服务器根据第一即时通讯客户端发送的授权请求查询得到的,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向所述第二帐号授予所述电子锁具的使用权限;
添加模块,用于将所述密钥信息添加至可信密钥库。
根据本发明的第五方面,提供了一种服务器,所述服务器包括:
一个或多个处理器;和
存储器;
所述存储器存储有一个或多个程序,所述一个或多个程序被配置成由所述一个或多个处理器执行,所述一个或多个程序包含用于进行以下操作的指令:
接收第一即时通讯客户端发送的授权请求,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向第二帐号授予所述电子锁具的使用权限;
根据所述授权请求查询与所述第二帐号绑定的密钥信息;
将所述密钥信息发送给所述电子锁具,所述电子锁具用于将所述密钥信息添加至可信密钥库。
根据本发明的第六方面,提供了一种电子锁具,所述电子锁具包括:
一个或多个处理器;和
存储器;
所述存储器存储有一个或多个程序,所述一个或多个程序被配置成由所述一个或多个处理器执行,所述一个或多个程序包含用于进行以下操作的指令:
接收服务器发送的第二帐号的密钥信息;所述密钥信息是服务器根据第一即时通讯客户端发送的授权请求查询得到的,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向所述第二帐号授予所述电子锁具的使用权限;
将所述密钥信息添加至可信密钥库。
根据本发明的第七方面,提供了一种应用于电子锁具的授权***,所述***包括:服务器、电子锁具、终端;
所述服务器包括如上述第三方面所述的装置;
所述电子锁具包括如上述第四方面所述的装置;
或,
所述服务器包括如上述第五方面所述的服务器;
所述电子锁具包括如上述第六方面所述的电子锁具。
根据本发明的第八方面,提供了一种计算机指令的非临时性计算机可读存储介质,所述指令可由服务器或电子锁具中的处理器执行以完成上述第一方面和第二方面所示出的授权方法。
本发明实施例提供的技术方案带来的有益效果是:
通过服务器接收登录有第一帐号的第一即时通讯客户端发送的授权请求,并根据授权请求查询与第二帐号绑定的密钥信息,从而将密钥信息发送给电子锁具,由电子锁具将该密钥信息添加至可信密钥库;解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是根据部分示例性实施例示出的一种应用于电子锁具的授权方法的实施环境的示意图;
图2是根据一示例性实施例示出的一种应用于电子锁具的授权方法的流程图;
图3A是根据另一示例性实施例示出的一种应用于电子锁具的授权方法的流程图;
图3B是根据另一示例性实施例示出的一种应用于电子锁具的授权方法的实施示意图;
图3C是根据另一示例性实施例示出的一种应用于电子锁具的授权方法的实施示意图;
图3D是根据另一示例性实施例示出的一种即时通讯消息发送界面示意图;
图4A是根据另一示例性实施例示出的一种应用于电子锁具的授权方法的流程图;
图4B是根据另一示例性实施例示出的一种即时通讯消息发送界面示意图;
图5是根据一示例性实施例示出的一种应用于电子锁具的授权装置的框图;
图6是根据另一示例性实施例示出的一种应用于电子锁具的授权装置的框 图;
图7是根据另一示例性实施例示出的一种应用于电子锁具的授权装置的框图;
图8是根据另一示例性实施例示出的一种应用于电子锁具的授权装置的框图;
图9是根据另一示例性实施例示出的一种应用于电子锁具的授权装置的框图;
图10示出了本发明一个实施例提供的服务器的结构方框图;
图11示出了本发明一个实施例提供的电子锁具的结构方框图;
图12是根据一示例性实施例示出的一种应用于电子锁具的授权方法***的框图。
具体实施方式
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。
在本文中提及的“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
请参考图1,其示出了本发明实施例提供的一种实施环境的结构示意图。该实施环境包括:电子锁具110,网关设备120,服务器130,第一终端140和第二终端150,其中:
电子锁具110是一种依靠密钥信息识别用户身份,进而根据用户身份开启锁体或锁止锁体的锁具,电子锁具110具有数据存储和数据传输的能力。可选的,该电子锁具110为密码门锁(以数字密码为密钥信息)、指纹门锁(以指纹为密钥信息)或掌纹门锁(以掌纹为密钥信息)。可选的,电子锁具110还具有计时的能力。
电子锁具110与网关设备120之间建立有线或无线连接,其中,无线连接包括近距离低功耗无线连接,比如,该无线连接为蓝牙或Zigbee(紫蜂协议)。
网关设备120具有数据转换及传输功能,通过该数据转换及传输功能,网 关设备120为服务器130和电子锁具110提供数据传输服务。
网关设备120与服务器130之间通过有线网络或无线网络相连。
服务器130是第三方应用程序的后台服务器,服务器130可以是一台服务器或多台服务器组成的服务器集群或云计算中心。本发明实施例中,服务器130中存储有电子锁具110与管理员帐号之间的绑定关系,以及电子锁具110与网关设备120之间的对应关系,其中,管理员帐号具有对电子锁具110的管理权限。
可选的,该第三方应用程序包括:即时通讯类应用程序,或者,提供与电子锁具对应服务的应用程序。
服务器130与第一终端140之间通过有线网络或无线网络相连,且服务器130与第二终端150之间通过有线网络或无线网络相连。
第一终端140和第二终端150是具有数据存储和数据传输功能的电子设备,比如,该电子设备为智能手机或平板电脑。本发明实施例中,第一终端140和第二终端150中均运行有即时通讯客户端,其中,第一终端140运行的即时通讯客户端登录有第一帐号,第二终端150运行的即时通讯客户端登录有第二帐号。可选的,该实施环境中,第一终端140和第二终端150的数量为一个或者一个以上。
可选地,上述的无线网络或有线网络使用标准通信技术和/或协议。网络通常为因特网、但也可以是任何网络,包括但不限于局域网(Local Area Network,LAN)、城域网(Metropolitan Area Network,MAN)、广域网(Wide Area Network,WAN)、移动、有线或者无线网络、专用网络或者虚拟专用网络的任何组合)。在一些实施例中,使用包括超文本标记语言(Hyper Text Mark-up Language,HTML)、可扩展标记语言(Extensible Markup Language,XML)等的技术和/或格式来代表通过网络交换的数据。此外还可以使用诸如安全套接字层(Secure Socket Layer,SSL)、传输层安全(Transport Layer Security,TLS)、虚拟专用网络(Virtual Private Network,VPN)、网际协议安全(Internet Protocol Security,IPsec)等常规加密技术来加密所有或者一些链路。在另一些实施例中,还可以使用定制和/或专用数据通信技术取代或者补充上述数据通信技术。
请参考图2,其示出了本发明一个示例性实施例提供的应用于电子锁具的授权方法的流程图。本实施例以该应用于电子锁具的授权方法应用于图1所示 的实施环境中来举例说明。该授权方法包括以下步骤:
在步骤201中,服务器接收第一即时通讯客户端发送的授权请求,第一即时通讯客户端登录有第一帐号,授权请求用于请求向第二帐号授予电子锁具的使用权限。
可选的,第一帐号与电子锁具绑定,且具有电子锁具的管理权限,即第一帐号为管理员帐号。
