CN105550622B - Coded lock to code method and coded lock to code system - Google Patents
Coded lock to code method and coded lock to code system Download PDFInfo
- Publication number
- CN105550622B CN105550622B CN201610024926.3A CN201610024926A CN105550622B CN 105550622 B CN105550622 B CN 105550622B CN 201610024926 A CN201610024926 A CN 201610024926A CN 105550622 B CN105550622 B CN 105550622B
- Authority
- CN
- China
- Prior art keywords
- code
- coded lock
- password
- cog region
- lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1413—1D bar codes
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B37/00—Permutation or combination locks; Puzzle locks
- E05B37/20—Puzzle locks, e.g. of labyrinth type; Fasteners with hidden or secret actuating mechanisms
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B65/00—Locks or fastenings for special use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention disclose a kind of coded lock to code method, this method comprises the following steps:Preparatory process, same password is adjusted to by the password of the coded lock of the same case of production, will have cog region and password identical coded lock is placed in same case, and patch shows the password of coded lock in this place;To code process, by the Password Input of coded lock to that should locate into memory, reuse code reader and cog region is scanned and code is identified, the identification code is uploaded in memory, and it is corresponding with corresponding password;Process is verified in quality inspection;Scanning validation process, corresponding password is obtained to the cog region barcode scanning by the code reader, verify whether the password can open the coded lock, whether statistical analysis process is consistent with password quantity in scanning validation process to the quantity that compares the identification code in code process;Dial-up vanning process, the combination disk of the coded lock is dialled disorderly, and is respectively put into different finished product boxes.Technical solution of the present invention can be realized quick to code.
Description
Technical field
The present invention relates to coded lock to code technical field, more particularly to a kind of coded lock to code method and pair of coded lock
Code system.
Background technology
As the improvement of people's living standards, the demand for the especially high-grade drinks of drinks is more and more vigorous.However, existing
In market, fake wine is more and more, causes user to there is the drinks of many brands and queries.Manufacturer's widespread practice is by password
The bottleneck for locking to lock bottle carries out false proof.Coded lock needs a password one identification code of correspondence during to code, namely sweeps
Retouch an identification code, correspondence one password of input.Using a password one identification code of correspondence to code method, in the password of coded lock
It is troublesome in the production process of checking, it is unfavorable for quick production.
The content of the invention
The main object of the present invention be to provide a kind of coded lock to code method, it is intended to make the simpler to code of coded lock
It is convenient.
To achieve the above object, coded lock proposed by the present invention to code method, comprise the following steps:
Preparatory process, will have cog region and password identical coded lock is placed in same place, and patch shows the coded lock
Password;
To code process, by the Password Input of the coded lock into a memory, a code reader is reused to the identification
Area is scanned and is identified code, and the identification code is uploaded in memory, and corresponding with corresponding password;
Quality inspection process, the combination disk of all coded locks is dialled disorderly, checks whether the coded lock can lock, if can not
To lock, then the coded lock is regard as waste disposal;If can lock, by correct Password Input, whether the password is checked
The coded lock can be opened, if can, into subsequent processing, if can not, it regard the coded lock as waste disposal;
Scanning validation process, obtains corresponding password to the cog region barcode scanning by the code reader, verifies that this is close
Whether code can open the coded lock, if can, it is packaged preservation;If can not, the coded lock is recycled.
Alternatively, after the scanning validation process, in addition to statistical analysis process, contrast in the process to code
Whether the quantity of identification code is consistent with password quantity in scanning validation process, if unanimously, carrying out subsequent processing;If differing
Cause, re-start to code process.
Alternatively, the coded lock includes being connected with Sign Board on shell and inner casing, the shell, and the Sign Board is provided with institute
State cog region.
Alternatively, the cog region includes bar code recognition area, Quick Response Code cog region and encryption cog region, the encryption
Cog region, which has to be coated with the identification code, the encryption cog region, scrapes silver-colored figure layer.
