CN100402788C - Radio frequency smart card computer lock - Google Patents

Radio frequency smart card computer lock Download PDF

Info

Publication number
CN100402788C
CN100402788C CNB2004100213235A CN200410021323A CN100402788C CN 100402788 C CN100402788 C CN 100402788C CN B2004100213235 A CNB2004100213235 A CN B2004100213235A CN 200410021323 A CN200410021323 A CN 200410021323A CN 100402788 C CN100402788 C CN 100402788C
Authority
CN
China
Prior art keywords
module
identification
card
control system
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100213235A
Other languages
Chinese (zh)
Other versions
CN1664288A (en
Inventor
李沈生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB2004100213235A priority Critical patent/CN100402788C/en
Publication of CN1664288A publication Critical patent/CN1664288A/en
Application granted granted Critical
Publication of CN100402788C publication Critical patent/CN100402788C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention relates to a conveniently unlocking radio frequency smart card computer lock with a memory function, which comprises a lock body, a driving mechanism and a lock bolt, wherein an electric control interface is connected to the driving mechanism, the electric control interface is connected with a smart card identity identifying and controlling system, the smart card identity identifying and controlling system comprises a central processing module of the identity identifying and controlling system, and interfaces of the module are respectively connected with an emitting and receiving module of the identity identifying and controlling system, a touch inductive switch, a controlling, state monitoring and delay time self locking module, an identity identifying code memory module and identity identifying code learning press keys; the structure of an identity identifying smart card comprises a central processing module of the identity identifying card, and interfaces of the module are respectively connected with an emitting and receiving module of the identity identifying card and an identity module. The present invention changes the traditional unlocking modes thoroughly, as long as the identity identifying card is carried, the existence of the card is not felt completely when a lock is unlocked; the same identity identifying card can be used on different locks, and a user with the card can go anywhere when lock devices which adopt the technology are used.