可选的,第二帐号与第一帐号不是同一个帐号,第二帐号的数量为一个或者一个以上,第二帐号与第一帐号具有好友关系,或者第二帐号与第一帐号不具有好友关系。
在步骤202中,服务器根据授权请求查询与第二帐号绑定的密钥信息。
可选的,与第二帐号绑定的密钥信息是第二帐号预先采集并存储到服务器中的。
可选的,该密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
在步骤203中,服务器将密钥信息发送给电子锁具。
可选的,服务器查询电子锁具对应的网关设备,并通过网关设备将查找到的密钥信息发送给电子锁具。
在步骤204中,电子锁具接收服务器发送的第二帐号的密钥信息。
可选的,电子锁具通过网关设备接收服务器发送的第二帐号的密钥信息。
在步骤205中,电子锁具将密钥信息添加至可信密钥库。
需要说明的是,上述步骤201至步骤203可单独实现成为服务器侧的应用于电子锁具的授权方法;上述步骤204至步骤205可单独实现成为电子锁具侧的应用于电子锁具的授权方法。
综上所述,本发明实施例提供的应用于电子锁具的授权方法,通过服务器接收登录有第一帐号的第一即时通讯客户端发送的授权请求,并根据授权请求查询与第二帐号绑定的密钥信息,从而将密钥信息发送给电子锁具,由电子锁具将该密钥信息添加至可信密钥库;解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。
请参考图3A,其示出了本发明另一个示例性实施例提供的应用于电子锁具的授权方法的流程图。本实施例以该应用于电子锁具的授权方法应用于图1所示的实施环境中来举例说明。该授权方法包括以下步骤:
在步骤301中,服务器接收第一即时通讯客户端发送的绑定请求,第一即时通讯客户端登录有第一帐号,绑定请求包括电子锁具的锁具标识。
为了获取对电子锁具的管理权限,终端通过登录第一帐号的第一即时通讯客户端向服务器发送携带锁具标识的绑定请求,请求服务器对第一帐号和电子锁具进行绑定,并赋予第一帐号对该电子锁具的管理权限。
第一账号通过第一即时通讯客户端向服务器发送绑定请求,登录有第一账号的第一即时通讯客户端发送的绑定请求用于将第一账号与电子锁具的标识绑定。在步骤302中,服务器建立第一帐号与锁具标识之间的绑定关系。
建立与锁具标识的绑定关系后,第一帐号即具备对该电子锁具的管理权限。可选的,该第一帐号为第一个与该电子锁具进行绑定的帐号。可选的,第一帐号只有一个。
在步骤303中,服务器接收登录有第二帐号的第二即时通讯客户端发送的绑定请求,绑定请求包括密钥信息。
终端通过登录第二帐号的第二即时通讯客户端向服务器发送携带密钥信息的绑定请求,登录有第二账号的第二即时通讯客户端发送的绑定请求用于请求服务器将第二账号的密钥信息与第二账号绑定,以便服务器后续根据帐号确定对应的密钥信息。
可选的,登录有第二帐号的第二即时通讯客户端发送的密钥信息是与第二账号对应的密钥信息,该密钥信息是登录有第二帐号的第二即时通讯客户端采集的。其中,密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
可选的,当该密钥信息为密码信息时,该密钥信息为用户输入的字符串;当该密钥信息为生理特征信息时,该密钥信息为终端(运行有第二即时通讯客户端)采集到的指纹信息、瞳孔间距信息、虹膜信息、面像信息、掌纹信息、步态信息、心跳速率信息或脉搏信息中的至少一种;当该密钥信息为行为特征信息时,该密钥信息为采集到的步态信息。
可选的,密码信息是用户输入的一个或多个字符串。
需要说明的是,除了上述列出的指纹信息、瞳孔间距信息、虹膜信息、面像信息、掌纹信息、步态信息、心跳速率信息、脉搏信息,其他能够用于个人身份鉴定的生理特征或行为特征也可以作为密钥信息,本发明实施例对此不做限定。
在步骤304中,服务器建立第二帐号与密钥信息之间的绑定关系。
可选的,从安全性上考虑,服务器一般通过特定的处理将接收到的密钥信息转化为特征数据后,建立并存储第二帐号与转化后的密钥信息的特征数据之间的绑定关系。
需要说明的是,步骤303至步骤304还可以在步骤301之前执行,本实施例对此不做限定。
在步骤305中,登录有第一帐号的第一即时通讯客户端在至少一个帐号中确定出第二帐号。
可选的,第一帐号可以在联系人列表中的所有帐号中确定出第二帐号,或者,在第二帐号不在第一帐号的联系人列表中时,第一帐号还可以通过帐号搜索的方式确定出第二帐号。
可选的,第二帐号至少为一个。
如图3B所示,第一即时通讯客户端中登录的第一帐号为123456,第一即时通讯客户端根据用户触发的选择信号,从第一帐号对应联系人界面31的“我的好友”栏32中确定出2个第二帐号;或者,如图3C所示,该第一账号在发现界面33中获取搜索的第二帐号2345678,并将搜索出的个人帐号“小雪(2345678)”34确定为第二帐号。
在步骤306中,第一即时通讯客户端向服务器发送授权请求,授权请求用于请求向第二帐号授予电子锁具的使用权限。
可选的,登录有第一帐号的第一即时通讯客户端通过发送即时消息的方式向服务器发送授权请求。如图3D所示,第一帐号对应的用户在第一即时通讯客户端中打开与第一账号绑定的电子锁具的对话框35,在消息输入框36中输入待授予电子锁具使用权限的第二帐号,并点击发送选项37后,第一即时通讯客户端的后台自动生成包含第二帐号的授权请求并发送至服务器。
可选的,该授权请求中包括第二帐号的标识、与第一帐号对应的电子锁具的锁具标识、第二帐号对电子锁具的使用权限。
可选的,授权请求中还包括使用权限对应的时间控制策略,该时间控制策略用于指示在至少一个时间段使能该使用权限,且时间控制策略与第二账号的使用权限对应。
在步骤307中,服务器接收第一即时通讯客户端发送的授权请求。
在步骤308中,服务器检测第一帐号是否具有电子锁具的管理权限。
若服务器检测到第一帐号具有电子锁具的管理权限,则执行步骤309;若服务器检测到第一帐号不具有对电子锁具的管理权限,则不响应登录有第一帐号的第一即时通讯客户端发送的授权请求。
可选的,服务器检测是否存储有第一帐号与该锁具标识的绑定关系,并在检测到存储有第一帐号与锁具标识的绑定关系时,确定第一帐号具有对该电子锁的管理权限。
在步骤309中,服务器检测第二帐号与第一帐号是否满足预定关系。
由于用户通常仅授予与其具有特定关系的其他用户使用电子锁具,因此,为了避免非法授权,从而提高授权的安全性,服务器在授予第二帐号使用权限前,需要进一步检测第二帐号与第一帐号是否满足预定关系。
其中,预定关系包括如下关系中的至少一个:
第二帐号属于第一帐号的好友关系链;
第二帐号与第一帐号的好友亲密度高于预设阈值;
第二帐号的昵称属于亲友昵称集合;
第二帐号和第一帐号属于指定群组。
当第二帐号与第一帐号满足上述关系中的至少一种时,服务器即确定第二帐号与第二帐号满足预定关系。可选的,满足预定关系的第一帐号与第二帐号可以同时满足上述关系中的任意两种关系,或者任意三种关系,或者四种关系。
可选的,当检测到第二帐号与第一帐号是互为好友关系时,服务器可以认为第二帐号属于第一帐号的好友关系链。
可选的,第二帐号与第一帐号的好友亲密度通过第一帐号与第二帐号之间的互动关系来衡量。比如互动关系是第一帐号与第二帐号之间的对话次数,或点赞次数,或动态评论次数。
可选的,预设阀值是用户自主设置的或默认值。
可选的,亲友昵称集合中包含预设的亲友称谓词汇,包括诸如“妈妈、爸爸、女儿、儿子”一类的亲友称呼。
可选的,第二帐号的昵称是第一即时通讯客户端中第二帐号对应的备注昵称,或者是第二帐号在第二即时通讯客户端中编辑的昵称。可选的,指定群组是第一账号在第一即时通讯客户端中预先指定的一个或多个群组,指定群组中的帐号可以与第一帐号存在好友关系,也可以与第一帐号不存在好友关系。
