![]() Smart lock and control method of smart lock
专利摘要:
A smart lock for a vehicle includes a lock unit; a wireless communication module configured to communicate with a user terminal; a storage unit configured to prestore identity data of a plurality of wireless devices; and. an authenticating' unit electrically connected to the lock unit, the wireless communication nwdule and the storage unit; wherein when the wireless communication module receives an unlock request signal from the user terminal, the wireless communication module transfers identity data of the lock unit to the user terminal so as to further receive first authentication data from the user terminal, the first authentication data is generated by encrypting identity data of a first wireless device and the identity data of the lock unit, the authenticating' unit is configured to unlock the lock unit according' to the first authentication data. 公开号:NL2021523A 申请号:NL2021523 申请日:2018-08-30 公开日:2019-03-14 发明作者:Lee Wei-Hsun;Wei Chien-Hung;Chou Chien-Ming 申请人:Univ Nat Cheng Kung; IPC主号:
专利说明:
Field of the Invention The present invention relates to a smart lock for a vehicle, and more particularly, to a smart lock capable of being locked or unlocked according to identity data of surrounding wireless devices . Description of the Prior Art In general, the rental and return of a public bicycle has to be managed by a specific bicycle frame. When a user is willing to rent a public bicycle or return the public bicycle, the user must rent or return it on a specific bicycle frame at a specific location. However, providing a bicycle frame at a fixed location is not only bulky and takes up space, but also costs high. There are also public bicycles equipped with Global Positioning System (GPS) now. The GPS-equipped public bicycles do not have to be rented or be returned through a specific bicycle frame. The GPSequipped public bicycles are able to be rented or return at any specific locations. However, the GPS positioning function is not effective on cloudy or rainy days. When the weather is bad, the GPS-equipped public bicycle may be positioned incorrectly, and even may not able to receive signal from satellites such that the GPS-equipped public bicycle is not able to be positioned, so as to further prevent the GPS-equipped public bicycle from being observed by users. Summary of the Invention A main objective of the present invention is to provide a smart lock capable of being locked or unlocked according to identity data of surrounding wireless devices, in order to solve the problems of the prior art. According to an embodiment of the present invention, a smart lock is applicable to a vehicle. The smart lock includes a lock unit, a wireless communication module, a storage unit and an authenticating unit. The lock unit is configured to lock or to unlock the vehicle. The wireless communication module is configured to communicate with a user terminal. The storage unit is configured to prestore identity data of a plurality of wireless devices. The authenticating unit is electrically connected to the lock unit, the wireless communication module and the storage unit. Wherein, when the wireless communication module receives an unlock request signal from the user terminal, the wireless communication module transfers identity data of the lock unit to the user terminal so as to further receive first authentication data from the user terminal, the first authentication data is generated by encrypting identity data of a first wireless device and the identity data of the lock unit, the authentication unit is configured to decrypt the first authentication data according to the identity data of the lock unit to obtain the identity data of the first wireless device. When the identity data of the first wireless device match one of the identity data of the plurality of wireless devices, the authentication unit unlocks the lock unit. In an embodiment, the wireless communication module is further configured to receive the identity data of the first wireless device, wherein when the authenticating unit determines that the received the identity data of the first wireless device does not match any one of the identity data of the plurality of wireless devices, the authenticating unit does not transfer the identity data of the lock unit to the user terminal. In an embodiment, the first authentication data is generated by encrypting the identity data of the first wireless device and the identity data of the lock unit, the identity data of the first wireless device and the identity data of the lock unit are transferred from a cloud server or from the user terminal. In an embodiment, when the wireless communication module receives the unlock request signal from the user terminal, the wireless communication module further receives second authentication data from the user terminal, the second authentication data is generated by encrypting identity data of a second wireless device and the identity data of the lock unit, the authentication unit is configured to decrypt the second authentication data according to the identity data of the lock unit to obtain the identity data of the second wireless device, when the identity data of the second wireless device matches one of the identity data of the plurality of wireless devices, the authentication unit locks the lock unit. In an embodiment, the wireless communication module is further configured to receive the identity data of the second wireless device, wherein when the authenticating unit determines that the received identity data of the second