Description

Radio frequency smart card computer lock
Technical field
The invention belongs to technical field of living goods, specifically a kind of with convenient, the safe radio frequency smart card computer lock of the unlatching of memory function.
Background technology
As everyone knows, lock be owner for anti-other people open the simple office that establishes, be applied to that the simplest lock has been exactly a bolt on the door.Ancient Times in China has wood lock, the stone dumbbell in the form of an old-fashioned padlock etc., there is no key, is with rope or iron chains constraint.Discuss period in week, along with the private ownership of the means of production further develops, gap between the rich and the poor is further aggravated, and it is very outstanding that social contradications become, and the most ancient lock occurred.Along with the appearance of smelting technique and progressively ripe, metal material is applied to the lockmaking industry, so the copper lock that the usefulness key could be opened, iron lock etc. have occurred.Let us elder generation simple knowledge is several important development stage of lockset once:
B.C. 722---705 years, the mankind invented the most ancient wooden padlock; Approximately through 1600 years, promptly Christian era 870-890, Casting Technology has been invented the all-metal padlock after improving; Christian era 1774---1920, along with the grasp of people, invented the mechanical lock that dead bolt is arranged to theory of mechanics; Before half a century, the American Yale is applied in the pellet shot from a slingshot reed on the mechanical lock, has invented mechanical cylinder lock.
To nineteen sixties,, constantly there is the lockset of new principle to come out, as magnetic control lock, acoustic control lock, electronic lock, Fingerprint Lock etc. along with the progress of science and technology.
Along with rapid development of science and technology, mechanical lock has had significant progress.The modern mechanical lockset has had the history of last 100 years, has added pellet shot from a slingshot different in size in the lock core, just can open with the key of corresponding profile of tooth; In order to increase the difficulty of safety and technical opening, people have invented special-shaped marble and multiple pellet shot from a slingshot aligning method again.The someone has invented magnetic control lock again now, and the private key that this lock has only use to have special magnetic force distribution could be opened.For increasing the safety of lock, a lot of producers have adopted specific alloy in critical positions such as tapered end, lock bodies, and this has increased the intensity of lock body greatly.
Now lockset has formed a very huge family, and is constantly improving and update, and is constantly showing its mystery to the world.Generally speaking, lockset is being brought into play the function of " taking into custody constraint " in human civilization society, is bringing into play important effect at standard social action, the security of the lives and property of defending people, aspect such as maintain social stability.Along with the progress of technology and material therefor, modern high-grade mechanical lock has possessed quite high security performance, mainly shows following aspect:
● real anti-electric drill, anti-cut, anti-saw.(tapered end, lock body and critical position adopt specific alloy to make, and can not open in the standard time with above-mentioned instrument.)
● anti-technical unlocking (master key), nobody can open substantially under the situation at the appointed time.
● key confidentiality height.When helpless, key given not to be afraid of after others and be replicated, or difficulty of reproduction is high.
● keyhole is difficult for blocking.(can not block keyhole with general foreign material, reduce other people and door lock is blocked and the unnecessary trouble brought to the user.)
● anti-collision, pick-proof.(it is indeformable, not crooked that the back is stood to impact energetically in main coupling part such as tapered end, lock body, do not come off.)
From the developing history of mechanical lock as can be seen, the progress of mechanical lock is mainly reflected in the raising of security performance, does not almost improve, even because lock construction itself complicated the opening ways complexity that also becomes on the convenience of using.Along with the raising of people's living standard, under the prerequisite that guarantees lockset safety, the requirement of ease of use is also got up gradually strongly.Popularizing of the development of modern electronic technology and electrical application technology is for the safety that improves lockset convenience and use provides technical foundation.
For improving the convenience that lockset uses, electronic password lock, the electronic lock based on various cards, laser lock, acoustic control lock, Fingerprint Lock and eyeground retina electric control lock etc. have appearred on the market in succession.These are locked on the basis of traditional key, have increased one or more groups control, use different passwords, alternative sounds, different magnetic field, different light beam light wave, different images (as fingerprint, eyeground retina etc.) to wait the unlatching of control lock.The use of new technology has increased convenience and the safety that lockset uses, and some technology but also comes with some shortcomings in some aspects even do very desirablely simultaneously, thereby has limited popularizing and promoting of these locksets.Such as selling at exorbitant prices, be subjected to use be subjected to that environment (temperature, noise, end user's state etc.) influence is too big, maintenance cost is high, own poor reliability etc.For addressing these problems, we have developed RF intelligent card computer lock.
Summary of the invention
The purpose of this invention is to provide a kind of convenient, safe radio frequency smart card computer lock of unlatching that has memory function.
The object of the present invention is achieved like this: it includes lock body, transmission mechanism, dead bolt, it is characterized in that on transmission mechanism, being connected with an electronic control interface, this electronic control interface is connected with smart card identity identification and control system, this smart card identity identification comprises identification and control system central processing module with control system, the interface of this central processing module is connected with identification and control system transmitting and receiving module respectively, the touch sensible switch module, control and status monitoring and time-delay self-locking module, the identity code memory module, identity code study key-press module, the powered battery module; The structure of smart identity identification card is: comprise an identity identification card central processing module, the interface of this module is connected with the identification card transmitting and receiving module respectively, the identify label module, powered battery module, identification and control system central processing module and smart identity identification card are to adopt wireless transmission method to realize non-contacting mutual authentication.