比如:第一帐号在联系人列表中确定出的第二帐号可看做是第二帐号属于第一帐号的好友关系链;或者,第一帐号通过帐号搜索的方式查找到第二帐号,并将第二帐号添加至指定群组后,第二帐号与第一帐号也满足预定关系。
若服务器查询到第二帐号与第一帐号满足预定关系,则执行步骤310;若服务器查询到第二帐号与第一帐号不满足预定关系,则不响应登录有第一帐号的第一即时通讯客户端发送的授权请求。
在步骤310中,服务器根据授权请求查询与第二帐号绑定的密钥信息。
服务器根据接收到的授权请求中的第二帐号查询与第二帐号绑定的密钥信息。
在一种可能的实施方式中,服务器查询到与第二帐号绑定的指纹信息。
在步骤311中,服务器查询电子锁具对应的网关设备。
由于服务器无法直接与电子锁具进行通信,因此,为了将查询到的密钥信息发送至电子锁具,服务器需要进一步查询电子锁具对应的网关设备,并通过该网关设备向电子锁具发送密钥信息。
可选的,电子锁具的标识与网关设备的标识一一对应,服务器中存储有电子锁具的锁具标识与网关设备的标识之间的对应关系。
在步骤312中,服务器通过网关设备将密钥信息发送给电子锁具。
服务器发送的密钥信息是与第二账号绑定的密钥信息。在步骤313中,电子锁具接收服务器通过网关设备发送的第二帐号的密钥信息。
在步骤314中,电子锁具将密钥信息添加至可信密钥库。
接收到网关设备发送的密钥信息后,电子锁具将第二账号绑定的密钥信息添加至电子锁具自身的可信密钥库中,电子锁具后续即根据可信密钥库中存储的密钥信息对用户进行身份识别。
可选的,当电子锁具与网关设备断开连接时,已经在电子锁具的可信密钥库中存储了密钥信息的用户也能够打开电子锁具。
通过上述授权方法,当待授权用户远离电子锁具时,服务器也可以远程向电子锁具中录入密钥信息,确保授权的正常进行;进一步的,当需要对大量用 户进行授权时,管理员可以通过上述方法实现批量授权,无需对每个待授权用户进行逐一密钥信息采集和录入,提高了授权效率。
综上所述,本发明实施例提供的应用于电子锁具的授权方法,通过服务器接收登录有第一帐号的第一即时通讯客户端发送的授权请求,并根据授权请求查询与第二帐号绑定的密钥信息,从而将密钥信息发送给电子锁具,由电子锁具将该密钥信息添加至可信密钥库;解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。
此外,本发明实施例提供的应用于电子锁具的授权方法,还通过检测第一账对电子锁具是否具有管理权限,避免电子锁具的使用权限被随意更改,保证了电子锁具的安全性。
此外,本发明实施例提供的应用于电子锁具的授权方法,还通过查询第二帐号和第一帐号是否满足预定关系,在第二帐号与第一帐号满足预定关系时,向电子锁具授予使用权限,避免管理员因为疏忽将电子锁具的使用权限下发给可疑人员,提高了电子锁具的安全性。
在基于图3A所示实施例的可选实施例中,登录有第一账号的第一即时通讯客户端发送的授权请求还包括使用权限对应的时间控制策略,即该应用于电子锁具的授权方法还包括步骤315、步骤316和步骤317,如图4A所示:
在步骤315中,服务器将时间控制策略发送给电子锁具。
其中,该时间控制策略用于指示在至少一个时间段使能使用权限,且时间控制策略与第二帐号的使用权限对应。
可选的,时间控制策略由第一账号在第一即时通讯客户端设置,不同的第二帐号对应的时间控制策略可以不同或者相同。时间控制策略可以由登录有第一账号的第一即时通讯客户端在向服务器发送授权请求时发送。
可选的,服务器在接收登录有第一账号的第一即时通讯客户端发送的授权请求时接收到与电子锁具的使用权限对应的时间控制策略,服务器通过网关设备将第二帐号的密钥信息与对应的时间控制策略同时发送给电子锁具。
比如:第一帐号对应的用户在家中大门上使用了指纹门锁,第二帐号对应于该用户家的小时工,小时工需在每天的15:00去第一帐号对应的用户家中打 扫卫生,第一帐号对应的用户通过第一帐号向小时工对应的第二帐号授予指纹门锁的使用权限,并将时间控制策略设置为:每天15:00至15:10小时工对应的第二帐号的密钥信息能够开启该指纹门锁。
需要说明的是,该步骤可以与步骤312同时执行。本实施例对此不做限定。
在步骤316中,电子锁具接收时间控制策略。
电子锁具接收与第二帐号的使用权限对应的时间控制策略。
可选的,电子锁具在接收服务器发送的密钥信息时,同时接收对应的时间控制策略。
需要说明的是,该步骤可以与步骤313同时执行。本实施例对此不做限定。
在步骤317中,电子锁具将时间控制策略与密钥信息进行关联存储。
电子锁具将时间控制策略与对应的第二帐号的密钥信息进行关联后,将时间控制策略以及与第二帐号的密钥信息的对应关系存储。
此外,本发明实施例提供的应用于电子锁具的授权方法,还通过服务器将时间控制策略发送给电子锁具,电子锁具将时间控制策略与密钥信息进行关联存储,令不同的密钥信息能够在不同的时间段开启电子锁具,管理员能够更加灵活合理地控制电子锁具的使用权限,同时提高了电子锁具的安全性能。
可选的,在上述应用于电子锁具的授权方法中,第一帐号可以通过第一即时通讯客户端对电子锁具的使用权限进行查询、修改、删除,换句话说,第一帐号对应的用户可以通过第一即时通讯客户端查询到所有被授予电子锁具使用权限的第二帐号,或者查询到某个具体的第二帐号对电子锁具的使用权限,还可以在查询结果基础上对使用权限进行修改或删除。
比如:如图4B所示,第一帐号对应的用户在第一即时通讯客户端中打开与第一帐号绑定的电子锁具的对话框41,发送消息42“查询4567893”,得到对应于第二帐号“4567893”的查询结果43,该查询结果43中包括第二帐号“4567893”的权限授予状态、授予时间、使用权限对应的时间控制策略。若用户点击修改选项44,则能够修改第二帐号的使用权限;若用户点击删除选项45,则将第二帐号的使用权限删除。
需要说明的是,上述实施例中,以服务器为执行主体的步骤可单独实现成为服务器侧的授权方法,以电子锁具为执行主体的步骤可单独实现成为电子锁具侧的授权方法,以即时通信客户端为执行主体的步骤可单独实现成为终端侧 的授权方法,本发明实施例在此不再赘述。
请参考图5,其示出了本发明一个实施例提供的应用于电子锁具的授权装置的结构方框图。该应用于电子锁具的授权装置可以通过软件、硬件或者两者的结合实现成为上述可提供应用于电子锁具的授权方法的服务器的全部或一部分。该装置包括:
第一接收模块510,用于接收第一即时通讯客户端发送的授权请求,第一即时通讯客户端登录有第一帐号,授权请求用于请求向第二帐号授予电子锁具的使用权限;
查询模块520,用于根据授权请求查询与第二帐号绑定的密钥信息;
第一发送模块530,用于将密钥信息发送给电子锁具,电子锁具用于将密钥信息添加至可信密钥库。
综上所述,本发明实施例提供的应用于电子锁具的授权装置,通过接收登录有第一帐号的第一即时通讯客户端发送的授权请求,并根据授权请求查询与第二帐号绑定的密钥信息,从而将密钥信息发送给电子锁具,由电子锁具将该密钥信息添加至可信密钥库;解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。
请参考图6其示出了本发明另一个实施例提供的应用于电子锁具的授权装置的结构方框图。该应用于电子锁具的授权装置可以通过软件、硬件或者两者的结合实现成为上述可提供应用于电子锁具的授权方法的服务器的全部或一部分。该装置包括:
第一接收模块510,用于接收第一即时通讯客户端发送的授权请求,第一即时通讯客户端登录有第一帐号,授权请求用于请求向第二帐号授予电子锁具的使用权限;
查询模块520,用于根据授权请求查询与第二帐号绑定的密钥信息;
第一发送模块530,用于将密钥信息发送给电子锁具,电子锁具用于将密钥信息添加至可信密钥库。
可选的,该装置还包括:
第一检测模块540,用于检测第一帐号是否具有电子锁具的管理权限;