wireless device do not match any one of the identity data of the plurality of wireless devices, the authenticating unit does not transfer the identity data of the lock unit to the user terminal. In an embodiment, the second authentication data is generated by encrypting the identity data of the second wireless device and the identity data of the lock unit, the identity data of the second wireless device and the identity data of the lock unit are transferred from a cloud server or from the user terminal. According to an embodiment of the present invention, a smart lock control method includes: providing a smart lock arranged on a vehicle, prestoring identity data of a plurality of wireless devices in the smart lock; when the smart lock receiving an unlock request signal from a user terminal, the smart lock transferring identity data of the smart lock to the user terminal; the smart lock receiving the first authentication data from the user terminal, wherein the first authentication data is generated by encrypting identity data of a first wireless device and the identity data of the smart lock; the smart lock decrypting the first authentication data according to the identity data of the smart lock to obtain the identity data of the first wireless device; and when the smart lock determining the identity data of the first wireless device matches one of the identity data of the plurality of wireless devices, the smart lock unlocking the vehicle. In an embodiment, the smart lock control method further includes: when the smart lock receiving the lock request signal from the user terminal, the smart lock transferring the identity data of the smart lock to the user terminal; the smart lock receiving second authentication data from the user terminal, wherein the second authentication data is generated by encrypting identity data of a second wireless device and the identity data of the smart lock; the smart lock decrypting the second authentication data according to the identity data of the smart lock to obtain the identity data of the second wireless device; and when the smart lock determining that the identity data of the second wireless match one of the identity data of the plurality of wireless devices, the smart lock locking the vehicle . In contrast to the prior art, the smart lock of the present invention is able to be unlocked for renting a public bicycle or to be locked for returning the public bicycle at any location with a specific wireless device, so as to improve the shortcoming of managing the conventional public bicycle needs to build a huge bicycle rack. In addition, the wireless communication technologies of the smart lock of the present invention do not include GPS, therefore the smart lock can improve the disadvantage that the positioning of the GPS-equipped public bicycles may be affected by the weather. Brief Description of the Drawings FIG. 1 illustrates a diagram showing function blocks of a smart lock of the present invention. FIG. 2 illustrates a diagram showing a first embodiment of the smart lock unlocking a vehicle according to a request from a user terminal. FIG. 3 illustrates a diagram showing the first embodiment of the smart lock locking the vehicle according to a request from the user terminal. FIG. 4 illustrates a diagram showing a second embodiment of the smart lock unlocking a vehicle according to a request from a user terminal. FIG. 5 illustrates a diagram showing the second embodiment of the smart lock locking the vehicle according to a request from the user terminal. FIG. 6 is a flowchart showing a smart lock control method of the present invention. Detailed Description Please refer to FIG. 1, which is a diagram showing function blocks of a smart lock of the present invention. As shown in FIG. 1, a smart lock 10 of the present invention includes a lock unit 12, a wireless communication module 14, a storage unit 16 and an authenticating unit 18. The smart lock 10 is configured to a vehicle. In the present embodiment, the smart lock 10 is arranged on a bicycle, and able to lock or unlock the bicycle through the lock unit 12. The wireless communication module 14 is configured to communicate with a user terminal. In the present embodiment, the user terminal can be a cellphone which communicates with the wireless communication module 14 of the smart lock 10 through Bluetooth or Near-field communication (NFC), but the present invention is not limited thereto. The user terminal 50 can also be a different device (e.g. a tablet) which communicates with the wireless communication module 14 through different communication protocols. The storage unit 16 is configured to prestore identity data. The authenticating unit 18 is electrically <connectedtothelockunit 12,thewirelesscommunicationmodule14andthestorageunit16 .Theauthenticatingunit18isconfigured toperforman authentication procedure with the user terminal to lock or to unlock the lock unit 12. Please refer FIG. 2, which is a diagram showing a first embodiment of the smart lock unlocking a vehicle according to a request from a user terminal. As shown in FIG. 2, when a user terminal 50 sends a unlock request signal to the smart lock 10, the wireless communication module 14 of the smart lock 10 is configured to receive the unlock request and then transfer identity data (e.g. an identity code) of the lock unit 12 to the user terminal 50. After the user receives the identity data of the lock unit 12 and confirm a target bicycle to unlock (or to rent), the user is able to find and get identity data of a first wireless device 60 through the user