CN114863599A - Access control system based on RFID and NB-IoT and control method thereof - Google Patents

Access control system based on RFID and NB-IoT and control method thereof Download PDF

Info

Publication number
CN114863599A
CN114863599A CN202210360456.3A CN202210360456A CN114863599A CN 114863599 A CN114863599 A CN 114863599A CN 202210360456 A CN202210360456 A CN 202210360456A CN 114863599 A CN114863599 A CN 114863599A
Authority
CN
China
Prior art keywords
module
rfid
unlocking
iot
main control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210360456.3A
Other languages
Chinese (zh)
Inventor
王德明
程锦涛
陆其荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China Normal University
Original Assignee
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Normal University filed Critical South China Normal University
Priority to CN202210360456.3A priority Critical patent/CN114863599A/en
Publication of CN114863599A publication Critical patent/CN114863599A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0264Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by selectively disabling software applications
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an entrance guard system based on RFID and NB-IoT and a control method thereof, which can be applied to the technical field of entrance guard. The system controls the on-off state of a target lock through an unlocking module, identifies IC card information through an RFID identification module, and sets a STOP mode and a normal operation mode on a main control module, so that the main control module is in the STOP mode when unlocking request information or the IC card information is not received; the main control module enters a normal operation mode from a STOP mode when receiving unlocking request information or IC card information and controls the unlocking module to execute unlocking action according to the unlocking request information; meanwhile, the NB-IoT communication module is respectively connected with the main control module and the server, so that when the main control module receives the IC card information, the server can remotely control the unlocking module to execute unlocking action, and the working energy consumption of the whole system is saved when the unlocking process is effectively controlled.