Alternatively, it is described sweep statistical analysis process after, in addition to dial-up vanning process, by the combination disk of coded lock dial
It is random, and be respectively put into different finished product boxes.
Alternatively, the finished product box is provided with the plastics suction mould being stacked, every layer of plastics suction mould pacifies provided with several
Tankage is used to lay the coded lock.
Alternatively, the code reader is connected by connecting line with computer, and the identification code and password are calculated by described
Machine is transferred in memory and stored.
The present invention also provide a kind of coded lock to code system, including one or more coded locks, code reader and storage
Device, the coded lock has cog region, and the code reader recognizes that the cog region is identified code and corresponding with identification code close
Code, identification code described in the memory storage and corresponding password.
Alternatively, the coded lock to code system include Sign Board, the Sign Board be provided with cog region.The cog region includes
Bar code recognition area, Quick Response Code cog region and encryption cog region, the bar code recognition area and the Quick Response Code cog region quilt
The code reader identification is identified code, and the encryption cog region, which has to be coated with the identification code, the identification code, to be scraped
Silver-colored figure layer.
Alternatively, the code reader has barcode scanning module and to code module, described that code module barcode scanning module is used for right
Start during the identification domain scanning, corresponding identification code is obtained by this pair of code module;The barcode scanning module is used to test in scanning
Start during card process, corresponding password is obtained by this pair of code module.
The coded lock of technical solution of the present invention to code method, during to code, password correspondence can be achieved many
Individual identification code, so can greatly simplify the flow to code, facilitate operating personnel quickly to carry out operating code.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Structure according to these accompanying drawings obtains other accompanying drawings.
Fig. 1 is the flow chart to the embodiment of code method one of coded lock of the present invention.
Fig. 2 is the structural representation of the shell of the coded lock to the embodiment of code system one of coded lock of the present invention;
Fig. 3 is the structural representation of the inner casing of the coded lock to the embodiment of code system one of coded lock of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not made it is all its
His embodiment, belongs to the scope of protection of the invention.
It is to be appreciated that institute is directional in the embodiment of the present invention indicates that (such as up, down, left, right, before and after ...) is only used
In explaining relative position relation, motion conditions under a certain particular pose (as shown in drawings) between each part etc., if should
When particular pose changes, then directionality indicates also correspondingly therewith to change.
In addition, in the present invention such as relating to the description of " first ", " second " etc. be only used for describe purpose, and it is not intended that
Indicate or imply its relative importance or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ",
At least one this feature can be expressed or be implicitly included to the feature of " second ".In addition, the technical side between each embodiment
Case can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when the combination of technical scheme
It will be understood that the combination of this technical scheme is not present, also not in the guarantor of application claims when appearance is conflicting or can not realize
Within the scope of shield.
The present invention propose a kind of coded lock to code method.
Reference picture 1-3, Fig. 1 are the flow chart to the embodiment of code method one of coded lock of the present invention;Fig. 2 is password of the present invention
The structural representation of the shell of the coded lock to the embodiment of code system one of lock;Fig. 3 is coded lock of the present invention to code system one
The structural representation of the inner casing of the coded lock of embodiment.
Fig. 1 is refer to, in embodiments of the present invention, the coded lock comprises the following steps to code method:
Step S10:Preparatory process, will have cog region and password identical coded lock is placed in same place, and patch shows institute
State the password of coded lock.
During coded lock is produced, the password of the coded lock of the same case of production is adjusted to same password.For example
One batch totally 10000, dispenses 100 casees, and then each case sticks this close using a different password outside storage box
Code.
In the present embodiment, Fig. 2 and Fig. 3 is refer to, the coded lock includes shell 10 and shell 20, and the inner casing 20 is used to block
Close the bottleneck of bottle (not shown) and block the bottleneck of bottle, the shell 10 is nested in outside the inner casing 20, and by shell
The lock body that combination disk 11 is provided with 10 is locked by the inner casing 20 and the shell 10.Sign Board is connected with the shell 10
(not shown), the Sign Board is provided with the cog region.Certainly, bottle coded lock is only a kind of embodiment of the present invention, and this is right
Code method can also be the coded lock of other models.