terminal 50. In the present embodiment, the first wireless device 60 is a Wi-Fi wireless router, and identity data of the Wi-Fi wireless router is a Media Access Control (MAC) address, but the present invention is not limited thereto. Wherein, the user terminal 50 does not need to have an internet connection with the first wireless device 60. The user terminal 50 is able to receive the MAC address of the first wireless device 60 through the Listening mode (also known as Sniffing Mode and Monitoring Mode) of Wi-Fi protocol, even the user terminal 50 not having the internet connection with the first wireless device 60. The first wireless device 60 can be arranged at a specific location (such as supermarkets, stores or other public places) to facilitate the user to rent or to return a bicycle 40. After the user terminal 50 receives the MAC address of the first wireless device 60, the user terminal 50 is able to transfer the MAC address and the identity data of the lock unit 12 to a cloud server 70. The cloud server 70 is configured to encrypt the MAC address of the first wireless device 60 and the identity data of the lock unit 12 transferred by the user terminal 50 according a predetermined algorithm (e.g. hash), to generate first authentication data and to transfer the first authentication data to the user terminal 50. After the user terminal 50 receives the first authentication data from the cloud server 70, the user terminal 50 is able to transfer the first authentication data to the wireless communication module 14 of the smart lock 10. The smart lock 10 is able to decrypt the first authentication data according to the predetermined algorithm and the identity data of the lock unit 12 to obtain the MAC address of the first wireless device 60 after the smart lock 10 receives the first authentication data. The storage unit 16 is configured to prestore MAC addresses of a plurality of wireless devices. After the first authentication data is decrypted by the authenticating unit 18, the authenticating unit 18 is configured to compare the MAC address of the first wireless device 60 with MAC addresses which is prestored in the storage unit 16. When the MAC address of the first wireless device 60 matches one of the MAC addresses prestored in the storage unit 16 (means that the user is at a location allowed to rent or return the bicycle 40). The authenticating unit 18 is able to unlock the lock unit 12. When the MAC address of the first wireless device 60 does not match any one of the MAC addresses prestored in the storage unit 16 (means that the user is at a location not allowed to rent or return the bicycle 40) . The authenticating unit 18 is not able to unlock the lock unit 12. In other words, when the user wants to unlock the bicycle 40, the user has to be located in the location around a specific wireless device, such that the user terminal 50 is able to receive identity data of the specific wireless device and to transfer the identity data of the specific wireless device to the cloud server 70 to generate first authentication data by encrypting. The first authentication data which is generated by encrypting the identity data of the specific wireless device is like a key for unlocking. The user terminal 50 is able to transfers the first authentication data to the smart lock 10 to unlock. In the present embodiment, the specific wireless device is a specific Wi-Fi wireless router. For example, the specific Wi-Fi wireless router can be provided by specific telecommunication provider, or can be set at specific locations such as at specific supermarkets or stores, such that the smart lock of the present invention has to be located around a specific location with a specific wireless device to be able to be unlock, but the present invention is not limited thereto. In addition, in the present embodiment, the first authentication data is generated by encrypting by the cloud server 70, but the present invention is not limited thereto. The first authentication data can also be generated by encrypting by the user terminal 50. Please refer to FIG. 3, which is a diagram showing the first embodiment of the smart lock locking the vehicle according to a request from the user terminal. As shown in FIG. 3, when the user had rented the bicycle 40 and is ready to return the bicycle 40, the user is able to sends a lock request signal to the smart lock 10 through the user terminal 50. Similar to the procedure of unlocking, the wireless communication module 14 of the smart lock 10 is configured to receive the lock request and then transfer the identity data of the lock unit 12 to the user terminal 50. After the user receives the identity data of the lock unit 12, the user is able to find and get identity data of a second wireless device 62 through the user terminal 50. In the present embodiment, the second wireless device 62 is a Wi-Fi wireless router which is different from the first wireless device 60 and the identity data of the second wireless device 62 is the MAC address of the second wireless device 62, but the present invention is not limited thereto. The user can also rent the bicycle 40 and return the bicycle 40 through a same MAC address of a Wi-Fi wireless router. In other words, the smart lock 10 is able be locked and unlocked at a same location. Similarly, after the user terminal 50 receives the MAC address of the second wireless device 62, the user terminal 50 is able to transfer the MAC address and the identity data of the lock unit 12 to a cloud server 70. The cloud server 70 is configured to encrypt the MAC address of the