Description

Access control system based on RFID and NB-IoT and control method thereof
Technical Field
The invention relates to the technical field of access control, in particular to an access control system based on RFID and NB-IoT and a control method thereof.
Background
In the related art, the intelligent access control system can provide convenience for users in daily life, and meanwhile, the intelligent access control system comprises a plurality of functional components. When the intelligent access control system is applied to actual access control, all functional components in the intelligent access control system are in working states, and certain loss exists in the functional components in the working states, so that the whole power consumption of the intelligent access control system is large.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention provides an entrance guard system based on RFID and NB-IoT and a control method thereof, which can effectively reduce the power consumption of the system.
In one aspect, an embodiment of the present invention provides an access control system based on RFID and NB-IoT, including:
the unlocking module is used for controlling the on-off state of the target lock;
the RFID identification module is used for identifying IC card information;
the unlocking module and the RFID identification module are both connected with the main control module, and the working modes of the main control module comprise a STOP mode and a normal operation mode; when the master control module does not receive unlocking request information or the IC card information, the master control module is in the STOP mode; when the master control module receives the unlocking request information or the IC card information, the master control module enters the normal operation mode from the STOP mode and controls the unlocking module to execute unlocking action according to the unlocking request information;
the NB-IoT communication module is respectively connected with the main control module and the server and is used for sending the IC card information received by the main control module to the server; and after verifying that the IC card information passes, the server controls the unlocking module to execute unlocking action.
In some embodiments, the master control module comprises a master control sub-module, a first oscillation circuit, a plurality of resistors and a plurality of capacitors;
the first oscillating circuit, the plurality of resistors and the plurality of capacitors are all connected with the main control submodule, and the main control submodule is respectively connected with the unlocking module and the RFID identification module.
In some embodiments, the main control sub-module is provided with an SPI communication mode interface and a UART/USART communication mode interface.
In some embodiments, the operation mode of the RFID identification module includes an LPCD mode, and the RFID identification module detects whether the IC card approaches a preset identification range in the LPCD mode.
In some embodiments, the RFID identification module comprises an RFID processing module, a second tank circuit, a pull-up resistor, and an antenna circuit;
the second oscillating circuit, the pull-up resistor and the antenna circuit are all connected with the RFID processing module, and the antenna circuit is used for detecting whether the IC card is close to a preset identification range.
In some embodiments, the VBAT input of the NB-IoT communication module is connected in parallel with an energy storage capacitor and a filter capacitor.
In some embodiments, the NB-IoT communications module communicates with the server through USIM circuitry.
In some embodiments, the system further comprises:
and the key module is connected with the main control module and is used for acquiring key information input in real time.
In some embodiments, the system further comprises:
and the power supply module is used for providing a working power supply for the access control system.
On the other hand, the embodiment of the invention provides a control method of an access control system based on RFID and NB-IoT, which comprises the following steps:
initializing a main control module of the access control system, and setting the main control module, the RFID identification module and the NB-IoT communication module of the access control system to enter a preset working mode;
determining to receive an interrupt request, and controlling the NB-IoT communication module to connect with a server;
determining that the interrupt request is an external interrupt request and the master control module receives unlocking request information, and controlling an unlocking module of the access control system to execute unlocking action according to the unlocking request information through the master control module;
alternatively, the first and second electrodes may be,
and determining that the interrupt request is a card searching interrupt request, the main control module receives the IC card information identified by the RFID identification module, the NB-IoT communication module sends the IC card information to the server from the main control module, and the server controls the unlocking module to execute unlocking action.
The access control system based on the RFID and the NB-IoT has the following beneficial effects that:
in this embodiment, the set unlocking module controls the on-off state of the target lock, the set RFID identification module identifies the IC card information, and the STOP mode and the normal operation mode are set on the main control module, so that the main control module is in the STOP mode when the unlocking request information or the IC card information is not received; the main control module enters the normal operation mode from the STOP mode when receiving the unlocking request information or the IC card information, and controls the unlocking module to execute unlocking action according to the unlocking request information; meanwhile, the NB-IoT communication module is respectively connected with the main control module and the server, so that when the main control module receives the IC card information, the IC card information can be forwarded to the server from the main control module, the server can remotely control the unlocking module to execute unlocking action, and therefore when the unlocking process is effectively controlled, the working energy consumption of the whole system is saved by setting different working modes.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The invention is further described with reference to the following figures and examples, in which:
fig. 1 is a schematic structural diagram of an RFID and NB-IoT based access control system according to an embodiment of the present invention;
fig. 2 is a schematic circuit diagram of a main control module according to an embodiment of the present invention;
FIG. 3 is a schematic circuit diagram of an RFID identification module according to an embodiment of the present invention;
fig. 4 is a flowchart of a control method of an RFID and NB-IoT based access control system according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating an application of fig. 4 according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
In the description of the present invention, it should be understood that the orientation or positional relationship referred to in the description of the orientation, such as the upper, lower, front, rear, left, right, etc., is based on the orientation or positional relationship shown in the drawings, and is only for convenience of description and simplification of description, and does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention.
In the description of the present invention, the meaning of a plurality is one or more, the meaning of a plurality is two or more, and the above, below, exceeding, etc. are understood as excluding the present numbers, and the above, below, within, etc. are understood as including the present numbers. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
In the description of the present invention, unless otherwise explicitly limited, terms such as arrangement, installation, connection and the like should be understood in a broad sense, and those skilled in the art can reasonably determine the specific meanings of the above terms in the present invention in combination with the specific contents of the technical solutions.
In the description of the present invention, reference to the description of the terms "one embodiment," "some embodiments," "an illustrative embodiment," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Referring to fig. 1, an embodiment of the present invention provides an RFID and NB-IoT based access control system, including an unlocking module, an RFID identification module, a main control module, and an NB-IoT (narrow Band Internet of things) communication module. The unlocking module is used for controlling the on-off state of the target lock; the RFID identification module is used for identifying IC card information; the unlocking module and the RFID (radio Frequency identification) identification module are both connected with the main control module, and the working modes of the main control module comprise a STOP mode and a normal operation mode; when the master control module does not receive unlocking request information or the IC card information, the master control module is in the STOP mode; when the master control module receives the unlocking request information or the IC card information, the master control module enters the normal operation mode from the STOP mode and controls the unlocking module to execute unlocking action according to the unlocking request information; the NB-IoT communication module is respectively connected with the main control module and the server and is used for sending the IC card information received by the main control module to the server; and after verifying that the IC card information passes, the server controls the unlocking module to execute unlocking action.