The operating principle of RF intelligent card computer lock is: adopt ripe radio frequency RF (RadioFrequency) technology, in conjunction with high performance embedded electronic computing technique, safe wireless transmission technology, high-intensity encryption and decryption technique and ripe mechanical lock technology, utilize the RF smart card to finish the safe and reliable identification and the opening and closing of control lock.Final purpose is to utilize the RF smart card to replace traditional key, realize safety, reliably, unlatching, the closing control of lock easily.
Fig. 1 has provided the structure of RF intelligent card computer lock.RF intelligent card computer lock is from being divided into three parts in logic: the mechanical lock of RF identification card, RF identification and control system and charged control interface.The stupefied as required employing electromagnetic clutch of electronic control interface, clutch motor or driving motor.RF intelligent card computer lock can be divided into two parts on physical arrangement: RF smart card (being the RF identification card) and RF computer lock.The RF smart card is carried by the end user, can replace traditional mechanical key.RF computer lock comprises mechanical lock two parts of RF identification and control system and charged control interface, and it is installed in needs such as a body, forms, desk, cabinet door the part that conventional lock is carried out security protection is installed, and replaces traditional mechanical lock.
The mechanical lock of the charged control interface of RF intelligent card computer lock adopts the mechanical lock structure through the maturation of market test, and in transformation process, followed the principle that does not influence former lock construction and reliability, therefore improved lockset possesses safety, reliability and the market-ripe of former lockset.
Electric controllability transformation to traditional mechanical lock mainly contains three kinds of methods: electromagnetic clutch method, electric-controlled mechanical clutch method and dead bolt directly drive method (comprising Electromagnetic Drive and motor-driven).Diverse ways is fit to the transformation of the mechanical lock of different structure and purposes.Figure two has provided the frame for movement schematic diagram of different remodeling methods.
The functional structure of RF identification card as shown in Figure 3.Each functions of modules of RF identification card is as follows:
The identification card central processing module: be the core of RF identification card, it generally is in sleep state, and is only just in running order after receiving trigger condition, and (work finish after two minutes) automatically returns to sleep state under certain condition.The trigger condition that it is accepted has three kinds: the identification card transmitting and receiving module of (1) this card is received identification request or the control action result notification of issuing this card; The identification card central processing module is after the identification request of receiving from the identification card transmitting and receiving module, judge whether to sending to its request, if, read the identification code of this card from the identify label module, and launch, and wait for that the identification card transmitting and receiving module receives the control action result that RF identification and control system send back to this card by the identification card transmitting and receiving module; The identification card central processing module stores the result into system status register behind the control action result notification of receiving from the identification card transmitting and receiving module of issuing this card.(2) the state display button is pressed; After the state display button is pressed, identification card central processing module reading system status register, and will read the result and deliver to the demonstration of state display module.(3) the identification card transmitting and receiving module of this card is received identification code study request; The identification card central processing module is read the identification code of this card from the identify label module after receiving from the identification code of identification card transmitting and receiving module study request, and launches by the identification card transmitting and receiving module.
Identification card transmitting and receiving module: receive the identification request, identification code study request or the control action result notification that come from RF identification and control system; Transmission comes from the identification code of this card of identification card central processing module.
State display module: under the situation that the state display button is pressed, show the system mode in the central processing unit system status register.Power supply OK: normal as power supply under the situation that the state display key is pressed, show green, low as supply voltage, show yellow; The state indication: under the situation that the state display key is pressed, be off status as the system status register content, shown in red,, shown in green as the system status register content for opening state.
Powered battery module: be the power supply of entire RF identification card with battery.Possess voltage detecting and prompt facility, when voltage was lower than a threshold, under the situation that the state display key is pressed, power supply OK showed that indicator lamp provides prompting.
The identify label module: each RF identification card has a unique identity recognition number, and this identifier is stored in identification module.The length of identity recognition number is at least 32 (binary systems).
State display button: the previous control action result who is used for display system.When this key was pressed, the state display module showed the system mode in the central processing unit system status register.
The form of identification card transmitting and receiving module emission information: comprise synchronous code, identity recognition number, encrypted code and end mark.
The identification card transmitting and receiving module receives the form of information: comprise synchronous code, identity recognition number, command code, information field, encrypted code and end mark.Command code is divided into application identification, identification code study request and state change and notifies three kinds.When command code was application identification and identification code study request, information field was empty, and during for state change notice, information field is a current state.
Annotate: state display button and state display module are optional part, can determine whether to realize this function on the RF identification card according to different lockset requirements.
The functional structure of RF identification and control system as shown in Figure 4.Each functions of modules of RF identification and control system is as follows:
Identification and control system central processing module: be the core of RF identification base station, it generally is in sleep state, only just in running order after receiving trigger condition, and (work finish after two minutes) automatically returns to sleep state under certain condition.The trigger condition that it is accepted has four kinds: (1) interior ON/OFF key is pressed; After interior ON/OFF key is pressed, the control system state that identification and control system central processing module judges are current, and control control system according to current state and carry out the state conversion, and convert change state indication in the process at state.(2) the identity code learning key is pressed; After the identity code learning key is pressed, the button time is judged by system, if the button time surpasses five seconds, for identity code is removed function, all identity codes of study before identification and control system central processing module are removed, and provide the successful auditory tone cues of removing, on status indicator lamp, provide the photoelectricity prompting; Otherwise be the identity code learning functionality, central processing unit sends identification code study request by identification and control system transmitting and receiving module, and wait receives, after receiving effective identity code, this identification code is charged to the identity code memory module, and provide the auditory tone cues of learning success, and on status indicator lamp, provide the photoelectricity prompting.Whenever by a learning key, learn an identity code and (will guarantee in the learning process in effective range, can not have in irrelevant identification is stuck in, in order to avoid cause mistake to learn.The learning success of failing for two seconds then withdraws from learning state).(3) outer close key is pressed; When outer close key was pressed, identification and control system central processing module at first carried out identification, inquired by identification and control system transmitting and receiving module whether button people identity has been recorded in the identity code memory module.As no record, do not take any action; As record, the control system state that identification and control system central processing module judges are current, send request to control and status monitoring and the self-locking module of delaying time, control system is switched to blocking, provide auditory tone cues after the success, and give the conversion prompting that does well in sound photoelectricity condition prompting module, send the control action result notification by identification and control system transmitting and receiving module then.(4) touch sensible switch; Behind human body touching touch sensible switch, identification and control system central processing module at first carry out identification, whether touch people's identity by identification and the inquiry of control system transmitting and receiving module and have been recorded in the identity code memory module.As no record, do not take any action; As record, judge current control system state, send request to control and status monitoring and the self-locking module of delaying time, control system is switched to open mode, provide auditory tone cues after the success, and give the conversion prompting that does well in sound photoelectricity condition prompting module, send the control action result notification by identification and control system transmitting and receiving module then.
Identification and control system transmitting and receiving module: receive the identify label code that comes from the RF identification card; Transmission comes from identification request, identification code study request and the control action result notification of identification and control system central processing module.
Sound photoelectricity condition prompting module: after some important action, will provide the prompting of sound and photoelectricity.The auditory tone cues situation comprises: identity code is removed successfully, identity code learning success, failure or fault etc.Prompt tone is divided into two kinds, and the prompting of successfully pointing out and fail is distinguished obviously.The auditory tone cues parts are shared by identification and control system.Photoelectricity prompting situation comprises: identity code is removed successfully, the identity code learning success, unblank successfully, locking success, failure or fault, the not enough prompting of battery electric quantity etc.The photoelectricity notification portion is used a Tricolor LED, removes successfully to allow diode show twice of three looks circulation; Start the study back and show yellow, learning success shows green; Unblank and the block action process in show yellow, success back as be locking, show red, as show green for unblanking; Failure or the normal displaing yellow of fault; The red flicker of indicator lamp continued 30 seconds when battery electric quantity was not enough.
Interior ON/OFF key and state indication: ON/OFF key in whenever pressing once, CPU module order control and status monitoring and time-delay self-locking module change a next state, and upgrade the state indication of itself.This state indication photoelectricity notification portion with sound photoelectricity condition prompting module on function is identical, and just one is external prompt, and one is inner prompting.
Identity code study button: this key has two kinds of functions: if the button time surpasses five seconds, middle identification and control system centre processing module are carried out identity code and are removed function, all identity codes of study before removing; Otherwise be the identity code learning functionality, the identity code that CPU module study is new.
Identity code memory module: the identity code of memory CPU module study.This module can adopt different configurations according to different needs, stores several identity codes, and does not lose after power-fail.The length of identity code is for being at least 32 (binary systems).
Control and status monitoring and time-delay self-locking module: comprise controlled output, state-detection input.Controlled output is used to drive external loading, has certain driving force, satisfies the requirement of driven object; The state-detection input is used to detect the duty of external loading, and identification and control system central processing module carry out status monitoring and state control according to the duty of external loading, and changes the driving force of controlled output in view of the above and control polarity etc.(auto-lock function---can select for use: identification and control system central processing module judges are in the time of opening in time-delay, surpass a limit value as this state, as 10 seconds, identification and control system central processing module control transitions to blocking automatically.)
The powered battery module: use the power supply of more piece universal battery, normal running conditions can use (according to the change of concrete configuration condition and the variation of usage frequency, battery application life can be different) more than half a year down.Possess the battery electric quantity measuring ability, after detecting the battery electric quantity deficiency, when using the touch sensible switch open, after action was finished, sound photoelectricity condition prompting module can provide the not enough prompting of battery electric quantity.