second wireless device 62 and the identity data of the lock unit 12 transferred by the user terminal 50 according a predetermined algorithm, to generate second authentication data and to transfer the second authentication data to the user terminal 50. After the user terminal 50 receives the second authentication data from the cloud server 70, the user terminal 50 is able to transfer the second authentication data to the wireless communication module 14 of the smart lock 10. The smart lock 10 is able to decrypt the second authentication data according to the predetermined algorithm and the identity data of the lock unit 12 to obtain the MAC address of the second wireless device 62 after the smart lock 10 receives the second authentication data. After the second authentication data is decrypted by the authenticating unit 18, the authenticating unit 18 is configured to compare the MAC address of the second wireless device 62 with MAC addresses which is prestored in the storage unit 16. When the MAC address of the second wireless device 62 matches one of the MAC addresses prestored in the storage unit 16 (means that the user is at a location allowed to rent or return the bicycle 40) . The authenticating unit 18 is able to lock the lock unit 12. When the MAC address of the second wireless device 62 does not match any one of the MAC addresses prestored in the storage unit 16 (means that the user is at a location not allowed to rent or return the bicycle 40) . The authenticating unit 18 is not able to lock the lock unit 12. Similarly, in the present embodiment, the second authentication data is generated by encrypting by the cloud server 70, but the present invention is not limited thereto. The second authentication data can also be generated by encrypting by the user terminal 50. In addition, the smart lock 10 is able to be in a temporary lock mode, after a user unlocks the smart lock 10 by the first authentication data and rent the bicycle 40. When the user has to temporarily leave the bicycle 40 and needs to lock the bicycle 40 (but does not want to return the bicycle 40), the user can switch the smart lock 10 to the temporary lock mode through the user terminal 50. When the smart lock 10 is switched to the temporary lock mode, the authenticating unit 18 does not need to receive and authenticate the second authentication data, the authenticating unit 18 is able to directly lock the lock unit 12. The user is able to sends the first authentication data again to the wireless communication module 14 of the smart lock 10 through the user terminal 50 to unlock the temporary lock mode of the smart lock 10. On the other hand, when renting or returning the bicycle 40, the user can also transfer Global Positioning System (GPS) data to the cloud server 70 through the user terminal 50, such that the cloud server 70 records the location where the bicycle 40 is rented or returned. Alternatively, the cloud server 70 can prestore locations of the plurality of wireless devices. When the user transfer the identity data of the plurality of wireless devices to the cloud server 70 for generating authentication data, the cloud server 70 is able to get the location of the bicycle through the locations of the plurality of wireless devices prestored in the cloud server 70, and the cloud server 70 is able to further provide locations of available bicycles to other users. According to the above arrangement, when a user wants to rent the bicycle 40, the user is able to receive the identity data of the first wireless device 60 and transfer the first authentication data to the wireless communication module 14 of the smart lock 10 through the user terminal 50. The authenticating unit 18 is able to unlock the bicycle 40 after the authenticating unit 18 determines the first wireless device 60 is one of the plurality of wireless devices. In addition, the user is able to receive the identity data of the second wireless device 62 and transfer the second authentication data to the wireless communication module 14 of the smart lock 10 through the user terminal 50. The authenticating unit 18 is able to lock the bicycle 40 after the authenticating unit 18 determines the second wireless device 62 is one of the plurality of wireless devices. The communication protocol between the user terminal and the smart lock of the present embodiment can be Bluetooth (or NFC) and Wi-Fi, and the cloud server is able prestore locations of the plurality of wireless devices, therefore when the bicycle 40 is rented or returned, the positioning location is not affected by the weather. Please refer to FIG. 4, which is a diagram showing a second embodiment of the smart lock unlocking a vehicle according to a request from a user terminal. As shown in FIG. 4, When the wireless communication module 14 of the smart lock 10 receives a unlock request from the user through the user terminal 50, the smart lock 10 is able to use the wireless communication module 14 to check if there is a specific wireless device around through Wi-Fi communication technology (e.g. through a listening mode of Wi-Fi) . For example, the smart lock 10 is able to check MAC addresses of wireless devices around and determine if any MAC address of wireless devices matches one of the MAC address prestored in the storage unit 16. When the smart lock 10 detects that there is no specific wireless device around (means that the user is at a location not allowed to rent or return the bicycle 40), the unlock request of the user terminal 50 is rejected by the authenticating unit 18 of the smart lock 10 (such as the smart