In the embodiment of the present application, as shown in fig. 1 and fig. 2, the main control module includes a main control sub-module U1, a first oscillation circuit, a plurality of resistors, and a plurality of capacitors; the first oscillating circuit, the plurality of resistors and the plurality of capacitors are all connected with the main control submodule, and the main control submodule is respectively connected with the unlocking module and the RFID identification module. Specifically, as shown in fig. 2, the first oscillation circuit includes a first crystal oscillator X1, a first capacitor C1, and a second capacitor C2. The resistors and the capacitors are arranged at corresponding circuit positions. In this embodiment, an existing integrated chip may be selected as the main control sub-module of this embodiment, for example, an integrated chip of the model STM32L151C8T6 is selected as the main control sub-module of this embodiment. In some embodiments, when the system is in the standby mode, the main control sub-module is in the STOP operating mode with an rtc (real Time clock) clock, and the main control sub-module does not end the STOP operating mode to enter the normal operating mode until the external RFID identification module returns to the card-searching interrupt. Therefore, the main control sub-module of the embodiment is in the STOP operating mode most of the time, and waits for the return of the card searching interrupt with ultra-low power consumption, so that the power consumption of the main control module is greatly reduced.
In this embodiment, the power consumption of the main control module is increased due to unnecessary current loss caused by the addition of the peripheral devices. Therefore, in the present embodiment, on the premise that the main control sub-module meets the requirement, only the first oscillation circuit, the plurality of resistors and the plurality of capacitors are added in the circuit, so that the power consumption of the system is reduced. In some embodiments, the crystal oscillator in the first oscillation circuit may select an 8MHz crystal oscillator to provide an external clock for the master sub-module. Meanwhile, the SPI communication mode interface and the UART/USART communication mode interface are arranged on the main control sub-module, and calling and secondary development of subsequent systems are facilitated. For example, in this embodiment, data interaction may be performed with the upper computer through a USART (Universal Synchronous/Asynchronous Receiver/Transmitter) communication mode interface, so that data sent by the upper computer may be received effectively in time.
For example, when an integrated chip of model STM32L151C8T6 is selected as the main control sub-module, the main control sub-module is externally connected to an 8MHz passive crystal oscillator to form a high-speed external (HSE) clock, and a register related to the microprocessor is configured and multiplied by a phase locked loop (pll) to form a 48MHz USB clock and a 32MHz system clock. The main control sub-module is in high-speed communication with the radio frequency chip through an SPI interface and is connected with an IRQ pin of an FM17550 through a PA1 pin, and the interruption state change and the card reading information of the main control sub-module are monitored in real time; and the UASRT serial interface is communicated with the communication module, and card number information is sent and a locking and unlocking command is received. In this embodiment, unnecessary current loss can be reduced by simplifying the remaining circuits and using low-power-consumption elements.
In the embodiment of the application, the working mode of the RFID identification module includes an LPCD (radio Frequency identification) mode, and the RFID identification module detects whether the IC card is close to a preset identification range in the LPCD mode. Specifically, in the present embodiment, an existing integrated chip may be selected as a component of the RFID identification module, for example, FM17550 is selected as a component of the RFID identification module, and the RFID identification module is set to be in the LPCD mode most of the time, that is, the RFID identification module is set to be capable of monitoring whether an external non-contact IC card approaches with extremely low standby power consumption at the micro-ampere level when applied to a card reader. When the RFID identification module is in LPCD mode, its power consumption is only 3 microamps. An SPI (serial Peripheral interface) interface is arranged on the RFID processing module U2 to perform data interaction with the main control module through the SPI interface, thereby improving the speed and efficiency of data interaction.
Specifically, as shown in fig. 3, the RFID identification module includes an RFID processing module U2, a second oscillation circuit, a pull-up resistor, and an antenna circuit; the second oscillating circuit, the pull-up resistor and the antenna circuit are all connected with the RFID processing module, and the antenna circuit is used for detecting whether the IC card is close to a preset identification range. Specifically, as shown in fig. 3, the second oscillation circuit includes a second crystal oscillator X2, a third capacitor C3, and a fourth capacitor C4 to reduce clock jitter. And, a pull-up resistor R1 is arranged on a designated pin of the RFID processing module U2, so that the timeliness of interrupt wakeup is improved.
For example, when an FM17550 reader-writer chip is selected as the RFID identification module, the FM17550 reader-writer chip is a highly integrated non-contact communication chip operating at 13.56 MHz. Compared with other chips of NXP, TI and AMS companies, the chip has the characteristics of low voltage, low power consumption, strong driving capability, multi-protocol, interface support and the like; the external communication interface is in an SPI mode, so that the communication speed is high and the anti-interference capability is strong; under the LPCD mode of the chip, the system can provide an external card detection function with ultra-low power consumption, can ensure that the card is awakened to enter a card reading state at any time, and has extremely high real-time property. Therefore, the average current consumption of the product in the LPCD mode is 10 muA, the typical value of the working current is 10mA, and the product is very suitable for the application of radio frequency identification circuits with low power consumption.
In fig. 3, the antenna circuit includes an EMC filter circuit, a receiving circuit, and a matching circuit, and the present embodiment employs a square antenna. The main function of the EMC filter circuit is to filter out EMI electromagnetic interference noise in the system. In a receiving circuit, the direct current input voltage of an Rx pin needs to be kept at Vmid through oscillation amplitude, and meanwhile, the alternating current input voltage of the Rx pin is adjusted. The purpose of the matching circuit is to adjust the resonant frequency of the radiating part of the antenna to around 13.56MHz so that the increase in the amplitude of the signal on the coil is beneficial for the radiation of the magnetic field, matching the impedance of the current environment to the antenna. The impedance of the matching circuit can be adjusted according to different antennas and environments, so that the best effect is achieved. Specifically, the EMC filter circuit may use a low pass filter with a cutoff frequency of 23.215MHz (14.528MHz) consisting of a 1uH inductance and a 47pF (120pF) capacitance for filtering out derived harmonics above 13.560 MHz.
In the embodiment of the present application, the NB-IoT communication module may adopt an existing integrated chip, for example, a chip of BC28 model. The BC28 type chip supports multiple communication protocols such as UDP/CoAP/TCP/MQTT and multiple communication bands such as B1/B3/B5/B8/B20/B28B, and has three power-saving modes: power Saving Mode (PSM), Disconnectiou Reception (DRX), and enhance Disconnectiou Reception (eDRX). The PSM (Power Saving mode) mode carried by the battery module can greatly reduce the power consumption of the module, the current consumption is only 5 muA, and the power supply time of the battery is prolonged. When the NB-IoT communication module is in the PSM mode, the terminal can only awaken the current deep sleep state by actively sending uplink data, otherwise, the terminal cannot receive downlink data, so that the terminal closes most internal circuits in the PSM mode, and the ultra-low power consumption is achieved. In this embodiment, in order to enable the NB-IoT communication module to operate normally, an energy storage capacitor and a filter capacitor are connected in parallel to the VBAT input terminal of the NB-IoT communication module to provide a stable current for the normal operation of the chip of BC28 model. Since the NB-IoT communication module communicates with the backend server by networking, the NB-IoT communication module of the present embodiment communicates with the server via the USIM circuit. And, the signal is grounded through the capacitance of 30pF for ESD protection, prevent the electrostatic breakdown. When wiring, the signal line of the SIM card is separated from other high-speed signal lines so as not to cause interference. The power line and the reset line can both select a capacitance of 100nF-1uF for filtering, so that the module can stably work.
Specifically, a self-elastic USIM card seat is adopted in the NB-SIM circuit. The signal line is grounded through a 30pF capacitor to carry out ESD protection, so that electrostatic breakdown is prevented, and radio frequency interference is filtered; and a resistor is connected between the signal wire and the module for reducing the serial port current.
In the embodiment of the present application, since both the RFID module and the NB-IoT module have antennas, there may be some interference. However, the frequency band analysis shows that the frequency band of the RFID module antenna is located at 13.560MHz, and the frequency band of the NB-IoT module antenna is located at B5-850 MHz, which has a longer guard band, and Co-Channel Interference (CCI) 12 is almost zero. To avoid the possible different frequency interference, the present embodiment extends the antenna of the NB-IoT module using the RF connector and the IPEX antenna to be far away from the coverage surface of the RFID module loop antenna.
