CN105336022A - Novel cipher lock - Google Patents
Novel cipher lock Download PDFInfo
- Publication number
- CN105336022A CN105336022A CN201410396846.1A CN201410396846A CN105336022A CN 105336022 A CN105336022 A CN 105336022A CN 201410396846 A CN201410396846 A CN 201410396846A CN 105336022 A CN105336022 A CN 105336022A
- Authority
- CN
- China
- Prior art keywords
- password
- duration
- control chip
- opertaing device
- cipher lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
A novel cipher lock is used to realize the same function of a card-swiping lock without using networked data communication. The novel cipher lock is realized by the following steps: multiple groups of different durations are set according to needs; each duration is corresponding to multiple different ciphers; the ciphers are synchronously saved in a control chip and control equipment; when unlocking is needed, a cipher corresponding to the duration is selected from a cipher database according to required unlocking time; the cipher with the duration is entered; the door lock records the current time, and the current time plus the duration is used as failure time; and when the failure time arrives, unlocking permission of the cipher is canceled.
Description
Technical field
A kind of cipher lock, is applied to the field by secret number, is especially applied to shortly to rent a house in field, door lock is carried out to the field managed.
Background technology
Coded lock is the existing one lock using very general socially, be widely used in various field, especially door lock is applied to, the fields such as safety cabinet, coded lock does not need to carry anything, unblank conveniently, ease of use is suitable with Fingerprint Lock, but stability outclass Fingerprint Lock again, because Fingerprint Lock also exists the problem identifying an incorrect class, but surpass again the lock of swiping the card in some aspects, because there is no physical space, but there is a problem, less than lock of swiping the card, because swipe the card, lock itself can built-in encryption data, so can by writing data to the mode of card the inside, allow and swipe the card fixing service time.Coded lock also can limit an effective time, but limit and must arrange coded lock itself while password is set effective time, pass through so will realize lock and management foreground must being allowed to carry out data with identical function of swiping the card, this just relates to the problem of complicated data transmission, very inconvenience.
Summary of the invention
A kind of cipher lock, for when not needing to use networking in interior data communication, realizes with phase-locked same function of swiping the card.
An implementation method for cipher lock, comprising: arrange the duration that many groups are different as required; Corresponding multiple different password of each duration; These passwords are synchronously preserved in control chip and opertaing device; When needs are unblanked, the time of unblanking as required, from cryptographic libraries, choose the password of corresponding duration; Input the password that this has the duration; Door lock record current time, and current time is added the duration is as the out-of-service time; Arrive the out-of-service time, namely cancel the authority of this password unlocking.Arrive the out-of-service time, namely cancel the authority of this password unlocking.
In the implementation method of above-mentioned cipher lock: when giving user's unlocking cipher, opertaing device and lock do not need to carry out data communication.
In the implementation method of above-mentioned cipher lock: check the password stored in good time; If the password stored is about to use up, control chip and opertaing device is namely allowed to carry out data communication; Control chip and opertaing device regenerate new password; New password is synchronously preserved in control chip and opertaing device equipment.
In the implementation method of above-mentioned cipher lock: the connection status in good time checking control chip and opertaing device; If have data communication between control chip and opertaing device, namely generate new password; New password is synchronously preserved in control chip and opertaing device equipment.
In the implementation method of above-mentioned cipher lock: the device that a setting recovery is dispatched from the factory; Start this device, can allow all data of opertaing device and privilege expires.
In the implementation method of above-mentioned cipher lock: set one and freeze password; Input this and freeze password, freeze the unlocking authority of all passwords or freeze the unlocking authority of the password of specifying the duration.
In the implementation method of above-mentioned cipher lock: set an administrator password; Input keeper on the control device, just can choose password.
In the implementation method of above-mentioned cipher lock: the permanent password used of setting; If this password does not have deleted, can forever use.
In the implementation method of above-mentioned cipher lock: the duration degree of accuracy of password can be specified arbitrarily as required.
In the implementation method of above-mentioned cipher lock: the duration can also to specify arbitrarily in an interval sometime in advance.
In the implementation method of above-mentioned cipher lock: set new and old Substitution Rules; Input new password, the used password with the same duration ceased to be in force automatically originally.
In the implementation method of above-mentioned cipher lock: a specific cryptosystem is set; Input specific cryptosystem, cancels the authority being in the password of the term of validity in advance.