lock 10 does not transfer the identity data of the lock unit 12 to the user terminal 50). When the smart lock 10 detects that the identity data of the first wireless device 60 matches one of the MAC address prestored in the storage unit 16 (means that the user is at a location allowed to rent or return the bicycle 40), the unlock request of the user terminal 50 is accepted by the authenticating unit 18 of the smart lock 10, and the wireless communication module 14 transfer the identity data of the lock unit 12 to the user terminal 50, to further receive the first authentication data from the user terminal 50. The authenticating unit 18 authenticates the first authentication data to further unlock the lock unit 12. Since the methods of generating the first authentication data and authenticating the first authentication data are similar to the first embodiment, related description is omitted herein for simplicity. Please refer to FIG. 5, which is a diagram showing the second embodiment of the smart lock locking the vehicle according to a request from the user terminal. As shown in FIG. 5, when the wireless communication module 14 of the smart lock 10 receives a lock request from the user through the user terminal 50, the smart lock 10 is able to use the wireless communication module 14 to check if there is a specific wireless device around through Wi-Fi communication technology. Similarly, when the smart lock 10 detects that there is no specific wireless device around (means that the user is at a location not allowed to rent or return the bicycle 40), the lock request of the user terminal 50 is rejected by the authenticating unit 18 of the smart lock 10 (such as the smart lock 10 does not transfer the identity data of the lock unit 12 to the user terminal 50) . When the smart lock 10 detects that the identity data of the second wireless device 62 matches one of the MAC address prestored in the storage unit 16 (means that the user is at a location allowed to rent or return the bicycle 40), the lock request of the user terminal 50 is accepted by the authenticating unit 18 of the smart lock 10, and the wireless communication module 14 transfer the identity data of the lock unit 12 to the user terminal 50, to further receive the second authentication data from the user terminal 50. The authenticating unit 18 authenticates the second authentication data to further lock the lock unit 12. Since the methods of generating second authentication data and authenticating second authentication data are similar to the first embodiment, related description is omitted herein for simplicity. The second embodiment of method of unlocking or locking the smart lock of the present invention is able to detect if there is specific wireless device around when receiving the unlock request or the lock request. The unlock request or the lock request will be rejected when there is no specific wireless device around, in order to prevent the user from trying to lock or unlock the smart lock and from wasting time. On the other hand, when the smart lock 10 is locking or unlocking the vehicle, the user terminal 50 or the smart lock 10 is further abletouploadunlockingtime or lockingtime (orrental time) tothecloud server 70,to further chargethe usera fee for usingthevehicle Please refertoFIG. 6,which isa flowchart 100showing a smart lock control method of the present invention. The smart lock control method of the present invention comprises the following steps: Step 110: Providing a smart lock arranged on a vehicle, prestoring identity data of a plurality of wireless devices in the smart lock; Step 120: When the smart lock receiving an unlock request signal from a user terminal, the smart lock transferring identity data of the smart lock to the user terminal; Step 130: The smart lock receiving the first authentication data from the user terminal, wherein the first authentication data is generated by encrypting identity data of a first wireless device and the identity data of the smart lock; Step 140: The smart lock decrypting the first authentication data according to the identity data of the smart lock to obtain the identity data of the first wireless device; and Step 150: When the smart lock determining the identity data of the first wireless device matches one of the identity data of the plurality of wireless devices, the smart lock unlocking the vehicle. In contrast to the prior art, the smart lock of the present invention is able to be unlocked for renting a public bicycle or to be locked for returning the public bicycle at any location with a specific wireless device, so as to improve the shortcoming of managing the conventional public bicycle needs to build a huge bicycle rack. In addition, the wireless communication technologies of the smart lock of the present invention do not include GPS, therefore the smart lock can improve the disadvantage that the positioning of the GPS-equipped public bicycles may be affected by the weather. Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims. Description of Symbol and Numerals 10smart lock12lock unit14wireless communication module16storage unit18authenticating unit40bicycle50user terminal60first wireless device62second wireless device70cloud server100flowchart 110 to 150 step
权利要求:
Claims (12) [1] Conclusions A smart lock, applicable to a vehicle, the smart lock comprising: a locking unit configured to lock or unlock the vehicle; a wireless communication module configured to communicate with a user terminal; a storage unit configured to pre-store identity data of a number of wireless devices; and an authentication unit electrically connected to the locking unit, the wireless communication module, and the storage unit; wherein when the wireless communication module receives an unlock request signal from the user terminal, the wireless communication module transmits identity data from the locking unit to the user terminal to further receive first authentication data from the user terminal, the first authentication data being generated by encrypting identity data from a first wireless device and the identity data of the locking unit, wherein the authentication unit is configured to decode the first authentication data according to the identity data of the locking unit to obtain identity data from the first wireless device, wherein when the identity data of the first wireless device matches one of the identity data of the number of wireless devices, the authentication unit unlocks the locking unit. [2] The smart lock of claim 1, wherein the wireless communication module is further configured to receive the identity data from the first wireless device, wherein when the authentication unit determines that the received identity data from the first wireless device does not match any of the identity data from the number of wireless devices, the authentication unit does not transfer the identity data of the locking unit to the user terminal. [3] The smart lock of claim 1, wherein the first authentication data is generated by encrypting the identity data of the first wireless device and the identity data of the latch unit, the identity data of the first wireless device and the identity data of the latch unit being transmitted from a cloud server or from the user terminal. [4] The smart lock of claim 1, wherein when the wireless communication module receives the unlock request signal from the user terminal, the wireless communication module further receives second authentication data from the user terminal, the second authentication data being generated by encrypting identity data from a second wireless device and the identity data of the locking unit, wherein the authentication unit is configured to decode the second authentication data according to the identity data of the locking unit to obtain the identity data of the second wireless device, wherein when the identity data of the second wireless device matches one of the identity data of the number of wireless devices, the authentication unit locks the locking unit. [5] The smart lock of claim 4, wherein the wireless communication module is further configured to receive the identity data from the second wireless device, wherein when the authentication unit determines that the received identity data from the second wireless device does not match any of the identity data from the number of wireless devices, the authentication unit does not transfer the identity data from the locking unit to the user terminal. [6] The smart lock of claim 4, wherein the second authentication data is generated by encrypting the identity data of the second wireless device and the identity data of the latch unit, the identity data of the second wireless device, and the identity data of the latch unit are transmitted from a cloud server or from the user terminal. [7] A method for controlling a smart lock, comprising: providing a smart lock applied to a vehicle, pre-storing identity data of a number of wireless devices in the smart lock; when the smart lock receives an unlock request signal from a user terminal, the smart lock transferring identity data from the smart lock to the user terminal; receiving the first authentication data from the user terminal by the smart lock, the first authentication data being generated by encrypting identity data of a first wireless device and the identity data of the smart lock; decoding the first authentication data according to the identity data of the smart lock by the smart lock to obtain the identity data of the first wireless device; and when the smart lock determines that the identity data of the first wireless device matches one of the identity data of the plurality of wireless devices, unlocking the vehicle through the smart lock. [8] The method for controlling a smart lock according to claim 7, further comprising: receiving the identity data of the first wireless device through the smart lock; and when the smart lock determines that the identity data of the first wireless device does not match any of the identity data of the plurality of wireless devices, the smart lock does not transfer the smart lock identity data to the user terminal. [9] The method of driving a smart lock according to claim 7, wherein the first authentication data is generated by encrypting the identity data of the first wireless device and the identity data of the smart lock, the identity data of the first wireless device and the identity data of the smart lock can be transferred from a cloud server or from the user terminal. [10] The method for driving a smart lock according to claim 7, further comprising: when the smart lock receives the lock request signal from the user terminal, the smart lock transfers the identity data of the smart lock to the user terminal; receiving second authentication data from the user terminal by the smart lock, the second authentication data being generated by encrypting identity data from a second wireless device and the identity data from the smart lock; decoding the second authentication data according to the identity data of the smart lock by the smart lock to obtain the identity data of the second wireless device; and when the smart