Outer close key: after outer close key was pressed, identification and control system central processing module at first carried out identification, inquired by identification and control system transmitting and receiving module whether button people identity has been recorded in the identification memory module.As no record, do not take any action; As record, the control system state that identification and control system central processing module judges are current, send request to control and status monitoring and the self-locking module of delaying time, control system is switched to blocking, provide the prompting of auditory tone cues and photoelectricity after the success, and send the control action result notification, and change state indication by identification and control system transmitting and receiving module.
Touch sensible switch: behind human body touching touch sensible switch, identification and control system central processing module at first carry out identification, inquire by identification and control system transmitting and receiving module whether button people identity has been recorded in the identification memory module.As no record, do not take any action; As record, the control system state that identification and control system central processing module judges are current, send request to control and status monitoring and the self-locking module of delaying time, control system is switched to open mode, provide the prompting of auditory tone cues and photoelectricity after the success, and send the control action result notification, and change state indication by identification and control system transmitting and receiving module.
Identification is launched the form of reception information with the control system transmitting and receiving module: the information format of corresponding RF identification card.For the reliability that guarantees work, avoid interference, identification and control system central processing module will be confirmed respectively according to the content of identification memory module when sending ID authentication request and control action result notification, rather than adopt the mode of broadcasting.The RF identification will be waited for a period of time after being stuck in and receiving the ID authentication request of issuing it, after the base station distributes all authentication inquiries, just makes and replying, and sends identity code.
Annotate: parts such as interior on ﹠ off switch, outer close key, sound and photoelectricity prompting are selectable unit (SU), require and supporting lockset situation according to different locksets, determine whether to realize in RF identification and control system this function.
Lock is a kind of commodity during people live, and it is day and night being guarded the home for huge numbers of families, is defending the possessory power of assets ...According to statistics, year demand all kinds of locksets in the whole world surpass 3,000,000,000, and market demand is extremely huge.But regrettably, in today of scientific and technological high speed development, civilian lockset but never has much variations, continuing to use the cylinder lock of American Yale invention before over half a century always, though have many new principle locksets to come out at present: as acoustic control lock, Fingerprint Lock, IC lock, electronic lock etc., but all can't come into huge numbers of families, difficultly be accepted by the ordinary people because it makes variety of issue such as complexity, cost costliness.And the RF of our company intelligent card computer lock had both kept the safety of modern mechanical lock, itself had safety, anti-technical opening again and advantages such as key can't be copied privately, a card all-pass, used very convenient.The RF intelligent card computer is locked low price, meets people's the level of consumption, can satisfy the demand of ordinary people, helps promoting to lock the change of industry.
The present invention has following advantage:
1, safety.Adopt and make up ISN more than 32, the card whole world is unique, no mutual opening rate problem; Adopt state-of-the-art in the world wireless encoding technology and embedded electronic technology, various technical intrusions such as preventing decryption, intercepting and capturing, repeating transmission.
2, convenient.Thoroughly changed traditional mode of unblanking, as long as carry RF identification card, the existence of imperceptible this card fully when unblanking; Different locks can shared RF identification card, and all are adopted the lockset of this technology, can accomplish that fully one card in hand advances freely, and has not had to carry greatly the worry of key.
3, stable.Anti-environmental disturbances ability is strong, adapts to various working environments, is quick on the draw, and long service life is widely used.Effective working distance stable (optimal distance≤2 meter) does not change because of battery condition changes to some extent.
4, portable.The RF identification card volume that need carry is little, in light weight, easy to carry, firm in structure.
5, economy.RF intelligent card computer lock absorbed various novel locksets on the market advantage, overcome their deficiency separately again simultaneously, when having improved the lockset performance, again with cost control in an OK range, be fit to the present technical level and the level of consumption.
Description of drawings
Fig. 1 is a structural principle block diagram of the present invention
Fig. 2 a is that electromagnetic clutch Vinculum iuris tool stereochemical structure of the present invention is launched simplified schematic diagram
Fig. 2 b is that electric-controlled mechanical clutch Vinculum iuris tool stereochemical structure of the present invention is launched simplified schematic diagram
Fig. 2 b-1 is the plan view behind dead bolt shift fork rotation 90 degree among Fig. 2 b
Fig. 2 b-2 is the plan view behind Clutch lock mandrel rotation 90 degree among Fig. 2 b
Fig. 2 b-3 is the rear elevation of 2b-1
Fig. 2 b-4 is the rear elevation of 2b-2
Fig. 2 c is that dead bolt of the present invention directly drives method lock structure simplified schematic diagram
Fig. 3 is the structural principle block diagram of identity recognition function of the present invention
Fig. 4 is the structural principle block diagram of identification of the present invention and control system
Fig. 5 is the circuit theory diagrams of identification card logic realization of the present invention
Fig. 6 is the circuit theory diagrams of identification of the present invention and control system logic realization
To be described in further detail invention by example below, but following example only is the present invention's example wherein, the rights protection scope of not representing the present invention and being limited, the scope of the present invention is as the criterion with claims.
The specific embodiment
Example 1
At the concrete structure of Fig. 2 a, Fig. 2 b, Fig. 2 c, its course of work is summarized as follows:
The clutch for clutch control of the electromagnetic clutch lockset lock body 1 shown in Fig. 2 a. partly comprises electromagnetic coil 3, clutch spring 4 and soft magnet 5.Electromagnetic clutch is in released state during normality, and transmission mechanism is inoperative; During work at coil lead 2 input stimulus, thereby cause 4 compressions, 5 engagements of electromagnetic coil 3 and soft magnet, this moment, transmission mechanism played a role, and rotated the lockset handle and can open lockset, after the input stimulus of coil lead 2 disappears, electromagnetic coil 3 separates with soft magnet 5, and lockset can't be opened.