第二执行模块550,用于在第一帐号具有电子锁具的管理权限时,执行根据授权请求查询与第二帐号绑定的密钥信息的步骤。
可选的,该装置还包括:
第二检测模块560,用于第二帐号与第一帐号是否满足预定关系;
第二执行模块570,用于在第二帐号与第一帐号满足预定关系时,执行根据授权请求查询与第二帐号绑定的密钥信息的步骤;
其中,预定关系包括如下关系中的至少一个:
第二帐号属于第一帐号的好友关系链;
第二帐号与第一帐号的好友亲密度高于预设阈值;
第二帐号的昵称属于亲友昵称集合;
第二帐号和第一帐号属于指定群组。
可选的,第一发送模块530,包括:
查询单元531,用于查询电子锁具所对应的网关设备;
发送单元532,用于通过网关设备将密钥信息发送给电子锁具。
可选的,授权请求还包括使用权限对应的时间控制策略,时间控制策略用于指示在至少一个时间段使能使用权限;
该装置还包括:
第二发送模块580,用于将时间控制策略发送给电子锁具,电子锁具用于将时间控制策略与密钥信息进行关联存储。
可选的,该装置还包括:
第二接收模块590,用于接收第二即时通讯客户端发送的绑定请求,第二即时通讯客户端登录有第二帐号,绑定请求包括密钥信息;
第一绑定模块591,用于建立第二帐号与密钥信息之间的绑定关系;
其中,密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
可选的,该装置还包括:
第三接收模块592,用于接收第一即时通讯客户端发送的绑定请求,绑定请求包括电子锁具的锁具标识;
第二绑定模块593,用于建立第一帐号与锁具标识之间的绑定关系。
综上所述,本发明实施例提供的应用于电子锁具的授权装置,通过接收登录有第一帐号的第一即时通讯客户端发送的授权请求,并根据授权请求查询与第二帐号绑定的密钥信息,从而将密钥信息发送给电子锁具,由电子锁具将该密钥信息添加至可信密钥库;解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。
此外,本发明实施例提供的应用于电子锁具的授权装置,还通过检测第一账对电子锁具是否具有管理权限,避免电子锁具的使用权限被随意更改,保证了电子锁具的安全性。
此外,本发明实施例提供的应用于电子锁具的授权装置,还通过查询第二帐号和第一帐号是否满足预定关系,在第二帐号与第一帐号满足预定关系时,向电子锁具授予使用权限,避免管理员因为疏忽将电子锁具的使用权限下发给可疑人员,提高了电子锁具的安全性。
请参考图7,其示出了本发明另一个实施例提供的应用于电子锁具的授权装置的结构方框图。该应用于电子锁具的授权装置可以通过软件、硬件或者两者的结合实现成为上述可提供应用于电子锁具的授权方法的电子锁具的全部或一部分。该装置包括:
第一接收模块710,用于接收服务器发送的第二帐号的密钥信息;密钥信息是服务器根据第一即时通讯客户端发送的授权请求查询得到的,第一即时通讯客户端登录有第一帐号,授权请求用于请求向第二帐号授予电子锁具的使用权限;
添加模块720,用于将密钥信息添加至可信密钥库。
综上所述,本发明实施例提供的应用于电子锁具的授权装置,通过接收服务器发送的第二帐号的密钥信息,将密钥信息添加至可信密钥库;解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。。
请参考图8,其示出了本发明另一个实施例提供的应用于电子锁具的授权装置的结构方框图。该应用于电子锁具的授权装置可以通过软件、硬件或者两 者的结合实现成为上述可提供应用于电子锁具的授权方法的电子锁具的全部或一部分。该装置包括:
第一接收模块710,用于接收服务器发送的第二帐号的密钥信息;密钥信息是服务器根据第一即时通讯客户端发送的授权请求查询得到的,第一即时通讯客户端登录有第一帐号,授权请求用于请求向第二帐号授予电子锁具的使用权限;
添加模块720,用于将密钥信息添加至可信密钥库。
可选的,第一接收模块710具体用于接收服务器通过网关设备发送的密钥信息;网关设备与电子锁具之间存在对应关系;
其中,密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
可选的,授权请求还包括使用权限对应的时间控制策略,该装置还包括;
第二接收模块730,用于接收时间控制策略,时间控制策略用于指示在至少一个时间段使能使用权限;
存储模块740,用于将时间控制策略与密钥信息进行关联存储。
综上所述,本发明实施例提供的应用于电子锁具的授权装置,通过接收服务器发送的第二帐号的密钥信息,将密钥信息添加至可信密钥库;解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。
此外,本发明实施例提供的应用于电子锁具的授权装置,还通过检测第一账对电子锁具是否具有管理权限,避免电子锁具的使用权限被随意更改,保证了电子锁具的安全性。
此外,本发明实施例提供的应用于电子锁具的授权装置,还通过查询第二帐号和第一帐号是否满足预定关系,在第二帐号与第一帐号满足预定关系时,向电子锁具授予使用权限,避免管理员因为疏忽将电子锁具的使用权限下发给可疑人员,提高了电子锁具的安全性。
请参考图9,其示出了本发明另一个实施例提供的应用于电子锁具的授权装置的结构方框图。该应用于电子锁具的授权装置可以通过软件、硬件或者两 者的结合实现成为上述可提供应用于电子锁具的授权方法的终端的全部或一部分。该装置包括:
确定模块910,用于在至少一个帐号中确定出第二帐号;
第一请求发送模块920,用于向服务器发送授权请求,授权请求用于请求向第二帐号授予电子锁具的使用权限;服务器用于根据授权请求查询与第二帐号绑定的密钥信息,将密钥信息发送给电子锁具,由电子锁具将密钥信息添加至可信密钥库。
综上所述,本发明实施例提供的应用于电子锁具的授权装置,通过在至少一个帐号中确定出第二帐号,向服务器发送授权请求,授权请求用于请求向第二帐号授予电子锁具的使用权限;服务器用于根据授权请求查询与第二帐号绑定的密钥信息,将密钥信息发送给电子锁具,由电子锁具将密钥信息添加至可信密钥库;解决了当用户远离电子锁具时,难以向电子锁具中录入指纹等密钥信息,进而导致无法完成授权的问题;达到了即使用户远离电子锁具,也能够远程向电子锁具中录入密钥信息,进而确保授权正常进行。
可选的,该装置,还包括:
第二请求发送模块930,用于向服务器发送绑定请求,绑定请求包括电子锁具的锁具标识,服务器用于建立第一帐号与所述锁具标识之间的绑定关系。
需要说明的是:上述实施例提供的应用于电子锁具的授权装置在为电子锁具提供授权服务时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的应用于电子锁具的授权装置与应用于电子锁具的授权方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
请参考图10,其示出了本发明一个实施例提供的服务器的结构方框图。该服务器1000实现为图1中的服务器130。具体来讲:
服务器1000包括中央处理单元(CPU)1001、包括随机存取存储器(RAM)1002和只读存储器(ROM)1003的***存储器1004,以及连接***存储器1004和中央处理单元1001的***总线1005。所述服务器1000还包括帮助计算机内的各个器件之间传输信息的基本输入/输出***(I/O***)1006,和用于存储 操作***1013、应用程序1014和其他程序模块1015的大容量存储设备1007。
所述基本输入/输出***1006包括有用于显示信息的显示器1008和用于用户输入信息的诸如鼠标、键盘之类的输入设备1009。其中所述显示器1008和输入设备1009都通过连接到***总线1005的输入输出控制器1010连接到中央处理单元1001。所述基本输入/输出***1006还可以包括输入输出控制器1010以用于接收和处理来自键盘、鼠标、或电子触控笔等多个其他设备的输入。类似地,输入输出控制器1010还提供输出到显示屏、打印机或其他类型的输出设备。