lock determines that the identity data of the second wireless device matches one of the identity data of the plurality of wireless devices, locking the vehicle through the smart lock. [11] The method for controlling a smart lock according to claim 10, further comprising: receiving the identity data of the second wireless device through the smart lock; and when the smart lock determines that the identity data of the second wireless device does not match any of the identity data of the plurality of wireless devices, the smart lock does not transfer the smart lock identity data to the user terminal. [12] The method of controlling a smart lock according to claim 10, wherein the second authentication data is generated by encrypting the identity data of the second wireless device 5 and the identity data of the smart lock, the identity data of the second wireless device and the identity data of the smart lock being transferred from a cloud server or from the user terminal. 1/6
类似技术:
公开号 | 公开日 | 专利标题 US10771975B2|2020-09-08|Revocation of access credentials for a disconnected locking device CN107211245B|2020-09-04|Method and system for position tracking of a locking device US10403070B2|2019-09-03|Secure access to physical resources using asymmetric cryptography US20180007551A1|2018-01-04|Wireless access authentication US8880036B2|2014-11-04|Retrieving data wirelessly from a mobile device EP2630816B1|2020-01-08|Authentication of access terminal identities in roaming networks US7231521B2|2007-06-12|Scheme for authentication and dynamic key exchange US8191124B2|2012-05-29|Systems and methods for acquiring network credentials US8706083B2|2014-04-22|Bluetooth authentication system and method KR101315670B1|2013-10-08|Method for smart phone registration when accessing security authentication device and method for access authentication of registered smart phone US20030051140A1|2003-03-13|Scheme for authentication and dynamic key exchange US8165565B2|2012-04-24|Method and system for recursive authentication in a mobile network JP5276593B2|2013-08-28|System and method for obtaining network credentials EP2756699A1|2014-07-23|Wireless communication using concurrent re-authentication and connection setup CN102150446A|2011-08-10|Authentication in a communication network CN104952128A|2015-09-30|Intelligent handheld terminal based electronic unlocking system and unlocking method thereof US10212144B2|2019-02-19|Digital credential with embedded authentication instructions US8234497B2|2012-07-31|Method and apparatus for providing secure linking to a user identity in a digital rights management system CN103152326A|2013-06-12|Distributed authentication method and authentication system NL2021523B1|2019-06-13|Smart lock and control method of smart lock AU2018216158B2|2020-02-27|Methods and systems for connecting a wireless communications device to a deployable wireless communications network US20170006657A1|2017-01-05|Secure triggering in a network CN113168441A|2021-07-23|Authentication of users of software applications
同族专利:
公开号 | 公开日 CN109472890B|2021-01-01| JP2019049186A|2019-03-28| TWI629401B|2018-07-11| CN109472890A|2019-03-15| JP6580765B2|2019-09-25| NL2021523B1|2019-06-13| TW201912909A|2019-04-01|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US20140266588A1|2013-03-15|2014-09-18|Mesh Motion, Inc.|Peer-to-peer bike sharing system| US20150002310A1|2013-07-01|2015-01-01|Continental Automotive Systems, Inc.|Simple and reliable home location identification method and apparatus| US9654481B1|2015-04-25|2017-05-16|Tp Lab, Inc.|Location based secure data device| WO2016191768A1|2015-05-28|2016-12-01|Friday Labs Limited|Apparatus and system for an electronic lock, and methods of use and manufacture thereof| CN106658417A|2017-03-08|2017-05-10|天津乾丰机电设备有限公司|Shared bicycle returning method and system based on wireless positioning base station| US9761071B2|2014-04-29|2017-09-12|Showingtime.Com, Inc.|Integrated real estate showing scheduling and key management system| CN105185019B|2015-07-28|2017-08-25|上海行践公共自行车有限公司|A kind of public bicycles management of leasing method and system of radio management| CN204926315U|2015-09-11|2015-12-30|赛酷特信息技术有限公司|Intelligence lock system and because public bicycle system of hiring a car of this system| CN205365825U|2015-12-14|2016-07-06|山东科技大学|Public bicycle intelligence lock control system based on NFC technique| CN106251431A|2016-06-14|2016-12-21|王东升|Share bicycle cloud platform focus unlocking method| CN206367531U|2016-12-12|2017-08-01|江门市雷特诺克物联网科技有限公司|Bicycle lock and car rental system| CN206370125U|2016-12-12|2017-08-01|江门市雷特诺克物联网科技有限公司|Intelligent cipher lock and the car rental system based on cloud service| CN206351676U|2016-12-15|2017-07-25|连宁|The vehicles and leasing system for lease| CN107054295B|2016-12-20|2019-05-03|苏州达方电子有限公司|Bicycle antitheft system and bicycle unlocking method| CN106779980A|2017-01-23|2017-05-31|上海量明科技发展有限公司|Judge method, client and the system of the unblock operation of shared vehicle| CN107093158B|2017-02-28|2018-05-15|成都西谷曙光数字技术有限公司|Share bicycle intelligent management system and method in a kind of city based on IoT technologies| CN106898074A|2017-03-24|2017-06-27|上海易码信息科技有限公司|A kind of shared bicycle smart lock and its cloud unlocking system and method| CN107045743A|2017-03-31|2017-08-15|天津大学|Joint NFC and fingerprint technique a kind of public bicycles lock control method|
法律状态:
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 TW106130862A|TWI629401B|2017-09-08|2017-09-08|Smart lock and control method of smart lock| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|