Clutch for clutch control by the electric-controlled mechanical clutch lockset lock body 6 shown in Fig. 2 b and Fig. 2 b-1, Fig. 2 b-2, Fig. 2 b-3 and Fig. 2 b-4 partly comprises dead bolt shift fork 7 and mechanical clutch lock shaft 8.There is a clutch motor lock body inside, the position of its control breech lock 9.Breech lock 9 incisions when the clutch motor is rotated in the forward, this moment dead bolt shift fork 7 and 8 engagements of mechanical clutch lock shaft, this moment, transmission mechanism played a role, and rotated the lockset handle and can open lockset; Breech lock 9 ejects during the reverse rotation of clutch motor, and this moment, dead bolt shift fork 7 separated with mechanical clutch lock shaft 8, and this moment, transmission mechanism did not play a role, and lockset can't be opened.
The control section that dead bolt shown in Fig. 2 c. directly drives lockset lock body 10 comprises transmission mechanism 11, dead bolt 12 and control motor 13.The position of control motor 13 control dead bolts 12.Dead bolt just was projected into lock body and realizes locking outward when control motor 13 was rotated in the forward, and dead bolt 12 hands are got back to lock body inside when 13 reverse rotations of control motor, realize the unlatching of lock.
In conjunction with the theory diagram among Fig. 3, then Fig. 5 has provided a kind of specific implementation method of RF identification card.The identification card central processing module comprises Y1, Y2, IC6 and IC7; The identification card transmitting and receiving module comprises RX1, TX1, IC1, IC5 and IC8; The state display module comprises D1, D2, R2, R3, IC4 and BG1; The powered battery module comprises BT1, IC2 and IC3; The function of identification module is included in the IC6; The state display button is XUE1.Introduce the RF identification below and be stuck in the course of work under the various trigger conditions.
The identification card transmitting and receiving module is received external trigger:
The transmitting and receiving module of RF identification card is in holding state always.After IC7 receives effective trigger signals by RX1 and IC1, wake IC6 up, further decode, analyze and judge by IC6.The result that IC6 analyzes has four kinds: identification code is learnt request, issues its identification request, is issued its control action result notification, invalidation request.Receive identification code study request as IC6, IC6 reads the identification code of this card that is stored in memory inside own, and delivers to IC8, and IC8 transmits preceding encryption to this sign indicating number, encrypts the back and launches by IC5 and TX1.Receive the identification request as IC6, it will judge at first whether this request is the request that sends to it, if, it reads the identification code of this card that is stored in memory inside own, and delivering to IC8, IC8 transmits preceding encryption to this sign indicating number, encrypts the back and launches by IC5 and TX1; If not the request that sends to it, handle by invalidation request.Receive the control action result notification as IC6, it will judge at first whether this request is the request that sends to it, if it is extracted in the result of the action in the notice, and presses resultant content and upgrades its status register; If not the request that sends to it, handle by invalidation request.The request of receiving as IC6 is an invalidation request, does not take any action.After receiving information processing and finishing 30 seconds, IC6 returned sleep state.The state display button is pressed:
Press as the XUE1 key, will directly wake IC6 up, IC6 judges that by the output of reading IC3 current supply voltage is whether in normal range (NR); IC6 reads the status register of itself then.IC6 is according to status register contents and power supply status, and control D1, D2 indicate.After the XUE1 key unclamped, IC6 returned sleep state again.
Example 2
In conjunction with the theory diagram among Fig. 4, then Fig. 6 has provided a kind of specific implementation method of RF identification and control system.Identification and control system central processing module comprise Y21, Y22, IC27, IC29; Identification and control system transmitting and receiving module comprise RX21, IC21, IC26, IC25, TX21, BG31; Sound photoelectricity condition prompting module and state indicating module comprise IC24, BG21, D21, D22, R22, R23; Interior ON/OFF key is S22; Identity code study button is XUE21; The identity code memory module comprises BG30, IC28, R36; Control and status monitoring and time-delay self-locking module comprise BG22, BG23, BG24, BG25, BG26, BG27, BG28, L21, IC29; The powered battery module comprises BT21, IC22, IC23; Outer close key position S23; The touch sensible switch is CHU21, R31, R32, R33, R34, BG29.Introduce RF identification and the control system course of work under various trigger conditions below.
Interior ON/OFF key is pressed:
After S22 pressed, IC29 read the content of its internal state register, judged on off state.If for opening, 24 pin of IC29 are exported high level, 23 pin output low levels, BG25, BG22, BG28 conducting, BG23, BG26, BG27 end, and control system is transformed into off status; If be the pass, the 24 pin output low levels of IC29,23 pin output high level, BG25, BG22, BG28 end, BG23, BG26, BG27 conducting, control system is transformed into out state.In transfer process, IC29 indicates with the change state according to the output that course of action, progress and result in time change 1,2 and 22 pin.
The identity code learning key is pressed:
Press as the XUE21 key, IC29 will start timing, judge the button time.As the button time greater than 5 seconds, IC29 gives an order to IC28, removes all identity codes of the former study of being deposited IC28 inside.As the button time less than 5 seconds, IC29 sends identity code study request by IC26, IC25, TX21, and starts RX21, IC21 and wait for reception.If received effective identity code in 30 seconds, IC29 writes IC28 with this sign indicating number, finishes learning process, otherwise study failure this time finishes this operation.In learning process, IC29 can indicate with the change state according to learning process, progress and the result output of change 1,2 and 22 pin in time.
Outer close key is pressed:
Press as the S23 key, IC29 reads the identity code of learning from IC28, and divides quilt to be sent the identification request to corresponding RF identification card by IC25, IC26 and TX21, and waits for the return results from RX21, IC21.IC29 analyzes return results, if receive effective response at the appointed time, IC29 puts 24 pin and is output as high level, and 23 pin are output as low level, control system is transformed into off status and the indication of change state, otherwise does not take any action.When state changed, IC29 can timely change state indication.Change if any state, IC29 sends the result of the action notice by IC25, IC26 and TX21 to the RF of echo reply identification card.
Touching touch sensible switch:
During as human body touching CHU21, IC29 is by this action of BG29 perception.The work that IC29 was done when the work that this moment, IC29 did was pressed to outer close key is similar, just after authentication is passed through, control system is transformed into opening.