The cog region includes bar code recognition area, Quick Response Code cog region and encryption cog region, the encryption cog region
With the identification code, it is coated with the encryption cog region and scrapes silver-colored figure layer.The bar code recognition area and the Quick Response Code
Cog region can be recognized by code reader and be identified code.The encryption cog region has the identification code, is coated in the identification code
Scrape silver-colored figure layer, when user will be identified code in use, scraping this off scrapes silver-colored figure layer, then with mobile phone dialing phone or
Person's scanning Quick Response Code enters website, latter four of input identification code, you can obtain corresponding password.
Step S20:To code process, by the Password Input of the coded lock a to memory, (such as large-scale data communication takes
Business device, in this, as data storage center) in, reuse code reader and the cog region is scanned and code is identified, will
The identification code is uploaded in memory, and corresponding with corresponding password.
General, the code reader is connected by connecting line with computer, and identification code and password are calculated by described
Machine is transferred in memory and stored.By computer first by Password Input, then code reader barcode scanning is identified code, and this is recognized
Code storage corresponding with password.It will be appreciated that the password in a storage box is identical, and identification code is different, namely
One password can correspond to multiple identification codes.In this way, dramatically reducing workload during to code, it is no longer necessary in scanning one
An identification code is scanned after individual password again to correspond to therewith.
Step S30:Quality inspection process, unrest is dialled by the combination disk of the coded lock, checks whether the coded lock can be with
Locking, if cannot lock, regard the coded lock as waste disposal;If can lock, correct Password Input is checked
Whether the password can open the coded lock, if can, into subsequent processing, if can not, it regard the coded lock as waste product
Processing.
The coded lock that can not be opened by the coded lock that can not be locked and after proper password input is picked out, and is put into waste product
In case.It is herein machinery checking, that is, verifies whether coded lock damages in itself, the circulation of unspoiled coded lock is entered to subsequent processing
Row continues to verify.
Step S40:Scanning validation process, corresponding password is obtained by the code reader to the cog region barcode scanning,
Verify whether the password can open the coded lock, if can, it is packaged preservation;If can not, the coded lock is reclaimed
Processing.
Code reader is opened, startup is scanned to code function to Quick Response Code or bar code, can be identified code according to scanning,
Corresponding password can obtain according to the identification code.By the code-disc of the lock body of the Password Input coded lock, verify whether that lock can be opened
Body, if can open, carries out subsequent processing.If can not open, it is put into collecting receptacle.
Step S50:In statistical analysis process, the quantity and scanning validation process that contrast the identification code in the process to code
Password quantity it is whether consistent, if unanimously, carrying out subsequent processing;If inconsistent, re-start to code process.
Specifically, in code process, memory can record the quantity of the identification code of code reader scanning, scanning validation process
In, the quantity of password obtained from memory can record code reader scanning, the two is contrasted, only the quantity when password and knowledge
When the quantity of other code is consistent, just illustrate that this does not leak operation to code process and scanning validation process.
Step S60:Dial-up vanning process, the combination disk of coded lock is dialled disorderly, is respectively put into different finished product boxes.
That is, when laying, the coded lock of different passwords is put into a finished product box so that the password of the coded lock in the finished product box
Differ.
Wherein, the finished product box is provided with the plastics suction mould being stacked, every layer of plastics suction mould installs provided with several
Groove is used to lay the coded lock.
Technical solution of the present invention coded lock to code method, during to code, password correspondence can be achieved multiple
Identification code, so can greatly simplify the flow to code, facilitate operating personnel quickly to carry out operating code.Dialling the mistake of disorderly vanning
Cheng Zhong, a coded lock is taken out out of a storage box, is put into a finished product box, is then further taken out second, be put into second
In individual finished product box.This process can be realized by mechanical sorting, can also be realized by manual sorting.In this way, in same finished product box
The password of coded lock is different, can improve the security that coded lock is used.