所述大容量存储设备1007通过连接到***总线1005的大容量存储控制器(未示出)连接到中央处理单元1001。所述大容量存储设备1007及其相关联的计算机可读介质为服务器1000提供非易失性存储。也就是说,所述大容量存储设备1007可以包括诸如硬盘或者CD-ROM驱动器之类的计算机可读介质(未示出)。
不失一般性,所述计算机可读介质可以包括计算机存储介质和通信介质。计算机存储介质包括以用于存储诸如计算机可读指令、数据结构、程序模块或其他数据等信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动介质。计算机存储介质包括RAM、ROM、EPROM、EEPROM、闪存或其他固态存储其技术,CD-ROM、DVD或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。当然,本领域技术人员可知所述计算机存储介质不局限于上述几种。上述的***存储器1004和大容量存储设备1007可以统称为存储器。
根据本发明的各种实施例,所述服务器1000还可以通过诸如因特网等网络连接到网络上的远程计算机运行。也即服务器1000可以通过连接在所述***总线1005上的网络接口单元1011连接到网络1012,或者说,也可以使用网络接口单元1011来连接到其他类型的网络或远程计算机***(未示出)。
所述存储器还包括一个或者一个以上的程序,所述一个或者一个以上程序存储于存储器中,所述一个或者一个以上程序包含用于进行本发明实施例提供的服务器侧的授权方法的指令。
请参考图11,其示出了本发明一个实施例提供的电子锁具的结构示意图,该电子锁具可以用于实施上述实施例中提供的授权方法。具体来讲:
电子锁具1100可以包括锁体1110、有一个或一个以上计算机可读存储介质的存储器1120、输入单元1130、显示单元1140、传输单元1170、包括有一个或者一个以上处理核心的处理器1180、以及电源1190等部件。本领域技术人员可以理解,图11中示出的锁具结构并不构成对电子锁具的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
锁体1110为单向锁体、三向锁体或四向锁体等等,锁体1110在处理器1118的控制下处于开启或锁止状态。
存储器1120可用于存储软件程序以及模块,处理器1180通过运行存储在存储器1120的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器1120可主要包括存储程序区和存储数据区,其中,存储程序区可存储至少一个功能所需的程序;存储数据区可存储录入的密钥信息和相应的使用权限信息。此外,存储器1120可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器1120还可以包括存储器控制器,以提供处理器1180和输入单元1130对存储器1120的访问。
输入单元1130用于接收用户输入的密钥信息。输入单元1130可包括触敏表面1131以及其他输入设备1132。触敏表面1131,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面1131上或在触敏表面731附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面1131可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1180,并能接收处理器1180发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面1131。除了触敏表面1131,输入单元1130还可以包括其他输入设备1132。具体地,其他输入设备1132可以包括但不限于指纹采集器、掌纹采集器、虹膜采集器、心率采集器中的一种或多种。
显示单元1140可用于显示由用户输入的信息或提供给用户的信息以及电子锁具1100的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元1140可包括显示面板1141,可选的, 可以采用LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置显示面板1141。进一步的,触敏表面1131可覆盖显示面板1141,当触敏表面1131检测到在其上或附近的触摸操作后,传送给处理器1180以确定触摸事件的类型,随后处理器1180根据触摸事件的类型在显示面板1141上提供相应的视觉输出。虽然在图11中,触敏表面1131与显示面板1141是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面1131与显示面板1141集成而实现输入和输出功能。
本实施例中,电子锁具1100通过通信模块1170与网关设备进行数据传输。其中,该通信模块1170低功耗近场通信模块,比如,蓝牙模块或Zigbee模块。
处理器1180是电子锁具1100的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1120内的软件程序和/或模块,以及调用存储在存储器1120内的数据,执行电子锁具1100的各种功能和处理数据,从而进行整体监控。可选的,处理器1180可包括一个或多个处理核心;优选的,处理器1180可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作***、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1180中。
电子锁具1100还包括给各个部件供电的电源1190(比如电池),优选的,电源可以通过电源管理***与处理器1180逻辑相连,从而通过电源管理***实现管理充电、放电、以及功耗管理等功能。电源1190还可以包括一个或一个以上的直流或交流电源、再充电***、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。
尽管未示出,电子锁具1100还可以包括摄像头等组件,在此不再赘述。具体在本实施例中,电子锁具1100的输入单元为指纹采集器,显示单元是触摸屏显示器,电子锁具1100还包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行。所述一个或者一个以上程序包含用于执行上述授权方法中各个操作的指令。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器,上述指令可由服务器或电子锁具中的处理器执行 以完成上述图2A实施例、图3A实施例或图4A实施例所示出的授权方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
请参考图12,其示出了本发明一个实施例提供的应用于电子锁具的授权***的结构方框图。该应用于电子锁具的授权***包括:
服务器1210、电子锁具1220和终端1230。
服务器1210包括如图4或图5任一所示的装置;
电子锁具1220包括如图6或图7任一所示的装置;
终端1230包括如图8所示的装置;
或,
服务器1210包括如图10所示的服务器;
电子锁具1220包括如图11所示的电子锁具。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (31)