In the application process, the present embodiment can be divided into four states by using a state machine system: INITIAL, PSM, START, WAIT.
After the system is started, the system is in an INITIAL state and initialized; then, the system is in a PSM state for most of time and is in standby with extremely low power consumption, so that the realization of the overall low power consumption of the system is realized; the START state is entered only when the system has an Interrupt Request (IRQ) or is periodically woken up; after the specific instruction is completed, the WAIT state is entered, in which if IRQ appears again, the START state is returned, otherwise, the PSM state is entered after the NB-IoT module timer is expired.
In the state of INITIAL, the system initializes and configures an SPI interface, an UASRT interface and an embedded vector Interrupt Controller (NVIC) in the MCU, so that the MCU works normally; then, sending an AT instruction to the NB-IoT module through the UASRT interface to initialize and access the network; and the RFID register is modulated through the SPI interface to configure, initialize and adjust the LPCD mode.
Next, the system enters a PSM state, the MCU enters a STOP mode, and ports except the IRQ receiving port and a clock thereof are closed; the RFID module enters into LPCD mode, and the NB-IoT module enters into PSM mode. The overall system waits for the IRQ. When an external IRQ (human is detected by the infrared module) or a card searching IRQ is input into the system, the system enters a START state. The MCU is awakened, and sends an AT command to enable the NB-IoT module to be connected with the back-end server and identify the IRQ type. If the IRQ type is that the card searching of the RFID module is successful and the output is interrupted, the MCU sends the card number to the back-end server, and the back-end server verifies whether the card number is the corresponding access control binding card number. If the card number is successfully verified by the back-end server, an unlocking permission command is sent to the access control terminal, and after the access control terminal receives the unlocking command, the MCU executes unlocking operation. If the IRQ type is external interruption, the MCU module waits for a user to send an unlocking application through the Web end, and if an unlocking command is received, the MCU executes unlocking operation.
The system enters the WAIT state after not interacting with the backend server. In this state, the START state is returned if the next IRQ is generated or interaction with the backend server is performed again. Otherwise, waiting for the Active Timer to time out, and entering the PSM state.
In this embodiment, the MCU mainly performs write configuration on the remaining two parts:
first point, set for NB-IoT:
the MCU module is communicated with the NB-IoT module through the UART interface and sends an AT instruction to enable the NB-IoT module to complete functions of network access, PSM mode configuration, interaction with a back-end server and the like.
For NB-IoT module networking settings: NB-IoT initialization and network access setup procedure, first NB-IoT module acknowledges power-up, then sends AT + FUN? The command queries the UE functionality. The return command is + CFUN: < fun > is successful, then an AT + CIMI command is sent to inquire the current IMSI (International Mobile Subscriber Identity) number, and the return command is < IMSI >. Is AT + cerg sent after success is returned? Ordering to inquire the network registration state, returning instructions of + CEREG: < n >, < stat >, sending AT + CGAGT ═ 1 to activate the network, and then sending AT + CGAGT? And commanding to inquire the activation state, returning a command of + CGATT: < state >, if the return parameter < state > is 1, indicating that the network is successfully activated, and the NB-IoT module successfully accesses the network to complete the communication with the public network.
For PSM mode configuration: the module is required to be specially configured to be used for the current lowest power consumption working mode of NB-IoT. And the NB-IoT module in the PSM mode enters an idle state, closes the signal terminal, and stops transmitting and receiving data until being awakened again. The terminal can reduce energy consumption to the utmost extent in the shutdown mode, and only part of the electronic devices are reserved for working. Meanwhile, in this mode, the network and the user equipment are approximately disconnected, and the equipment enters a shutdown-like state and cannot accept data and requests from the network, but actually, the equipment is still registered in the network, state information in a network memory is still reserved, and the access layer connection is closed. After the device is actively awakened through the serial port, the device can quickly enter a working mode through being connected with the network resume PRC without other connections, and quick switching between a power saving mode and the working mode is realized. The PSM mode requires transmission of an AT command, wherein the mode needs to be configured as PSM enabled, requesting allocation of an extension period TAU value (T3412) to a UE in E-UTRAN, and finally requesting an active time value (T3324) allocated to the UE.
For NB-IoT module interactions with the backend server: the NB-IoT and the back-end server complete a complete TCP information interaction process, firstly a randomly distributed socket needs to be established with the back-end server, the socket is connected with the server after the establishment is successful, TCP connection is established after the connection is successful, then data interaction between the door lock microcontroller and the back-end server can be completed, and the connection socket is closed after data transmission is completed.
Second, for RFID settings:
introduction of LPCD mode: the LPCD principle is that the chip detects the card swiping action on the antenna by detecting the amplitude change of the LPCD detection signal on the antenna. Under the condition that the antenna is idle, the LPCD detection signals sent by the chip every time are the same in amplitude; when a card is close to the antenna, the amplitude of the LPCD detection signal can be changed due to the mutual inductance of the antenna. The amplitude change is related to the shape, size and resonant frequency of the antenna, and when the shape, size and static resonant frequency of the antenna and the card are close to 14MHz, the mutual inductance effect is strong, and the LPCD detection effect is good.
LPCD mode configuration: and the MCU writes in the RFID module register through the SPI interface and configures the setting of the LPCD mode related expansion register. The data writing mode of the extended register is 4 steps:
step 1, write the 0F register, set to communication write mode (set to write mode according to the interface specification of SPI/UART/I2C);
step 2, writing a secondary address (01b +6 bit secondary address) of the target extension register;
step 3, writing a 0F register, setting to a communication write mode (setting to a write mode according to the interface specification of SPI/USART/I2C);
and step 4, writing data (11b +6 bits of target data) of the target extension register.
In an embodiment of the present application, the system further includes a key module, where the key module is connected to the main control module and is configured to collect key information input in real time. When the user does not carry the IC card or the key, the preset secret key can be input through the secret key module to unlock, so that the unlocking flexibility is improved.
In an embodiment of the present application, the system further includes a power module, where the power module is configured to provide an operating power for the access control system. Specifically, the embodiment may select an LDO with a regulated voltage value of 3.3V to regulate and supply power to the entire hardware system.
In addition, referring to fig. 4, an embodiment of the present invention provides a method for controlling an access control system based on RFID and NB-IoT, including the steps of:
step 410, initializing a main control module of the access control system, and setting the main control module, the RFID identification module and the NB-IoT communication module of the access control system to enter a preset working mode; specifically, the preset operation mode of the main control module includes a STOP operation mode, the preset operation mode of the RFID identification module includes an LPCD operation mode, and the preset operation mode of the NB-IoT communication module includes a PSM mode. The LPCD working mode can provide an external card monitoring function with ultra-low power consumption, and ensures that the card is awakened to enter a card reading state at any time.
Step 420, determining that an interrupt request is received, and controlling the NB-IoT communication module to be connected with a server;
step 430, determining that the interrupt request is an external interrupt request and the main control module receives unlocking request information, and controlling an unlocking module of the access control system to execute unlocking action according to the unlocking request information through the main control module;
alternatively, the first and second electrodes may be,
step 440, determining that the interrupt request is a card searching interrupt request, and the master control module receives the IC card information identified by the RFID identification module, sending the IC card information from the master control module to a server through an NB-IoT communication module, and controlling the unlocking module to execute an unlocking action through the server.
Specifically, for the control method of fig. 4, in the application process, as specifically shown in fig. 5:
firstly, initializing and configuring an SPI (serial peripheral interface), a UART (universal asynchronous receiver/transmitter) interface and an NVIC (embedded vector Interrupt Controller) inside the MCU so that the MCU works normally; then, an AT instruction is sent to the NB-IoT module through the UART interface to enable the NB-IoT module to initialize and access the network; and the RFID register is modulated through the SPI interface to configure, initialize and adjust the LPCD mode. Then, the MCU module enters a STOP mode, the RFID module enters an LPCD mode, the NB-IoT module enters a PSM mode, and the entire system waits for an Interrupt ReQuest (IRQ).
If the RFID module successfully searches the card, the card number is acquired and the IRQ is output, the MCU module is awakened, the AT command is sent to enable the NB-IoT module to be connected with the back-end server, the card number is sent to the back-end server, and the back-end server verifies whether the card number is the corresponding access control binding card number. If the card number is successfully verified by the back-end server, an unlocking permission command is sent to the access control terminal, and after the access control terminal receives the unlocking command, the MCU executes unlocking operation. After a certain unlocking time, the connection between the MCU module and the server is actively closed, the MCU module enters the STOP mode again, the RFID module enters the LPCD mode again, the NB-IoT enters the PSM mode again, the whole system enters the standby mode again, and the next interrupt application is waited.
If the door lock terminal receives external interruption, the MCU module is awakened, the AT command is sent to enable the NB-IoT module to be connected with the rear-end server, a user is waited to send an unlocking application through the Web end, if the unlocking command is received, the MCU executes unlocking operation, the unlocking application cannot be received after a certain unlocking time or a certain time, the connection with the server is actively closed, the MCU module enters the STOP mode again, the RFID module enters the LPCD mode again, the NB-IoT enters the PSM mode, the whole system enters the standby mode again, and the next interruption application is waited.
In the embodiment of the present application, for the system control of fig. 1, a front-end and back-end separated control manner may also be adopted. Specifically, the front end exists independently as a project, and access is realized through multiple local tests and post-deployment to the nginx server. The front end is mainly responsible for loading static resources, and the background provides relevant data for the front end. Considering the problem that most of the front ends need to perform data display and visual analysis, the system adopts the vue.js library to realize bidirectional data binding, and extracts data from the background and renders the data to the page to realize data updating. All the View rendering data is stored in the ViewModel, and when the data needs to be acquired from the background, the Model and the background perform data interaction, and meanwhile, the Model can also perform some front-end logic processing. And an anti design of vue third-party component library is used on the aspect of UI, and the whole is simple wind. Meanwhile, data obtained through the background is combined with echarts to perform data visualization analysis, and corresponding charts are made to be rendered and displayed, so that the visual perception of the user on the data is enhanced.
In this embodiment, the background performs data transmission with the hardware end through the TCP protocol, so as to manage the door lock. The front end classifies users into common users and super management users through user research, scene simulation and discussion analysis. The ordinary user can monitor the door lock in real time and manage the door lock on line. The super management user has the highest management authority, can manage all accounts and all door locks, and checks related important log information. The general functions of the system mainly comprise: the method comprises the steps of user login registration, personal information modification, door lock state checking, door lock management, door lock daily log checking and the like. The super management account can carry out unified management on users, door locks and door cards, and comprises the steps of modifying the door locks under specific users, checking TCP (transmission control protocol) logs of the door locks, carrying out door lock on the door cards, binding the users and the like.
The front end runs in a nodeJS environment, rapid embarkation is realized through Vue-cli, relevant configuration in Webpack is modified, and local development test and server deployment can be conveniently realized. Vue-router is well able to link the individual pages to form the individual functional modules. The front end may include: the system comprises a login module, a registration module, a personal information module, a door lock general profile module, a door lock management module, a daily log module, a door lock management (root) module, a TCP log query module and a user card number management module.
For the login module, the user name inputs an account password, the verification code is input for verification, the background can carry out authority verification according to submitted login information, and if the login is successful, a token is returned to serve as a token of a subsequent request interface. And carrying the token to carry out authority verification every time of data request, and returning to the login page to log in again if the token is invalid or the authority verification fails.
And for the registration module, the module is used for registering the door lock user and is identified as a common user by default. The user can customize the account password according to actual conditions, and simultaneously select and bind the mobile phone number and the mailbox, and the mobile phone number and the mailbox are encrypted and transmitted into the database, so that the super manager can conveniently contact related users. And if the mobile phone number is bound or the account number is registered, returning to the registration page.
For the door lock profile module, a user can consult the door lock profile through related operations and perform information interaction with a back-end server through a browser. The door lock profile module is used for checking the recent use condition of the owned door lock under the name of the current user, including the number of the owned locks of the user, the status profile of the current lock and the switch condition of the door lock in recent days. For example, the number of the currently enabled door locks and the number of the disabled door locks of the device can be displayed, and the number of times of unlocking the device frequently used recently and the tree diagram of the time period of the recently switched door locks can be displayed.
For the door lock management module, the door lock management module is a main interface for managing the door lock by a common user, and can perform operations of inquiring, opening and closing the door lock through a specific API. In the module, a user can check the related detailed information of the door lock, including the equipment ID, the position, the state and the time of the last operation on the door lock, and perform the on-off operation on the door lock, so as to realize the on-line remote locking and unlocking.
For the daily log module, the daily log module comprises an operation log and a state log, and the user log can be inquired and modified through an API. The operation log is used for displaying the opening and closing operation record of the door lock at the webpage end, and the state log is used for displaying the operation record of the door lock end. The user can check which device has been operated by the user at a specific time point through the board, and when a fault occurs, the board can be used for troubleshooting. Meanwhile, the user can insert a screening group, and can perform screening query according to the equipment ID and corresponding time and delete the related logs.
For a door lock management (Root) module, the door lock management (Root) module is defined as a super management authority module, and only a super management account can use the functions of the module. The current module can add a door lock for a common user and fill in related information (including equipment ID, position and the like). Meanwhile, the super management user can inquire all door locks of a specific user through the module, and log off the corresponding door lock of the specific user or manage the bound card number. If the super management needs to search all the door locks registered on line at present, the module can also be inquired, and the inquired information comprises the equipment ID, the affiliated user, the position, the state, the last operation time and the like.
For the TCP log query module, the TCP log query module is defined as a super management authority module, and can query all operation door locks and logs of the operation door locks through an API (application programming interface), and only a super management account can use the functions of the module. The functional board is special for testing and maintenance. The communication information between the background and the hardware end can be viewed in the module.
For the user card number management module, the user card number management module is defined as a super management authority module, and only a super management account can use the functions of the super management authority module. The module operates primarily on the relationship between the user and the card number. The super management user can bind the door card on a specific user and also can unbind the card number of the specific user. Through the module, the super management can also quickly find all the door cards under a certain user and operate.