Claims (8)

1. a unlatching that has memory function is convenient, the radio frequency smart card computer lock of safety, it includes lock body, transmission mechanism, dead bolt, it is characterized in that on transmission mechanism, being connected with an electronic control interface, this electronic control interface is connected with smart card identity identification and control system, this smart card identity identification comprises identification and control system central processing module with control system, the interface of this central processing module is connected with identification and control system transmitting and receiving module respectively, the touch sensible switch module, control and status monitoring and time-delay self-locking module, the identity code memory module, identity code study key-press module, the powered battery module; The structure of smart identity identification card is: comprise an identity identification card central processing module, the interface of this module is connected with the identification card transmitting and receiving module respectively, identify label module, powered battery module; Identification and control system central processing module and smart identity identification card are to adopt wireless transmission method to realize non-contacting mutual authentication.
2. radio frequency smart card computer lock according to claim 1 is characterized in that electronic control interface is an electromagnetic clutch.
3. radio frequency smart card computer lock according to claim 1 is characterized in that electronic control interface is clutch motor or driving motor.
4. radio frequency smart card computer lock according to claim 1 is characterized in that the interface of identification and control system transmitting and receiving module also is connected with interior on ﹠ off switch module.
5. radio frequency smart card computer lock according to claim 1 is characterized in that the interface of identification and control system transmitting and receiving module also is connected with sound photoelectricity condition prompting module.
6. radio frequency smart card computer lock according to claim 1 is characterized in that the interface of identification and control system transmitting and receiving module also is connected with outer close key module.
7. radio frequency smart card computer lock according to claim 1 is characterized in that the interface of identification card central processing module also is connected with state display button module.
8. radio frequency smart card computer lock according to claim 1 is characterized in that the interface of identification card central processing module also is connected with the state display module.
CNB2004100213235A 2004-03-02 2004-03-02 Radio frequency smart card computer lock Expired - Fee Related CN100402788C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100213235A CN100402788C (en) 2004-03-02 2004-03-02 Radio frequency smart card computer lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100213235A CN100402788C (en) 2004-03-02 2004-03-02 Radio frequency smart card computer lock