A kind of cipher lock, comprise: control core 201, wherein at least have processor 211, storer 212, one or more module 213,214, described one or more module 213,214 and processor 211 coordinate, for: store code data, computing time, the alignment time, reception Password Input signal, judge Password Input signal whether effectively, control dead bolt switch, read dead bolt state and position, provide voice message, provide photosignal and to point out and opertaing device carries out data communication, factory reset, freezes various password; Password Input module 202, generally comprises button 218, light 219 at interior assembly, for: show password, detect the trigger action of user, trigger action be converted to input signal, the input of user is pointed out; Mechanical module 205, generally comprise motor 215, dead bolt 216, shell 217 at inner assembly, for: support lock shape, center of effort, protection inner structure be provided, drive dead bolt action, the state reading dead bolt and position, by the state of dead bolt and location transmission to control chip; Power module 203, generally comprises battery 225, electrode 226, wire harness 227, for: for whole lock provides the change of electric power supply, feedback electricity; Opertaing device 204, described opertaing device can be handheld device or computer, comprise one or more process 220, storer 221, multiple software and hardware module 222,223, an application program 224 is had based on described environment exploitation, perform corresponding function by the hardware environment of opertaing device 204, for: set up data communication in case of need with control chip, keep internal data and control chip store data synchronous, show when needs from extracting data data, the data of control chip write and deleted.
In above-mentioned cipher lock: carrying out data communication with opertaing device can be wired mode, also can be wireless mode.
In above-mentioned cipher lock: Password Input module 202 can be mechanical button, it also can be touch key-press.
In above-mentioned cipher lock: Password Input module 202 also can adopt hummer to point out user.
Accompanying drawing explanation
Fig. 1 is process flow diagram of the present invention;
Fig. 2 is composition schematic diagram of the present invention
Embodiment
Fig. 1 is process flow diagram of the present invention.Realization of the present invention, needs following step substantially.
Step 1: the duration that many groups are different is set in advance as required.The concept of duration, a password uses duration from being activated finally to be stopped exactly, in this flow process, mainly as required, pre-configured interval, set the lasting time, a such as hotel, generally guest moves in, all to move in 1 day, certainly 2 days are also had, the mode of 3 days etc. moving in, but the situation of the time of moving in continuously more than 1 month, still very rare, so realization of the present invention, in this step, need in advance according to the custom of user, set the various lasting time, no matter it is one day or one hour, or one minute etc.
Step 2: corresponding multiple different password of each duration, set after the duration through previous step, start as corresponding password of each duration, such as be provided with 1 day, 2 days two kinds of duration, so just generate 2 groups of passwords, often organize the duration that codon pair should be specified, as for the number of password, can determine according to the frequency used, such as hotel, if the probability of moving in a day is the highest, so password of 1 day duration of nature, quantity should be maximum.
Step 3: these passwords are synchronously preserved in control chip and opertaing device, because keep synchronous, so the generation of password is generally lock or opertaing device generates, opertaing device is generally the electronic equipment such as mobile phone or computer, under special circumstances, also can be that both are common to generate, as long as both data syn-chronization.
Step 4: when needs are unblanked, the time of unblanking as required, chooses the password of corresponding duration from cryptographic libraries.When in previous step, after password is synchronously preserved in lock and opertaing device, opertaing device is generally controlled by the people of administrator right, when this people is in short rent or family, generally landlord, when hotel, be generally the foreground in hotel, take foreground as example, if someone will move in 1 day, then the foreground in hotel or computer software are as required, be the cryptographic libraries of 1 day from the duration, choose a password, pass through SMS, Email, chat tool or inform in interior various modes face to face, tell lessee, this password is used for lessee and opens the door.
Step 5: input the password that this has the duration.After lessee takes password, the medium that brain or mobile phone etc. are outside stores this password, before then going to door, inputs this password, can enter and move in.
Step 6: door lock record current time, and current time is added the duration is as the out-of-service time.The inner onboard clock of door lock, the current time can be known in real time, after lessee inputs secret number, door lock can remember the current time, then according to the duration that inside is synchronously preserved, determine a time of losing efficacy, such as user is the password of 1 day with a duration, open the door at 2014-08-1312:00 and enter, then lock and automatically remember the current time, then the current time is added that the duration is as the out-of-service time, if the such as duration is one day, so just can confirm that 2014-08-1411:59 is the out-of-service time.In this step, also has a problem, the room in such as hotel is the 12 noon on the same day be standard as the check-out time, so in fact in use, can the duration be carried out fuzzy, only determine general time, such as continue one day, then limiting the state pause judgments time is 12 points, as long as the random time input password unlocking so after user 2014-08-1312:00, the time of inefficacy still can be defined as 2014-08-1411:59.Once analogize, can arrange the state pause judgments time is 13 or other time, can obtain similar effect.
Step 7: when the arrival out-of-service time, cancel the authority of this password unlocking.After determining the out-of-service time, tenant with password turnover in the time before the out-of-service time, can only have after this time of 2014-08-1411:59, just cancels the authority that this lessee unblanks.
Fig. 2 is composition schematic diagram of the present invention.The present invention mainly comprises following ingredient: control core 201, Password Input module 202, power module 203, opertaing device 204, mechanical module 205.It should be noted that, the description that the present invention forms for product, be only one and not describe completely, there is the thing of some peripheries, must exist for a product, the parts such as such as electric capacity, resistance, shell, but these known technology in the present invention, do not repeat, should be appreciated that as the people in the industry, these thing outwardnesies, and essential, simultaneously according to different models, size etc., different forms can be there is.For the change of this respect, do not need the work through novelty, so belong to protection scope of the present invention yet.
In control core 201, at least have processor 211, storer 212, one or more module 213,214, described one or more module 213,214 and processor 211 coordinate, for: store code data, computing time, the alignment time, reception Password Input signal, judge Password Input signal whether effectively, control dead bolt switch, read dead bolt state and position, provide voice message, provide photosignal and to point out and opertaing device carries out data communication, factory reset, freezes various password.
In Password Input module 202, generally comprise button 218, light 219 at interior assembly, for: show password, detect the trigger action of user, trigger action be converted to input signal, the input of user is pointed out.
Mechanical module 205; generally comprise motor 215, dead bolt 216, shell 217 at inner assembly, for: support lock shape, center of effort, protection inner structure be provided, drive dead bolt action, the state reading dead bolt and position, by the state of dead bolt and location transmission to control chip.
Power module 203, generally comprises battery 225, electrode 226, wire harness 227, for: for whole lock provides the change of electric power supply, feedback electricity.
Opertaing device 204, described opertaing device can be handheld device or computer, comprise one or more process 220, storer 221, multiple software and hardware module 222,223, an application program 224 is had based on described environment exploitation, perform corresponding function by the hardware environment of opertaing device 204, for: set up data communication in case of need with control chip, keep internal data and control chip store data synchronous, show when needs from extracting data data, the data of control chip write and deleted.
In modules, between Password Input module 202 and control chip 201, carry out data communication, Password Input module can by user input cipher feedback to control chip 201, control chip 201 can password check whether correct, if correct, just unblank, if abnormal, just can make various prompting on Password Input module 202, such as light flash, prompting user cipher mistake.
Power module 203 is as its name suggests for the components and parts of all power consumptions provide the energy, conversely, control chip 201 also can obtain the current state of power module 203 by various instruction, comprise dump energy how many, whether want reminding user to replace battery etc.
Opertaing device 204 can have various ways, comprises mobile phone, computer etc., on opertaing device 204, generally needs configuration database, developing application 224, and application program 224, according to the form of opertaing device 204, has different versions.
Mechanical module 205 is a kind of electronically controlled mechanical hook-ups, and control chip 201 can control the action of dead bolt by mechanical module 205.Mechanical module generally needs very many five metals, the parts of plastics aspect, forms a device, but the outward appearance of these compositions, can carry out changing according to different designers, the mode of concrete mechanical motion, is belong to existing technology, therefore here repeats no more.
Claims (10)
1. an implementation method for cipher lock, is characterized in that:
The duration that many groups are different is set as required;
Corresponding multiple different password of each duration;
These passwords are synchronously preserved in control chip and opertaing device;
When needs are unblanked, the time of unblanking as required, from cryptographic libraries, choose the password of corresponding duration;
Input the password that this has the duration;
Door lock record current time, and current time is added the duration is as the out-of-service time; Arrive the out-of-service time, namely cancel the authority of this password unlocking.
2. the implementation method of cipher lock according to claim 1, is characterized in that:
The in good time password checking storage;
If the password stored is about to use up, control chip and opertaing device is namely allowed to carry out data communication;
Control chip and opertaing device regenerate new password;
New password is synchronously preserved in control chip and opertaing device equipment.
3. the implementation method of cipher lock according to claim 1, is characterized in that:
The connection status of in good time inspection control chip and opertaing device;
If have data communication between control chip and opertaing device, namely generate new password;
New password is synchronously preserved in control chip and opertaing device equipment.
4. the implementation method of cipher lock according to claim 1, is characterized in that:
Set one and freeze password;
Input this and freeze password, freeze the unlocking authority of all passwords or freeze the unlocking authority of the password of specifying the duration.
5. the implementation method of cipher lock according to claim 1, is characterized in that: the duration degree of accuracy of password can be specified arbitrarily as required.
6. the implementation method of cipher lock according to claim 1, is characterized in that: the duration can also to specify arbitrarily in an interval sometime in advance.
7. the implementation method of cipher lock according to claim 1, is characterized in that:
Set new and old Substitution Rules;
Input new password, the used password with the same duration ceased to be in force automatically originally.
8. the implementation method of cipher lock according to claim 1, is characterized in that:
A specific cryptosystem is set;
Input specific cryptosystem, cancels the authority being in the password of the term of validity in advance.
9. a cipher lock, is characterized in that: comprising:
Control chip (201), wherein at least have processor (211), storer (212), one or more module (213,214), described one or more module (213,214) and processor (211) coordinate, for: store code data, computing time, the alignment time, reception Password Input signal, judge Password Input signal whether effectively, control dead bolt switch, read dead bolt state and position, provide voice message, provide photosignal and to point out and opertaing device carries out data communication, factory reset, freezes various password;
Password Input module (202), generally comprises button (218), light (219) at interior assembly, for: show password, detect the trigger action of user, trigger action be converted to input signal, the input of user is pointed out;
Mechanical module (205), generally comprise motor (215), dead bolt (216), shell (217) at inner assembly, for: support lock shape, center of effort, protection inner structure be provided, drive dead bolt action, the state reading dead bolt and position, by the state of dead bolt and location transmission to control chip;
Power module (203), generally comprises battery (225), electrode (226), wire harness (227), for: for whole lock provides the change of electric power supply, feedback electricity;
Opertaing device (204), described opertaing device can be handheld device or computer, comprise one or more process (220), storer (221), multiple software and hardware module (222, 223), an application program (224) is had based on described environment exploitation, corresponding function is performed by the hardware environment of opertaing device (204), for: set up data communication with control chip in case of need, internal data and control chip is kept to store the synchronous of data, show from extracting data data when needs, the data of control chip are write and deleted.
10. cipher lock according to claim 8, is characterized in that: carrying out data communication with opertaing device can be wired mode, also can be wireless mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410396846.1A CN105336022A (en) | 2014-08-13 | 2014-08-13 | Novel cipher lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410396846.1A CN105336022A (en) | 2014-08-13 | 2014-08-13 | Novel cipher lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105336022A true CN105336022A (en) | 2016-02-17 |
Family
ID=55286522
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410396846.1A Pending CN105336022A (en) | 2014-08-13 | 2014-08-13 | Novel cipher lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105336022A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105991776A (en) * | 2016-06-29 | 2016-10-05 | 北京三快在线科技有限公司 | Method, device and system for cipher lock control |
CN107195035A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | A kind of remote controlled cloud lock awakening method, system |
CN109525391A (en) * | 2018-10-14 | 2019-03-26 | 浙江鸿利锁业有限公司 | A kind of method that server is synchronous with lockset information security |
CN111341012A (en) * | 2018-11-30 | 2020-06-26 | 富士电机株式会社 | Door opening and closing system of vending machine |
CN111379475A (en) * | 2018-12-29 | 2020-07-07 | 云丁网络技术(北京)有限公司 | Unlocking method of electronic lock, electronic lock and unlocking management equipment |
CN114445936A (en) * | 2022-01-21 | 2022-05-06 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5774058A (en) * | 1995-07-20 | 1998-06-30 | Vindicator Corporation | Remote access system for a programmable electronic lock |
CN101560852A (en) * | 2008-04-14 | 2009-10-21 | 凯迈(洛阳)电子有限公司 | Fingerprint opening system for guesthouse and fingerprint door lock thereof |
CN102168509A (en) * | 2011-03-23 | 2011-08-31 | 袁磊 | Dynamic password lock system capable of changing password with date |
CN102903167A (en) * | 2012-09-26 | 2013-01-30 | 广州东软科技有限公司 | Management system for renting and selling houses |
CN103903319A (en) * | 2014-02-10 | 2014-07-02 | 袁磊 | Electronic lock system based on internet dynamic authorization |
-
2014
- 2014-08-13 CN CN201410396846.1A patent/CN105336022A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5774058A (en) * | 1995-07-20 | 1998-06-30 | Vindicator Corporation | Remote access system for a programmable electronic lock |
CN101560852A (en) * | 2008-04-14 | 2009-10-21 | 凯迈(洛阳)电子有限公司 | Fingerprint opening system for guesthouse and fingerprint door lock thereof |
CN102168509A (en) * | 2011-03-23 | 2011-08-31 | 袁磊 | Dynamic password lock system capable of changing password with date |
CN102903167A (en) * | 2012-09-26 | 2013-01-30 | 广州东软科技有限公司 | Management system for renting and selling houses |
CN103903319A (en) * | 2014-02-10 | 2014-07-02 | 袁磊 | Electronic lock system based on internet dynamic authorization |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105991776A (en) * | 2016-06-29 | 2016-10-05 | 北京三快在线科技有限公司 | Method, device and system for cipher lock control |
CN107195035A (en) * | 2017-05-11 | 2017-09-22 | 广东汇泰龙科技有限公司 | A kind of remote controlled cloud lock awakening method, system |
CN107195035B (en) * | 2017-05-11 | 2019-12-10 | 广东汇泰龙科技有限公司 | Cloud lock awakening method and system capable of being remotely controlled |
CN109525391A (en) * | 2018-10-14 | 2019-03-26 | 浙江鸿利锁业有限公司 | A kind of method that server is synchronous with lockset information security |
CN109525391B (en) * | 2018-10-14 | 2021-12-03 | 浙江鸿利锁业有限公司 | Method for safely synchronizing information of server and lockset |
CN111341012A (en) * | 2018-11-30 | 2020-06-26 | 富士电机株式会社 | Door opening and closing system of vending machine |
CN111379475A (en) * | 2018-12-29 | 2020-07-07 | 云丁网络技术(北京)有限公司 | Unlocking method of electronic lock, electronic lock and unlocking management equipment |
CN111379475B (en) * | 2018-12-29 | 2021-09-28 | 云丁网络技术(北京)有限公司 | Unlocking method of electronic lock, electronic lock and unlocking management equipment |
CN114445936A (en) * | 2022-01-21 | 2022-05-06 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11443577B2 (en) | Wireless device enabled locking system | |
CN105336022A (en) | Novel cipher lock | |
US11348390B2 (en) | Padlock device, systems including a padlock device, and methods of operating therefor | |
CN103927809B (en) | A kind of smart electronics lock management system and management method thereof | |
CN104301320A (en) | Four terminal integrated encryption type cloud service method and system | |
KR101963437B1 (en) | System and method for doorlock | |
CN204904392U (en) | Intelligent lock system is encrypted in high in clouds | |
CN104464038A (en) | Theft-proof wireless infrared remote control electronic coded lock | |
CN103985169A (en) | System utilizing handheld terminal and USB interface to lock/unlock door lock and controlling method thereof | |
CN111080868A (en) | Temporary password setting and verifying method for intelligent door lock | |
CN104392525A (en) | Intelligent lock system | |
CN108109241A (en) | Safe domestic intelligent cloud lock embedding grammar, system and the cloud lock of embedded SE modules | |
CN204229495U (en) | A kind of intelligent lock system | |
CN105513172A (en) | Unlocking system and method of electronic lock | |
Gupta | Implementation of biometric security in a smartphone based domotics | |
CN104346589B (en) | A kind of password setting, unlocking system and method | |
CN105649469A (en) | Dual-password control system for intelligent safe | |
CN203480514U (en) | Password setting system and password decoding system | |
KR20190060370A (en) | Control system and method for locking device | |
CN113178029A (en) | System capable of providing non-transitive identification certificate of rolling two-dimensional code | |
CN104835235A (en) | Anti-theft wireless infrared remotely-controllable electronic code lock | |
CN204087319U (en) | Coded lock | |
US20160342817A1 (en) | System and method for controlling access to portable computing devices | |
US20230072967A1 (en) | Smart lock and method for automatically locking smart lock | |
Jadhav et al. | A Cutting-Edge Security Solution: OTP-Based Smart Wireless Locking System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160217 |
|
WD01 | Invention patent application deemed withdrawn after publication |