The background uses a micro-service framework to communicate with the front-end service, a Web server built by the background is used to interact with a door lock end to realize information analysis and business processing of a TCP packet, the development is carried out by using the micro-service framework in order to conveniently manage and process high-concurrency requests by considering the difference between TCP protocol communication interacted with the door lock and http protocol communication interacted with the front end, a high-performance Web server is built by using a Netty framework to interact with the door lock, up to 3000 TCP requests are processed in an unaware state, the Web service is rapidly developed by using Springboot for meeting the requirements of the front end, the interaction purpose of a webpage end and an embedded end is achieved, and other auxiliary frameworks are used to ensure high availability of the service and have certain disaster tolerance capability.
Background uses docker composition clustering deployment, which is currently divided into Lock micro-service, user micro-service, gateway micro-service and Netty micro-service, and deploys the client composition clustering deployment to the server to independently provide corresponding services.
For a Nacos registration center, whether service is available or not is detected through a Nacos server, the Nacos server can manage corresponding instances, when the load of a micro-service instance triggers a protection threshold value, the Nacos server can transversely expand the corresponding instances, close the instances with less current load and provide idle resources and calculation power of the server for the instances with high load, meanwhile, the Nacos server is integrated with a configuration center, and the Nacos can be pushed and configured to the corresponding instances only by a developer writing corresponding configuration in a cloud. At present, each service only builds a mirror image, and the examples can be horizontally expanded according to project requirements or concurrency in the later stage. After the micro-services are registered in the nacos registry, the specific ip address and port of another micro-service can be obtained, and the calling of the interface between the micro-services is convenient as single application. If the plurality of instances exist, the nacos registry detects the load conditions of the plurality of instances and forwards the request to the instance with lower load, so that the purpose of load balancing is achieved.
For the User micro service, the User micro service provides interface services related to User information and the like, the project architecture is a micro service architecture, the traditional session verification cannot be shared in the micro service, and therefore the token is used for storing the User information and authenticating. When a user accesses a login page, a front end submits a randomly generated uuid to a rear end, the rear end issues a verification code, the user logs in and submits the uuid again, the verification code and an account password are verified by the rear end, the rear end encrypts the password and then detects whether the password is matched, if the user identity is matched successfully, an stateless token is issued, the token is formed by encrypting a user authority list, the token is carried by the request head of an http request every time, the rear end intercepts the request, analyzes the token, judges whether the matching authority is suitable, and achieves the effect of stateless authentication. The User micro service also provides User registration service, and the User only needs to register once and can log in later by using a mailbox or a mobile phone number. The User module provides the function of binding the card number for the User, and can bind the own card number through the binding page. The card number can represent the identity of the user, and one user can bind a plurality of cards.
For the Lock micro-service, the Lock micro-service provides interfaces such as door Lock management, card number increase, log check and the like. The administrator and the lock owner can manage all the door locks under their names, add the card number for unlocking the door locks, and add, delete and modify the information of the door locks. An administrator or a lock owner can check the lock opening and closing log of the lock, so that the time period and the corresponding lock query are supported, and the user can check the corresponding state and the log of the door lock conveniently. The Lock micro-service provides an online list, and the current online door Lock is returned by polling the registration center set, so that the management of a user is facilitated. The Lock micro service provides a function of remotely opening and closing the Lock of the webpage, and a user can use the remote Lock opening and closing function only after the Lock is registered in the registration center.
For the Netty micro service, the service provides functions of door lock registration, remote lock opening and closing, door lock logout and the like. The Netty micro-service analyzes the TCP packet with fixed length according to the self-set communication protocol, if the length of the TCP packet is abnormal, the analysis is directly abandoned and the TCP connection is disconnected, so that the self-set communication protocol is prevented from being violently cracked, the safety is ensured, the card number and the Lock number in the registration packet are analyzed, the Lock micro-service judgment interface is called to judge whether the data in the database are met, and the Lock micro-service judgment interface is added into the Lock registration center after the data are consistent, so that the subsequent operation is facilitated. The Netty micro-service uses redis as a registration center, all operations must be completed within 90s after registration by setting 90s timeout and heartbeat package detection, the current door lock is moved out by the registration center after 90s, the current TCP connection is disconnected after no subsequent operation, and a locking package is issued to keep the consistency of the door lock state. The self-defined communication protocol is very easy to expand functions, corresponding data can be supported to be uploaded and downloaded in the future, meanwhile, the Netty micro service based on the nio architecture has very high concurrency, and the availability of the service is improved by the stateless data packet processing.
In order to verify the low power consumption performance of the access control system, the embodiment performs power consumption test on the system. The test process is mainly divided into three part experiments: the power consumption test of the single NB-IoT module during operation, the power consumption test of the RFID read-write module and the MCU master control during operation and the power consumption test of the whole system during operation. The test needs to use a programmable power supply to provide a stable input power supply, a power meter is connected to a hardware terminal, and meanwhile, the hardware terminal is placed in a high-low temperature test box to complete power consumption tests at 6 temperatures.
Through the experimental test, the difference between the actual average power consumption and the theoretical value of each module at different temperatures can be solved, for example, the theoretical value is compared with the actual average measured value in the table 1, the power consumption is closer, and the rationality and the stability of the design of system software and hardware are verified.
TABLE 1
Figure BDA0003584905120000131
As can be seen from table 1, the power consumption of the system in the active state is different from the power consumption of the system in the standby state by an order of magnitude, so that the power consumption can be reduced by keeping the system in the standby state for a long time. In the case of normal use of the door lock, the total power consumption of the system for one day can be as shown in equation (1):
Figure BDA0003584905120000141
wherein E is test Which represents the power consumption of the system for one day,
Figure BDA0003584905120000142
the time of unlocking the lock in a single day is shown,
Figure BDA0003584905120000143
indicating the time of sleep on a single day,
Figure BDA0003584905120000144
the power consumption of unlocking the lock in a single day is shown,
Figure BDA0003584905120000145
representing a single day of sleep power consumption.
Taking 10 times of unlocking (5 seconds of working time each time) in one day as an example, substituting the measured value of the average power consumption of the system, and calculating the daily average power consumption of the system through a formula (2), a formula (3) and a formula (4):
Figure BDA0003584905120000146
Figure BDA0003584905120000147
E test =3.3V×(50s·45.86mA+86350s·18.275×10 -3 mA) ═ 3871.04625VmAs equation (4)
Because of the ultra-low power consumption in standby, the system can adopt 4-section No. 5 batteries for power supply, can complete long-time work without using 220v alternating current commercial power,
the battery parameter No. 5 is as shown in equation (5) and equation (6):
V BAT 4 × 1.5V ═ 6V formula (5)
W BAT =6V×2500mAh×60×60=5.4×10 7 VmAs formula (6)
Wherein, V BAT Represents the supply voltage, W BAT Representing the total energy of the power supply.
The service life of the battery power supply system can be calculated according to the formula (7):
Figure BDA0003584905120000148
as can be seen from the above tests, the method provided in this embodiment, in combination with the system of fig. 1, can achieve low power consumption and achieve power consumption of the μ a level when in standby.
The contents of the system embodiment of the present invention are all applicable to the method embodiment, the functions specifically realized by the method embodiment are the same as those of the system embodiment, and the beneficial effects achieved by the method embodiment are also the same as those achieved by the system.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention. Furthermore, the embodiments of the present invention and the features of the embodiments may be combined with each other without conflict.