The present invention also propose a kind of coded lock to code system (not shown), including one or more coded locks, code reader
And memory, the coded lock has a cog region, and the code reader recognizes that the cog region is identified code and and identification code
Corresponding password, identification code described in the memory storage and corresponding password.
In the present embodiment, the coded lock to code system include Sign Board, the Sign Board be provided with cog region.The cog region
Including bar code recognition area, Quick Response Code cog region and encryption cog region, the bar code recognition area and Quick Response Code identification
Area can be identified code by code reader identification, and the encryption cog region has to be coated in the identification code, the identification code
Scrape silver-colored figure layer.
The code reader has barcode scanning module and to code module, described code module to be used for when to the identification domain scanning
Start, corresponding identification code can obtain by this pair of code module;The barcode scanning module is used to start in scanning validation process, leads to
The barcode scanning module is crossed to can obtain corresponding password and verify.
By using the coded lock to code system, during to code, the multiple identifications of password correspondence can be achieved
Code, so can greatly simplify the flow to code, facilitate operating personnel quickly to carry out operating code.
Further, the coded lock to code system also includes computer (not shown), the code reader and the meter
Calculation machine is connected, so that password and corresponding identification code are transferred in the memory by the computer.Can by computer
Convenient operation, carries out rapidly inputting and storing for password and identification code.
Further, the coded lock also includes finished product box (not shown) to code system, is provided with the finished product box
Provided with several mounting grooves for laying the coded lock in the plastics suction mould being stacked, every layer of plastics suction mould.In this way, can be square
Just the quick packing and storage of the coded lock after verifying.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every at this
Under the inventive concept of invention, the equivalent structure transformation made using description of the invention and accompanying drawing content, or directly/use indirectly
It is included in other related technical fields in the scope of patent protection of the present invention.
Claims (5)
1. a kind of coded lock to code method, it is characterised in that comprise the following steps:
Preparatory process, same password is adjusted to by the password of the coded lock of the same case of production, will have cog region and password phase
Same coded lock is placed in same case, and pastes the password for showing the coded lock;
To code process, by the Password Input of the coded lock into a memory, reuse a code reader and the cog region is entered
Row is scanned and is identified code, and the identification code is uploaded in memory, and corresponding with corresponding password;
Quality inspection process, the combination disk of all coded locks is dialled disorderly, checks whether the coded lock can lock, if cannot lock
Tightly, then it regard the coded lock as waste disposal;If can lock, by correct Password Input, check whether the password can be by
The coded lock is opened, if can, into subsequent processing, if can not, it regard the coded lock as waste disposal;
Scanning validation process, obtains corresponding password to the cog region barcode scanning by the code reader, verifies that the password is
It is no the coded lock to be opened, if can, it is packaged preservation;If can not, the coded lock is recycled;
Statistical analysis process, the quantity of identification code contrasted in the process to code is with the password quantity in scanning validation process
It is no consistent, if unanimously, carrying out subsequent processing;If inconsistent, re-start to code process;
Dial-up vanning process, the combination disk of the coded lock is dialled disorderly, and is respectively put into different finished product boxes.
2. coded lock as claimed in claim 1 to code method, it is characterised in that the coded lock include shell and inner casing,
Sign Board is connected with the shell, the Sign Board is provided with the cog region.
3. coded lock as claimed in claim 2 to code method, it is characterised in that the cog region include bar code recognition
Area, Quick Response Code cog region and encryption cog region, the encryption cog region has to be applied on the identification code, the encryption cog region
It is covered with and scrapes silver-colored figure layer.
4. coded lock as claimed in claim 1 to code method, it is characterised in that the finished product box is provided with what is be stacked
Provided with several mounting grooves for laying the coded lock in plastics suction mould, every layer of plastics suction mould.