Publications (2)

Publication Number Publication Date
CN1664288A CN1664288A (en) 2005-09-07
CN100402788C true CN100402788C (en) 2008-07-16

Family

ID=35035571

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100213235A Expired - Fee Related CN100402788C (en) 2004-03-02 2004-03-02 Radio frequency smart card computer lock

Country Status (1)

Country Link
CN (1) CN100402788C (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106712A (en) * 2012-12-25 2013-05-15 张善琴 Electronic access control system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5373282A (en) * 1992-02-04 1994-12-13 Carter; Ronald L. Dealer information and security apparatus and method
JPH10246043A (en) * 1997-03-06 1998-09-14 Unitec Kk Lock device of building
CN1289883A (en) * 2000-07-14 2001-04-04 科思达计算机系统(北京)有限公司 Induction-type electronic door lock with key card made by user
CN2533221Y (en) * 2002-01-26 2003-01-29 珠海优特电力科技股份有限公司 Power-saving domestic RF ID digital lock
CN2575256Y (en) * 2002-09-24 2003-09-24 昆明海高电子信息有限公司 Sealed manhole cover lock
JP2004005511A (en) * 2002-03-26 2004-01-08 Toshiba Corp Monitoring system, monitoring method and monitoring program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5373282A (en) * 1992-02-04 1994-12-13 Carter; Ronald L. Dealer information and security apparatus and method
JPH10246043A (en) * 1997-03-06 1998-09-14 Unitec Kk Lock device of building
CN1289883A (en) * 2000-07-14 2001-04-04 科思达计算机系统(北京)有限公司 Induction-type electronic door lock with key card made by user
CN2533221Y (en) * 2002-01-26 2003-01-29 珠海优特电力科技股份有限公司 Power-saving domestic RF ID digital lock
JP2004005511A (en) * 2002-03-26 2004-01-08 Toshiba Corp Monitoring system, monitoring method and monitoring program
CN2575256Y (en) * 2002-09-24 2003-09-24 昆明海高电子信息有限公司 Sealed manhole cover lock

Also Published As

Publication number Publication date
CN1664288A (en) 2005-09-07

Similar Documents

Publication Publication Date Title
CN104790766B (en) A kind of intelligent door lock system and its lock status and unlocking legitimacy recognition methods
CN101037903B (en) Electric lockset structure
WO2011057434A1 (en) Intelligent locking system and working method thereof
CN100999961A (en) New Sci & Tech. cipher lock and design method of key thereof
CN104318649A (en) Smart lock system based on vibration frequency communication of smart phone
CN100402788C (en) Radio frequency smart card computer lock
CN204808441U (en) Non -contact environment -friendly trick lock
CN202976286U (en) IC (Integrated Circuit) fingerprint lock
CN108316786A (en) A kind of Internet of Things padlock and padlock system based on LoRa
CN103971429A (en) Intelligent interactive coded lock control system and intelligent interactive coded safe case lock and installing and using method thereof
CN101092858A (en) Remote controlled bolt with door lock
CN210141054U (en) Passive electric field lockset
CN204242262U (en) Based on the intelligent lock system of smart mobile phone vibration frequency communication
CN201065691Y (en) Information button intelligent lock
CN206971961U (en) Electromagnetic and mechanical double control lock core anti-theft door device
CN2238875Y (en) Remote control electric door lock
CN203882362U (en) Intelligent interactive type password safe case lock
CN2402769Y (en) IC intelligent automatic lock for theftproof door
CN201351400Y (en) Message authentication coded lock
CN205908129U (en) Dynamic digit password fingerprint pickproof lock
CN201144556Y (en) Signal recognition control door lock
CN206097253U (en) Intelligence lock control system based on arduino
CN206769575U (en) A kind of safety can fix door lock
CN2510592Y (en) Intelligent puzzle lock
CN205722030U (en) A kind of electronic coding lock system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080716