Claims (10)

1. An RFID and NB-IoT based access control system, comprising:
the unlocking module is used for controlling the on-off state of the target lock;
the RFID identification module is used for identifying IC card information;
the unlocking module and the RFID identification module are both connected with the main control module, and the working modes of the main control module comprise a STOP mode and a normal operation mode; when the master control module does not receive unlocking request information or the IC card information, the master control module is in the STOP mode; when the master control module receives the unlocking request information or the IC card information, the master control module enters the normal operation mode from the STOP mode and controls the unlocking module to execute unlocking action according to the unlocking request information;
the NB-IoT communication module is respectively connected with the main control module and the server and is used for sending the IC card information received by the main control module to the server; and after verifying that the IC card information passes, the server controls the unlocking module to execute unlocking action.
2. The RFID and NB-IoT based access control system according to claim 1, wherein the master control module comprises a master control sub-module, a first oscillating circuit, a plurality of resistors and a plurality of capacitors;
the first oscillating circuit, the plurality of resistors and the plurality of capacitors are all connected with the main control submodule, and the main control submodule is respectively connected with the unlocking module and the RFID identification module.
3. The RFID and NB-IoT based access control system of claim 2, wherein the master submodule is configured with an SPI communication mode interface and a UART/USART communication mode interface.
4. The RFID and NB-IoT based access control system of claim 1, wherein the RFID module comprises an LPCD mode, and the RFID module detects whether an IC card is close to a preset identification range in the LPCD mode.
5. The RFID and NB-IoT based access control system according to claim 4, wherein the RFID identification module comprises an RFID processing module, a second oscillating circuit, a pull-up resistor and an antenna circuit;
the second oscillating circuit, the pull-up resistor and the antenna circuit are all connected with the RFID processing module, and the antenna circuit is used for detecting whether the IC card is close to a preset identification range.
6. The RFID and NB-IoT based access control system according to claim 1, wherein the VBAT input end of the NB-IoT communication module is connected in parallel with an energy storage capacitor and a filter capacitor.
7. The RFID and NB-IoT based access control system according to claim 6 wherein the NB-IoT communication module is in communication with the server via USIM circuitry.
8. The RFID and NB-IoT based access control system of claim 1, further comprising:
and the key module is connected with the main control module and is used for acquiring key information input in real time.
9. The RFID and NB-IoT based access control system according to any of claims 1-8, further comprising:
and the power supply module is used for providing a working power supply for the access control system.
10. A control method of an entrance guard system based on RFID and NB-IoT is characterized by comprising the following steps:
initializing a main control module of the access control system, and setting the main control module, the RFID identification module and the NB-IoT communication module of the access control system to enter a preset working mode;
determining to receive an interrupt request, and controlling the NB-IoT communication module to connect with a server;
determining that the interrupt request is an external interrupt request and the master control module receives unlocking request information, and controlling an unlocking module of the access control system to execute unlocking action according to the unlocking request information through the master control module;
alternatively, the first and second electrodes may be,
and determining that the interrupt request is a card searching interrupt request, the main control module receives the IC card information identified by the RFID identification module, the NB-IoT communication module sends the IC card information to the server from the main control module, and the server controls the unlocking module to execute unlocking action.
CN202210360456.3A 2022-04-07 2022-04-07 Access control system based on RFID and NB-IoT and control method thereof Pending CN114863599A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210360456.3A CN114863599A (en) 2022-04-07 2022-04-07 Access control system based on RFID and NB-IoT and control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210360456.3A CN114863599A (en) 2022-04-07 2022-04-07 Access control system based on RFID and NB-IoT and control method thereof