5. coded lock as claimed in claim 1 to code method, it is characterised in that the code reader pass through connecting line with calculate
Machine is connected, and the identification code and password are transferred in memory by the computer and stored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610024926.3A CN105550622B (en) | 2016-01-14 | 2016-01-14 | Coded lock to code method and coded lock to code system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610024926.3A CN105550622B (en) | 2016-01-14 | 2016-01-14 | Coded lock to code method and coded lock to code system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105550622A CN105550622A (en) | 2016-05-04 |
CN105550622B true CN105550622B (en) | 2017-09-05 |
Family
ID=55829806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610024926.3A Active CN105550622B (en) | 2016-01-14 | 2016-01-14 | Coded lock to code method and coded lock to code system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105550622B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108952337A (en) * | 2017-05-22 | 2018-12-07 | 宋渤海 | A kind of coded lock password setting method and its coded lock authentication system |
US10842713B1 (en) | 2019-08-15 | 2020-11-24 | Secure Medication Systems, Llc | Lockable container |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102446273B (en) * | 2011-09-06 | 2013-10-02 | 贵州卓霖防伪科技有限公司 | Method for producing pair code of code-locked anti-counterfeit bottle cap |
CN102708184A (en) * | 2012-05-11 | 2012-10-03 | 贵州卓霖防伪科技有限公司 | Method for inquiring anti-fake two-dimension code of coded lock |
-
2016
- 2016-01-14 CN CN201610024926.3A patent/CN105550622B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN105550622A (en) | 2016-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104574167B (en) | Lease processing method, related device and system | |
US20210358246A1 (en) | Smart locks unlocking methods, mobile terminals, servers, and computer-readable storage media | |
CN204791234U (en) | Opening system | |
CN110737881B (en) | Fingerprint verification method and device for intelligent equipment | |
CN105550622B (en) | Coded lock to code method and coded lock to code system | |
CN106355709A (en) | Access control system and door opening method based on dynamic quick response code | |
CN108960850B (en) | Anti-counterfeiting method and device and anti-counterfeiting traceability system | |
KR20130082243A (en) | Method for authenticating using a qr code | |
Huang et al. | Data matrix code location based on finder pattern detection and bar code border fitting | |
CN206557867U (en) | Gate control system based on dynamic two-dimension code | |
CN109426716A (en) | Terminal fingerprints typing, unlocking method, device, storage medium and computer equipment | |
US20200302449A1 (en) | Hardware integration for part tracking using texture extraction and networked distributed ledgers | |
CN104734852A (en) | Identity authentication method and device | |
CN107492164B (en) | Intelligent lock control method and device, terminal equipment and readable storage medium | |
CN105743850A (en) | Method and device for obtaining user verification information during delivering of articles through express box | |
CN102708184A (en) | Method for inquiring anti-fake two-dimension code of coded lock | |
CN106686573A (en) | Method of interlocking SIM card with device | |
US20200234309A1 (en) | System, Method, and Computer Program Product for Authenticating Identification Documents | |
CN102693490A (en) | Method and system for product anti-forgery enquiry based on machine vision for individual users | |
CN110163164B (en) | Fingerprint detection method and device | |
CN106650588A (en) | Electronic sign-off method and device | |
CN106557450A (en) | A kind of express delivery extraction equipment identity identifying method and express delivery extraction equipment | |
CN111698220A (en) | Block chain anti-counterfeiting traceability verification system | |
CN104091264A (en) | Purple clay teapot identity information query system and purple clay teapot identity information query method based on raw ore particle distribution | |
KR101672599B1 (en) | Biometric authentication device and method using Bluetooth Low Energy technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 518000 Guangdong province Shenzhen city Nanshan District South Road No. 1029 building C room 704 Wanrong Patentee after: Shenzhen Mellow Internet of Things Tech Co., Ltd. Address before: 518000 Guangdong province Shenzhen city Nanshan District South Road No. 1029 building C room 704 Wanrong Patentee before: SHENZHEN GANZHI MELLOW INTERNET OF THINGS CO., LTD. |
|
CP01 | Change in the name or title of a patent holder |