  1. 一种应用于电子锁具的授权方法,其特征在于,所述方法包括:
    接收第一即时通讯客户端发送的授权请求,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向第二帐号授予所述电子锁具的使用权限;
    根据所述授权请求查询与所述第二帐号绑定的密钥信息;
    将所述密钥信息发送给所述电子锁具,所述电子锁具用于将所述密钥信息添加至可信密钥库。
  2. 根据权利要求1所述的方法,其特征在于,所述根据所述授权请求查询与所述第二帐号绑定的密钥信息之前,还包括:
    检测所述第一帐号是否具有所述电子锁具的管理权限;
    在所述第一帐号具有所述电子锁具的管理权限时,执行所述根据所述授权请求查询与所述第二帐号绑定的密钥信息的步骤。
  3. 根据权利要求1所述的方法,其特征在于,所述根据所述授权请求查询与所述第二帐号绑定的密钥信息之前,还包括:
    检测所述第二帐号与所述第一帐号是否满足预定关系;
    在所述第二帐号与所述第一帐号满足预定关系时,执行所述根据所述授权请求查询与所述第二帐号绑定的密钥信息的步骤;
    其中,所述预定关系包括如下关系中的至少一个:
    所述第二帐号属于所述第一帐号的好友关系链;
    所述第二帐号与所述第一帐号的好友亲密度高于预设阈值;
    所述第二帐号的昵称属于亲友昵称集合;
    所述第二帐号和所述第一帐号属于指定群组。
  4. 根据权利要求1至3任一所述的方法,其特征在于,所述将所述密钥信息发送给所述电子锁具,包括:
    查询所述电子锁具所对应的网关设备;
    通过所述网关设备将所述密钥信息发送给所述电子锁具。
  5. 根据权利要求1至3任一所述的方法,其特征在于,所述授权请求还包括所述使用权限对应的时间控制策略,所述时间控制策略用于指示在至少一个时间段使能所述使用权限;
    所述方法还包括:
    将所述时间控制策略发送给所述电子锁具,所述电子锁具用于将所述时间控制策略与所述密钥信息进行关联存储。
  6. 根据权利要求1至3任一所述的方法,其特征在于,所述查询与所述第二即时通讯客户端绑定的密钥信息之前,还包括:
    接收第二即时通讯客户端发送的绑定请求,所述第二即时通讯客户端登录有所述第二帐号,所述绑定请求包括所述密钥信息;
    建立所述第二帐号与所述密钥信息之间的绑定关系;
    其中,所述密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
  7. 根据权利要求1至3任一所述的方法,其特征在于,所述查询与所述第二即时通讯客户端绑定的密钥信息之前,还包括:
    接收所述第一即时通讯客户端发送的绑定请求,所述绑定请求包括所述电子锁具的锁具标识;
    建立所述第一帐号与所述锁具标识之间的绑定关系。
  8. 一种应用于电子锁具的授权方法,其特征在于,所述方法包括:
    接收服务器发送的第二帐号的密钥信息;所述密钥信息是服务器根据第一即时通讯客户端发送的授权请求查询得到的,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向所述第二帐号授予所述电子锁具的使用权限;
    将所述密钥信息添加至可信密钥库。
  9. 根据权利要求8所述的方法,其特征在于,所述接收服务器发送的第二帐号的密钥信息,包括:
    接收所述服务器通过网关设备发送的所述密钥信息;所述网关设备与所述电子锁具之间存在对应关系;
    其中,所述密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
  10. 根据权利要求8所述的方法,其特征在于,所述授权请求还包括所述使用权限对应的时间控制策略,所述方法还包括:
    接收所述时间控制策略,所述时间控制策略用于指示在至少一个时间段使能所述使用权限;
    将所述时间控制策略与所述密钥信息进行关联存储。
  11. 一种应用于电子锁具的授权装置,其特征在于,所述装置包括:
    第一接收模块,用于接收第一即时通讯客户端发送的授权请求,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向第二帐号授予所述电子锁具的使用权限;
    查询模块,用于根据所述授权请求查询与所述第二帐号绑定的密钥信息;
    第一发送模块,用于将所述密钥信息发送给所述电子锁具,所述电子锁具用于将所述密钥信息添加至可信密钥库。
  12. 根据权利要求11所述的装置,其特征在于,所述装置还包括:
    第一检测模块,用于检测所述第一帐号是否具有所述电子锁具的管理权限;
    第二执行模块,用于在所述第一帐号具有所述电子锁具的管理权限时,执行所述根据所述授权请求查询与所述第二帐号绑定的密钥信息的步骤。
  13. 根据权利要求11所述的装置,其特征在于,所述装置还包括:
    第二检测模块,用于所述第二帐号与所述第一帐号是否满足预定关系;
    第二执行模块,用于在所述第二帐号与所述第一帐号满足预定关系时,执行所述根据所述授权请求查询与所述第二帐号绑定的密钥信息的步骤;
    其中,所述预定关系包括如下关系中的至少一个:
    所述第二帐号属于所述第一帐号的好友关系链;
    所述第二帐号与所述第一帐号的好友亲密度高于预设阈值;
    所述第二帐号的昵称属于亲友昵称集合;
    所述第二帐号和所述第一帐号属于指定群组。
  14. 根据权利要求11至13任一所述的装置,其特征在于,所述第一发送模块,包括:
    查询单元,用于查询所述电子锁具所对应的网关设备;
    发送单元,用于通过所述网关设备将所述密钥信息发送给所述电子锁具。
  15. 根据权利要求11至13任一所述的装置,其特征在于,所述授权请求还包括所述使用权限对应的时间控制策略,所述时间控制策略用于指示在至少一个时间段使能所述使用权限;
    所述装置还包括:
    第二发送模块,用于将所述时间控制策略发送给所述电子锁具,所述电子锁具用于将所述时间控制策略与所述密钥信息进行关联存储。
  16. 根据权利要求11至13任一所述的装置,其特征在于,所述装置还包括:
    第二接收模块,用于接收第二即时通讯客户端发送的绑定请求,所述第二即时通讯客户端登录有所述第二帐号,所述绑定请求包括所述密钥信息;
    第一绑定模块,用于建立所述第二帐号与所述密钥信息之间的绑定关系;
    其中,所述密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
  17. 根据权利要求11至13任一所述的装置,其特征在于,所述装置还包括:
    第三接收模块,用于接收所述第一即时通讯客户端发送的绑定请求,所述绑定请求包括所述电子锁具的锁具标识;
    第二绑定模块,用于建立所述第一帐号与所述锁具标识之间的绑定关系。
  18. 一种应用于电子锁具的授权装置,其特征在于,所述装置包括:
    第一接收模块,用于接收服务器发送的第二帐号的密钥信息;所述密钥信息是服务器根据第一即时通讯客户端发送的授权请求查询得到的,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向所述第二帐号授予所述电子锁具的使用权限;
    添加模块,用于将所述密钥信息添加至可信密钥库。
  19. 根据权利要求18所述的装置,其特征在于,所述第一接收模块具体用于接收所述服务器通过网关设备发送的所述密钥信息;所述网关设备与所述电子锁具之间存在对应关系;
    其中,所述密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
  20. 根据权利要求18所述的装置,其特征在于,所述授权请求还包括所述使用权限对应的时间控制策略,所述装置还包括;
    第二接收模块,用于接收所述时间控制策略,所述时间控制策略用于指示在至少一个时间段使能所述使用权限;
    存储模块,用于将所述时间控制策略与所述密钥信息进行关联存储。
  21. 一种服务器,其特征在于,所述服务器包括:
    一个或多个处理器;和
    存储器;
    所述存储器存储有一个或多个程序,所述一个或多个程序被配置成由所述一个或多个处理器执行,所述一个或多个程序包含用于进行以下操作的指令:
    接收第一即时通讯客户端发送的授权请求,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向第二帐号授予所述电子锁具的使用权限;
    根据所述授权请求查询与所述第二帐号绑定的密钥信息;
    将所述密钥信息发送给所述电子锁具,所述电子锁具用于将所述密钥信息添加至可信密钥库。
  22. 根据权利要求21所述的服务器,其特征在于,所述一个或多个程序还包含用于进行以下操作的指令:
    检测所述第一帐号是否具有所述电子锁具的管理权限;
    在所述第一帐号具有所述电子锁具的管理权限时,执行所述根据所述授权请求查询与所述第二帐号绑定的密钥信息的步骤。
  23. 根据权利要求21所述的服务器,其特征在于,所述一个或多个程序还包含用于进行以下操作的指令:
    检测所述第二帐号与所述第一帐号是否满足预定关系;
    在所述第二帐号与所述第一帐号满足预定关系时,执行所述根据所述授权请求查询与所述第二帐号绑定的密钥信息的步骤;
    其中,所述预定关系包括如下关系中的至少一个:
    所述第二帐号属于所述第一帐号的好友关系链;
    所述第二帐号与所述第一帐号的好友亲密度高于预设阈值;
    所述第二帐号的昵称属于亲友昵称集合;
    所述第二帐号和所述第一帐号属于指定群组。
  24. 根据权利要求21至23任一所述的服务器,其特征在于,所述一个或多个程序还包含用于进行以下操作的指令:
    查询所述电子锁具所对应的网关设备;
    通过所述网关设备将所述密钥信息发送给所述电子锁具。
  25. 根据权利要求21至23任一所述的服务器,其特征在于,所述授权请求还包括所述使用权限对应的时间控制策略,所述时间控制策略用于指示在至少一个时间段使能所述使用权限,所述一个或多个程序还包含用于进行以下操作的指令:
    将所述时间控制策略发送给所述电子锁具,所述电子锁具用于将所述时间控制策略与所述密钥信息进行关联存储。
  26. 根据权利要求21至23任一所述的服务器,其特征在于,所述一个或多个程序还包含用于进行以下操作的指令:
    接收第二即时通讯客户端发送的绑定请求,所述第二即时通讯客户端登录有所述第二帐号,所述绑定请求包括所述密钥信息;
    建立所述第二帐号与所述密钥信息之间的绑定关系;
    其中,所述密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
  27. 根据权利要求21至23任一所述的服务器,其特征在于,所述一个或多个程序还包含用于进行以下操作的指令:
    接收所述第一即时通讯客户端发送的绑定请求,所述绑定请求包括所述电子锁具的锁具标识;
    建立所述第一帐号与所述锁具标识之间的绑定关系。
  28. 一种电子锁具,其特征在于,所述电子锁具包括:
    一个或多个处理器;和
    存储器;
    所述存储器存储有一个或多个程序,所述一个或多个程序被配置成由所述一个或多个处理器执行,所述一个或多个程序包含用于进行以下操作的指令:
    接收服务器发送的第二帐号的密钥信息;所述密钥信息是服务器根据第一即时通讯客户端发送的授权请求查询得到的,所述第一即时通讯客户端登录有第一帐号,所述授权请求用于请求向所述第二帐号授予所述电子锁具的使用权限;
    将所述密钥信息添加至可信密钥库。
  29. 根据权利要求28所述的电子锁具,其特征在于,所述一个或多个程序还包含用于进行以下操作的指令:
    接收所述服务器通过网关设备发送的所述密钥信息;所述网关设备与所述电子锁具之间存在对应关系;
    其中,所述密钥信息包括:密码信息,和/或,指纹信息,和/或,瞳孔间距信息,和/或,虹膜信息,和/或,面像信息,和/或,掌纹信息,和/或,步态信息,和/或,心跳速率信息,和/或,脉搏信息。
  30. 根据权利要求28所述的电子锁具,其特征在于,所述授权请求还包括所述使用权限对应的时间控制策略,所述一个或多个程序还包含用于进行以下操作的指令:
    接收所述时间控制策略,所述时间控制策略用于指示在至少一个时间段使能所述使用权限;
    将所述时间控制策略与所述密钥信息进行关联存储。
  31. 一种应用于电子锁具的授权***,其特征在于,所述***包括:服务器、电子锁具和终端;
    所述服务器包括如权利要求11至17任一所述的装置;
    所述电子锁具包括如权利要求18至20任一所述的装置;
    或,
    所述服务器包括如权利要求21至27任一所述的服务器;
    所述电子锁具包括如权利要求28至30任一所述的电子锁具。
PCT/CN2017/073960 2016-02-17 2017-02-17 应用于电子锁具的授权方法、装置及*** WO2017140266A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/030,745 US10586415B2 (en) 2016-02-17 2018-07-09 Authorization method, apparatus, and system applied to electronic lock

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610089412.6A CN107093228B (zh) 2016-02-17 2016-02-17 应用于电子锁具的授权方法、装置及***
CN201610089412.6 2016-02-17

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/030,745 Continuation-In-Part US10586415B2 (en) 2016-02-17 2018-07-09 Authorization method, apparatus, and system applied to electronic lock

Publications (1)

Publication Number Publication Date
WO2017140266A1 true WO2017140266A1 (zh) 2017-08-24

Family

ID=59625599

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/073960 WO2017140266A1 (zh) 2016-02-17 2017-02-17 应用于电子锁具的授权方法、装置及***

Country Status (3)

Country Link
US (1) US10586415B2 (zh)
CN (1) CN107093228B (zh)
WO (1) WO2017140266A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898710A (zh) * 2018-06-22 2018-11-27 合肥迪鑫信息科技有限公司 一种用于固定锁的指纹开锁***及开锁方法
CN114422464A (zh) * 2021-12-17 2022-04-29 北京达佳互联信息技术有限公司 信息交互方法及装置
CN115424381A (zh) * 2022-08-24 2022-12-02 深圳市极致科技股份有限公司 门禁机内授权数据的更新方法、装置和电子设备

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9020854B2 (en) 2004-03-08 2015-04-28 Proxense, Llc Linked account system using personal digital key (PDK-LAS)
US11206664B2 (en) 2006-01-06 2021-12-21 Proxense, Llc Wireless network synchronization of cells and client devices on a network
US8036152B2 (en) 2006-01-06 2011-10-11 Proxense, Llc Integrated power management of a client device via system time slot assignment
US7904718B2 (en) 2006-05-05 2011-03-08 Proxense, Llc Personal digital key differentiation for secure transactions
US8659427B2 (en) 2007-11-09 2014-02-25 Proxense, Llc Proximity-sensor supporting multiple application services
US8171528B1 (en) 2007-12-06 2012-05-01 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
WO2009079666A1 (en) 2007-12-19 2009-06-25 Proxense, Llc Security system and method for controlling access to computing resources
US8508336B2 (en) 2008-02-14 2013-08-13 Proxense, Llc Proximity-based healthcare management system with automatic access to private information
WO2009126732A2 (en) 2008-04-08 2009-10-15 Proxense, Llc Automated service-based order processing
US9418205B2 (en) 2010-03-15 2016-08-16 Proxense, Llc Proximity-based system for automatic application or data access and item tracking
US8918854B1 (en) 2010-07-15 2014-12-23 Proxense, Llc Proximity-based system for automatic application initialization
US9265450B1 (en) 2011-02-21 2016-02-23 Proxense, Llc Proximity-based system for object tracking and automatic application initialization
US9405898B2 (en) 2013-05-10 2016-08-02 Proxense, Llc Secure element as a digital pocket
CN108257273A (zh) * 2018-01-24 2018-07-06 青岛海尔智能家电科技有限公司 智能门锁控制的方法、装置及***
CN108898705A (zh) * 2018-06-14 2018-11-27 贵州大学 一种具有权限分享的家庭门禁***及其授权方法
CN109191649B (zh) * 2018-10-26 2021-01-29 珠海格力电器股份有限公司 一种智能门锁控制权限分享的方法及装置
CN109816826A (zh) * 2018-12-28 2019-05-28 深圳绿米联创科技有限公司 门锁控制的方法、装置、***、移动终端以及存储介质
CN109801418A (zh) * 2019-01-16 2019-05-24 浙江汉默生链商科技有限公司 用户自主可控的精细化授权管理方法和装置
US11189117B2 (en) 2019-01-30 2021-11-30 Zhuhai Unitech Power Technology Co., Ltd. Method and system for controlling a smart lock
US11275820B2 (en) * 2019-03-08 2022-03-15 Master Lock Company Llc Locking device biometric access
US10685516B1 (en) 2019-03-22 2020-06-16 Eingot Llc Virtual intercom system
US11900744B2 (en) 2019-03-22 2024-02-13 Eingot Llc Virtual intercom system
US10846958B2 (en) * 2019-03-22 2020-11-24 Eingot Llc Virtual intercom system
CN110084931A (zh) * 2019-04-22 2019-08-02 北京摇光智能科技有限公司 一种电子锁授权方法
CN110648443B (zh) * 2019-10-08 2021-12-10 中国建设银行股份有限公司 一种门禁验证方法、装置、设备和介质
NL2024201B1 (en) * 2019-11-08 2021-07-20 Kibba Ip B V Space access control module and remote key provisioning system
CN110855888B (zh) * 2019-11-21 2021-10-15 深圳市圆周率软件科技有限责任公司 一种对摄像模组的调焦***进行远程管控的方法
CN110730308B (zh) * 2019-11-21 2021-10-15 深圳市圆周率软件科技有限责任公司 一种对摄像模组的调焦***进行远程管控的方法
CN110891143B (zh) * 2019-11-21 2021-10-15 深圳市圆周率软件科技有限责任公司 一种对摄像模组的调焦***进行远程管控的***
CN112836191A (zh) * 2019-11-22 2021-05-25 比亚迪股份有限公司 车辆授权方法、装置、计算机设备及存储介质
CN110942537B (zh) * 2019-11-26 2021-10-15 珠海格力电器股份有限公司 一种智能门锁开锁***、方法、装置和介质
CN112124247B (zh) * 2020-09-18 2022-04-22 上海钧正网络科技有限公司 车锁控制方法、装置及计算机可读存储介质
TWI729959B (zh) * 2020-11-04 2021-06-01 湛積股份有限公司 具數位多鎖頭架構的配對認證系統及數位裝置,及其配對認證方法
CN113205620B (zh) * 2021-03-26 2023-07-25 珠海汇金科技股份有限公司 一种开锁方法以及相关设备
CN115273275A (zh) * 2021-04-29 2022-11-01 珠海优特电力科技股份有限公司 一种锁具控制方法、装置及***
CN113538739B (zh) * 2021-06-09 2023-06-20 杭州华橙软件技术有限公司 智能锁的配对方法、电子装置和存储介质
WO2023023176A1 (en) * 2021-08-17 2023-02-23 Spectrum Brands, Inc. Secure guest enrollment at electronic lock
CN114299673A (zh) * 2021-12-29 2022-04-08 建信金融科技有限责任公司 实物管理方法、装置、实物柜、计算机设备和存储介质
CN115314272A (zh) * 2022-07-29 2022-11-08 金邦达有限公司 一种智能门锁远程授权的方法
CN115497201B (zh) * 2022-09-07 2024-03-01 中国建设银行股份有限公司 锁具任务处理方法、装置、计算机设备和存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014031399A1 (en) * 2012-08-21 2014-02-27 Onity Inc. Systems and methods for lock access management using wireless signals
CN104680630A (zh) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 一种控制门锁的方法和***
CN105046796A (zh) * 2015-08-31 2015-11-11 芝麻智能科技(北京)有限公司 一种电子锁的开锁控制方法、装置及***
CN105118127A (zh) * 2015-09-17 2015-12-02 慧锐通智能科技股份有限公司 一种访客***及其控制方法
WO2016007877A1 (en) * 2014-07-10 2016-01-14 Schlage Lock Company Llc Networked access control system
CN105303670A (zh) * 2015-12-04 2016-02-03 马孝康 门禁管理方法、装置及***

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7114178B2 (en) * 2001-05-22 2006-09-26 Ericsson Inc. Security system
US20030078979A1 (en) * 2001-10-22 2003-04-24 Motorola, Inc. Method and apparatus for controlling an intelligent device through an instant messaging protocol over a communication network
CN100576256C (zh) * 2007-09-11 2009-12-30 ***通信集团湖北有限公司 门禁远程管理方法
JP5090411B2 (ja) * 2009-08-25 2012-12-05 株式会社スクウェア・エニックス 通信システム、コミュニティ支援サーバ、コミュニティ支援方法、及びコミュニティ支援プログラム
US9189904B1 (en) * 2013-08-21 2015-11-17 Impinj, Inc. Exit-code-based RFID loss-prevention system
US20120280790A1 (en) * 2011-05-02 2012-11-08 Apigy Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US20130335193A1 (en) * 2011-11-29 2013-12-19 1556053 Alberta Ltd. Electronic wireless lock
US9710982B2 (en) * 2011-12-23 2017-07-18 Microsoft Technology Licensing, Llc Hub key service
CN103632415B (zh) * 2012-08-20 2016-01-06 棣南股份有限公司 门控***以及操控器、门口机设备与通讯平台
US8943187B1 (en) * 2012-08-30 2015-01-27 Microstrategy Incorporated Managing electronic keys
WO2014146186A1 (en) * 2013-03-22 2014-09-25 Keyfree Technologies Inc. Managing access to a restricted area
CN103281223B (zh) * 2013-05-15 2016-05-25 五邑大学 一种现代化的智能家居安防***
US9763086B2 (en) * 2013-08-27 2017-09-12 Qualcomm Incorporated Owner access point to control the unlocking of an entry
CN103546294B (zh) * 2013-10-10 2017-03-29 小米科技有限责任公司 门禁授权方法、装置及设备
CN103903319A (zh) * 2014-02-10 2014-07-02 袁磊 基于互联网动态授权的电子锁***
CN104079565A (zh) * 2014-06-13 2014-10-01 小米科技有限责任公司 授权方法和装置
CN104091376B (zh) * 2014-06-16 2017-02-08 小米科技有限责任公司 智能锁控制方法和装置
CN104135480A (zh) * 2014-08-05 2014-11-05 上海众人科技有限公司 一种门禁授权***及方法
US20160050209A1 (en) * 2014-08-18 2016-02-18 Ebay Inc. Access control based on authentication
CN104167041B (zh) * 2014-09-11 2018-03-09 祁春富 基于智能手机使用的门禁***及其控制方法
CN104580414A (zh) * 2014-12-27 2015-04-29 东莞市科维电子科技有限公司 一种用于私家车的车联网***
CN104806085B (zh) * 2015-03-20 2017-07-18 云丁网络技术(北京)有限公司 一种智能门锁***及其智能提醒方法
CN204595961U (zh) * 2015-04-27 2015-08-26 宁波超瑞软件技术有限公司 一种授权远程管理的门禁***
CN104809795A (zh) * 2015-05-21 2015-07-29 河南传通电子科技有限公司 一种利用手机app与云平台及蓝牙智能钥匙控制开关锁的电路结构及其实现方法
CN105227321B (zh) * 2015-10-28 2021-05-11 腾讯科技(深圳)有限公司 信息处理方法、服务器及客户端
KR20170078415A (ko) * 2015-12-29 2017-07-07 삼성전자주식회사 도어락 제어 장치 및 방법

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014031399A1 (en) * 2012-08-21 2014-02-27 Onity Inc. Systems and methods for lock access management using wireless signals
WO2016007877A1 (en) * 2014-07-10 2016-01-14 Schlage Lock Company Llc Networked access control system
CN104680630A (zh) * 2014-12-29 2015-06-03 深圳市进林科技有限公司 一种控制门锁的方法和***
CN105046796A (zh) * 2015-08-31 2015-11-11 芝麻智能科技(北京)有限公司 一种电子锁的开锁控制方法、装置及***
CN105118127A (zh) * 2015-09-17 2015-12-02 慧锐通智能科技股份有限公司 一种访客***及其控制方法
CN105303670A (zh) * 2015-12-04 2016-02-03 马孝康 门禁管理方法、装置及***

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898710A (zh) * 2018-06-22 2018-11-27 合肥迪鑫信息科技有限公司 一种用于固定锁的指纹开锁***及开锁方法
CN114422464A (zh) * 2021-12-17 2022-04-29 北京达佳互联信息技术有限公司 信息交互方法及装置
CN115424381A (zh) * 2022-08-24 2022-12-02 深圳市极致科技股份有限公司 门禁机内授权数据的更新方法、装置和电子设备
CN115424381B (zh) * 2022-08-24 2023-10-24 深圳市极致科技股份有限公司 门禁机内授权数据的更新方法、装置和电子设备

Also Published As

Publication number Publication date
CN107093228B (zh) 2020-09-01
US10586415B2 (en) 2020-03-10
US20180322718A1 (en) 2018-11-08
CN107093228A (zh) 2017-08-25

Similar Documents

Publication Publication Date Title
WO2017140266A1 (zh) 应用于电子锁具的授权方法、装置及***
CN108293045B (zh) 本地和远程***之间的单点登录身份管理
US10375054B2 (en) Securing user-accessed applications in a distributed computing environment
US11290438B2 (en) Managing session access across multiple data centers
EP3198421B1 (en) Rule based device enrollment
EP3228061B1 (en) Security context management in multi-tenant environments
US8407773B1 (en) Data and application access combined with communication services
US8904480B2 (en) Social authentication of users
US8407768B1 (en) Data and application access combined with communication services
WO2021112983A1 (en) Enhanced management of access rights for dynamic user groups sharing secret data
CN104754582B (zh) 维护byod安全的客户端及方法
US20170208057A1 (en) Session management for internet of things devices
US11456872B2 (en) Offline protection of secrets
US20160269418A1 (en) Method, system, and apparatus for managing and storing data based on information sensitivity
CN106462179A (zh) 便携式计算设备访问
WO2017054585A1 (zh) 网络接入方法、装置及***
US11720700B2 (en) Systems and methods for securely deploying a collective workspace across multiple local management agents
EP4070503A1 (en) Enhanced security of secret data for dynamic user groups
WO2021067014A1 (en) Enforce changes in session behavior based on signals during session
US20170048176A1 (en) Community directory for distributed policy enforcement
US20230388111A1 (en) Apparatus and methods for secure distributed communications and data access
US10089440B2 (en) Personal health data hub
Hilia et al. Semantic based authorization framework for multi-domain collaborative cloud environments
TWI687817B (zh) 遠端操作方法
US11527310B2 (en) Pseudonymous crypto-based systems and methods for patient data

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17752698

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17752698

Country of ref document: EP

Kind code of ref document: A1