Publications (1)

Publication Number Publication Date
CN114863599A true CN114863599A (en) 2022-08-05

Family

ID=82630346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210360456.3A Pending CN114863599A (en) 2022-04-07 2022-04-07 Access control system based on RFID and NB-IoT and control method thereof

Country Status (1)

Country Link
CN (1) CN114863599A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496199A (en) * 2011-12-12 2012-06-13 山东大学 Intelligent entrance guard control system with wireless ad hoc network function and control method thereof
CN204759558U (en) * 2015-07-14 2015-11-11 深圳市亲邻科技有限公司 Intelligent entrance guard , equipment and system
CN204926231U (en) * 2015-08-11 2015-12-30 深圳市亲邻科技有限公司 Entrance guard and access control system
CN108109254A (en) * 2018-02-08 2018-06-01 深圳坚朗海贝斯智能科技有限公司 A kind of detection contactless card intelligent electronic lock system and its control method in real time
CN108734840A (en) * 2018-08-09 2018-11-02 深圳市万物云科技有限公司 A kind of access control system and its control method
CN112698711A (en) * 2020-12-23 2021-04-23 深圳市凯迪仕智能科技有限公司 Intelligent detection method and intelligent lock
CN113258960A (en) * 2020-02-07 2021-08-13 恩智浦有限公司 Communication device and operation method thereof
CN114169351A (en) * 2022-02-11 2022-03-11 杰创智能科技股份有限公司 Label detection method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496199A (en) * 2011-12-12 2012-06-13 山东大学 Intelligent entrance guard control system with wireless ad hoc network function and control method thereof
CN204759558U (en) * 2015-07-14 2015-11-11 深圳市亲邻科技有限公司 Intelligent entrance guard , equipment and system
CN204926231U (en) * 2015-08-11 2015-12-30 深圳市亲邻科技有限公司 Entrance guard and access control system
CN108109254A (en) * 2018-02-08 2018-06-01 深圳坚朗海贝斯智能科技有限公司 A kind of detection contactless card intelligent electronic lock system and its control method in real time
CN108734840A (en) * 2018-08-09 2018-11-02 深圳市万物云科技有限公司 A kind of access control system and its control method
CN113258960A (en) * 2020-02-07 2021-08-13 恩智浦有限公司 Communication device and operation method thereof
CN112698711A (en) * 2020-12-23 2021-04-23 深圳市凯迪仕智能科技有限公司 Intelligent detection method and intelligent lock
CN114169351A (en) * 2022-02-11 2022-03-11 杰创智能科技股份有限公司 Label detection method and device

Similar Documents

Publication Publication Date Title
JP6305559B2 (en) Secure element management method and terminal
US9913077B2 (en) Switching between multiple coupling modes
US9209866B2 (en) Securing of a telecommunication device equipped with a near-field communication module
HUE031646T2 (en) Smartcard performance enhancement circuits and systems
CN109872424A (en) A kind of unlocking method, device, electronic equipment and storage medium
CN103259664A (en) Nfc dynamic password chip and working method thereof
JP2012520506A (en) Method, system, apparatus, and medium for using SMNP to manage a small tracking device
CN208460087U (en) A kind of intelligent door lock management system
CN101515814A (en) Enhanced near field communication device and realization method thereof
EP2767061B1 (en) Device for adaptation between a contactless reader and a radiofrequency device
CN101009555B (en) An intelligent secret key device and the method for information interaction with the host
CN103985072A (en) Kindergarten pickup system based on mobile internet and implementation method
CN106507329A (en) A kind of WLAN access equipment and detection method
CN105069384B (en) A kind of split type China second-generation identity card card-reading system and implementation method
CN105897313B (en) A kind of NFC communication system and method for optimizing energy acquisition and realizing small sized antenna
CN208384396U (en) A kind of Development of intelligent laboratory controlling terminal
CN114863599A (en) Access control system based on RFID and NB-IoT and control method thereof
US9642096B2 (en) Wireless communication device and method for transmission of services with different security levels
CN109447617A (en) A kind of good selling method and its system based on NB-Iot
CN105868810B (en) A kind of NFC reader interface optimized for energy acquisition and small sized antenna
WO2015117394A1 (en) Controller and method for managing terminal, and terminal
CN113395345B (en) Network distribution method and device of Internet of things equipment and storage medium
CN103118441B (en) Termination extension device, system and method
WO2018161224A1 (en) Data processing method and related device
CN209911799U (en) Data transmission device and automatic control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination