CN105550622B - Coded lock to code method and coded lock to code system - Google Patents

Coded lock to code method and coded lock to code system Download PDF

Info

Publication number
CN105550622B
CN105550622B CN201610024926.3A CN201610024926A CN105550622B CN 105550622 B CN105550622 B CN 105550622B CN 201610024926 A CN201610024926 A CN 201610024926A CN 105550622 B CN105550622 B CN 105550622B
Authority
CN
China
Prior art keywords
code
coded lock
password
cog region
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610024926.3A
Other languages
Chinese (zh)
Other versions
CN105550622A (en
Inventor
宋渤海
熊国强
张晓杉
程宏威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Mellow Internet of Things Tech Co., Ltd.
Original Assignee
Shenzhen Ganzhi Mellow Internet Of Things Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=55829806&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN105550622(B) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Shenzhen Ganzhi Mellow Internet Of Things Co Ltd filed Critical Shenzhen Ganzhi Mellow Internet Of Things Co Ltd
Priority to CN201610024926.3A priority Critical patent/CN105550622B/en
Publication of CN105550622A publication Critical patent/CN105550622A/en
Application granted granted Critical
Publication of CN105550622B publication Critical patent/CN105550622B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14131D bar codes
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B37/00Permutation or combination locks; Puzzle locks
    • E05B37/20Puzzle locks, e.g. of labyrinth type; Fasteners with hidden or secret actuating mechanisms
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B65/00Locks or fastenings for special use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention disclose a kind of coded lock to code method, this method comprises the following steps:Preparatory process, same password is adjusted to by the password of the coded lock of the same case of production, will have cog region and password identical coded lock is placed in same case, and patch shows the password of coded lock in this place;To code process, by the Password Input of coded lock to that should locate into memory, reuse code reader and cog region is scanned and code is identified, the identification code is uploaded in memory, and it is corresponding with corresponding password;Process is verified in quality inspection;Scanning validation process, corresponding password is obtained to the cog region barcode scanning by the code reader, verify whether the password can open the coded lock, whether statistical analysis process is consistent with password quantity in scanning validation process to the quantity that compares the identification code in code process;Dial-up vanning process, the combination disk of the coded lock is dialled disorderly, and is respectively put into different finished product boxes.Technical solution of the present invention can be realized quick to code.

Description

Coded lock to code method and coded lock to code system
Technical field
The present invention relates to coded lock to code technical field, more particularly to a kind of coded lock to code method and pair of coded lock Code system.
Background technology
As the improvement of people's living standards, the demand for the especially high-grade drinks of drinks is more and more vigorous.However, existing In market, fake wine is more and more, causes user to there is the drinks of many brands and queries.Manufacturer's widespread practice is by password The bottleneck for locking to lock bottle carries out false proof.Coded lock needs a password one identification code of correspondence during to code, namely sweeps Retouch an identification code, correspondence one password of input.Using a password one identification code of correspondence to code method, in the password of coded lock It is troublesome in the production process of checking, it is unfavorable for quick production.
The content of the invention
The main object of the present invention be to provide a kind of coded lock to code method, it is intended to make the simpler to code of coded lock It is convenient.
To achieve the above object, coded lock proposed by the present invention to code method, comprise the following steps:
Preparatory process, will have cog region and password identical coded lock is placed in same place, and patch shows the coded lock Password;
To code process, by the Password Input of the coded lock into a memory, a code reader is reused to the identification Area is scanned and is identified code, and the identification code is uploaded in memory, and corresponding with corresponding password;
Quality inspection process, the combination disk of all coded locks is dialled disorderly, checks whether the coded lock can lock, if can not To lock, then the coded lock is regard as waste disposal;If can lock, by correct Password Input, whether the password is checked The coded lock can be opened, if can, into subsequent processing, if can not, it regard the coded lock as waste disposal;
Scanning validation process, obtains corresponding password to the cog region barcode scanning by the code reader, verifies that this is close Whether code can open the coded lock, if can, it is packaged preservation;If can not, the coded lock is recycled.
Alternatively, after the scanning validation process, in addition to statistical analysis process, contrast in the process to code Whether the quantity of identification code is consistent with password quantity in scanning validation process, if unanimously, carrying out subsequent processing;If differing Cause, re-start to code process.
Alternatively, the coded lock includes being connected with Sign Board on shell and inner casing, the shell, and the Sign Board is provided with institute State cog region.
Alternatively, the cog region includes bar code recognition area, Quick Response Code cog region and encryption cog region, the encryption Cog region, which has to be coated with the identification code, the encryption cog region, scrapes silver-colored figure layer.
Alternatively, it is described sweep statistical analysis process after, in addition to dial-up vanning process, by the combination disk of coded lock dial It is random, and be respectively put into different finished product boxes.
Alternatively, the finished product box is provided with the plastics suction mould being stacked, every layer of plastics suction mould pacifies provided with several Tankage is used to lay the coded lock.
Alternatively, the code reader is connected by connecting line with computer, and the identification code and password are calculated by described Machine is transferred in memory and stored.
The present invention also provide a kind of coded lock to code system, including one or more coded locks, code reader and storage Device, the coded lock has cog region, and the code reader recognizes that the cog region is identified code and corresponding with identification code close Code, identification code described in the memory storage and corresponding password.
Alternatively, the coded lock to code system include Sign Board, the Sign Board be provided with cog region.The cog region includes Bar code recognition area, Quick Response Code cog region and encryption cog region, the bar code recognition area and the Quick Response Code cog region quilt The code reader identification is identified code, and the encryption cog region, which has to be coated with the identification code, the identification code, to be scraped Silver-colored figure layer.
Alternatively, the code reader has barcode scanning module and to code module, described that code module barcode scanning module is used for right Start during the identification domain scanning, corresponding identification code is obtained by this pair of code module;The barcode scanning module is used to test in scanning Start during card process, corresponding password is obtained by this pair of code module.
The coded lock of technical solution of the present invention to code method, during to code, password correspondence can be achieved many Individual identification code, so can greatly simplify the flow to code, facilitate operating personnel quickly to carry out operating code.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Structure according to these accompanying drawings obtains other accompanying drawings.
Fig. 1 is the flow chart to the embodiment of code method one of coded lock of the present invention.
Fig. 2 is the structural representation of the shell of the coded lock to the embodiment of code system one of coded lock of the present invention;
Fig. 3 is the structural representation of the inner casing of the coded lock to the embodiment of code system one of coded lock of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Base Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not made it is all its His embodiment, belongs to the scope of protection of the invention.
It is to be appreciated that institute is directional in the embodiment of the present invention indicates that (such as up, down, left, right, before and after ...) is only used In explaining relative position relation, motion conditions under a certain particular pose (as shown in drawings) between each part etc., if should When particular pose changes, then directionality indicates also correspondingly therewith to change.
In addition, in the present invention such as relating to the description of " first ", " second " etc. be only used for describe purpose, and it is not intended that Indicate or imply its relative importance or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", At least one this feature can be expressed or be implicitly included to the feature of " second ".In addition, the technical side between each embodiment Case can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when the combination of technical scheme It will be understood that the combination of this technical scheme is not present, also not in the guarantor of application claims when appearance is conflicting or can not realize Within the scope of shield.
The present invention propose a kind of coded lock to code method.
Reference picture 1-3, Fig. 1 are the flow chart to the embodiment of code method one of coded lock of the present invention;Fig. 2 is password of the present invention The structural representation of the shell of the coded lock to the embodiment of code system one of lock;Fig. 3 is coded lock of the present invention to code system one The structural representation of the inner casing of the coded lock of embodiment.
Fig. 1 is refer to, in embodiments of the present invention, the coded lock comprises the following steps to code method:
Step S10:Preparatory process, will have cog region and password identical coded lock is placed in same place, and patch shows institute State the password of coded lock.
During coded lock is produced, the password of the coded lock of the same case of production is adjusted to same password.For example One batch totally 10000, dispenses 100 casees, and then each case sticks this close using a different password outside storage box Code.
In the present embodiment, Fig. 2 and Fig. 3 is refer to, the coded lock includes shell 10 and shell 20, and the inner casing 20 is used to block Close the bottleneck of bottle (not shown) and block the bottleneck of bottle, the shell 10 is nested in outside the inner casing 20, and by shell The lock body that combination disk 11 is provided with 10 is locked by the inner casing 20 and the shell 10.Sign Board is connected with the shell 10 (not shown), the Sign Board is provided with the cog region.Certainly, bottle coded lock is only a kind of embodiment of the present invention, and this is right Code method can also be the coded lock of other models.
The cog region includes bar code recognition area, Quick Response Code cog region and encryption cog region, the encryption cog region With the identification code, it is coated with the encryption cog region and scrapes silver-colored figure layer.The bar code recognition area and the Quick Response Code Cog region can be recognized by code reader and be identified code.The encryption cog region has the identification code, is coated in the identification code Scrape silver-colored figure layer, when user will be identified code in use, scraping this off scrapes silver-colored figure layer, then with mobile phone dialing phone or Person's scanning Quick Response Code enters website, latter four of input identification code, you can obtain corresponding password.
Step S20:To code process, by the Password Input of the coded lock a to memory, (such as large-scale data communication takes Business device, in this, as data storage center) in, reuse code reader and the cog region is scanned and code is identified, will The identification code is uploaded in memory, and corresponding with corresponding password.
General, the code reader is connected by connecting line with computer, and identification code and password are calculated by described Machine is transferred in memory and stored.By computer first by Password Input, then code reader barcode scanning is identified code, and this is recognized Code storage corresponding with password.It will be appreciated that the password in a storage box is identical, and identification code is different, namely One password can correspond to multiple identification codes.In this way, dramatically reducing workload during to code, it is no longer necessary in scanning one An identification code is scanned after individual password again to correspond to therewith.
Step S30:Quality inspection process, unrest is dialled by the combination disk of the coded lock, checks whether the coded lock can be with Locking, if cannot lock, regard the coded lock as waste disposal;If can lock, correct Password Input is checked Whether the password can open the coded lock, if can, into subsequent processing, if can not, it regard the coded lock as waste product Processing.
The coded lock that can not be opened by the coded lock that can not be locked and after proper password input is picked out, and is put into waste product In case.It is herein machinery checking, that is, verifies whether coded lock damages in itself, the circulation of unspoiled coded lock is entered to subsequent processing Row continues to verify.
Step S40:Scanning validation process, corresponding password is obtained by the code reader to the cog region barcode scanning, Verify whether the password can open the coded lock, if can, it is packaged preservation;If can not, the coded lock is reclaimed Processing.
Code reader is opened, startup is scanned to code function to Quick Response Code or bar code, can be identified code according to scanning, Corresponding password can obtain according to the identification code.By the code-disc of the lock body of the Password Input coded lock, verify whether that lock can be opened Body, if can open, carries out subsequent processing.If can not open, it is put into collecting receptacle.
Step S50:In statistical analysis process, the quantity and scanning validation process that contrast the identification code in the process to code Password quantity it is whether consistent, if unanimously, carrying out subsequent processing;If inconsistent, re-start to code process.
Specifically, in code process, memory can record the quantity of the identification code of code reader scanning, scanning validation process In, the quantity of password obtained from memory can record code reader scanning, the two is contrasted, only the quantity when password and knowledge When the quantity of other code is consistent, just illustrate that this does not leak operation to code process and scanning validation process.
Step S60:Dial-up vanning process, the combination disk of coded lock is dialled disorderly, is respectively put into different finished product boxes. That is, when laying, the coded lock of different passwords is put into a finished product box so that the password of the coded lock in the finished product box Differ.
Wherein, the finished product box is provided with the plastics suction mould being stacked, every layer of plastics suction mould installs provided with several Groove is used to lay the coded lock.
Technical solution of the present invention coded lock to code method, during to code, password correspondence can be achieved multiple Identification code, so can greatly simplify the flow to code, facilitate operating personnel quickly to carry out operating code.Dialling the mistake of disorderly vanning Cheng Zhong, a coded lock is taken out out of a storage box, is put into a finished product box, is then further taken out second, be put into second In individual finished product box.This process can be realized by mechanical sorting, can also be realized by manual sorting.In this way, in same finished product box The password of coded lock is different, can improve the security that coded lock is used.
The present invention also propose a kind of coded lock to code system (not shown), including one or more coded locks, code reader And memory, the coded lock has a cog region, and the code reader recognizes that the cog region is identified code and and identification code Corresponding password, identification code described in the memory storage and corresponding password.
In the present embodiment, the coded lock to code system include Sign Board, the Sign Board be provided with cog region.The cog region Including bar code recognition area, Quick Response Code cog region and encryption cog region, the bar code recognition area and Quick Response Code identification Area can be identified code by code reader identification, and the encryption cog region has to be coated in the identification code, the identification code Scrape silver-colored figure layer.
The code reader has barcode scanning module and to code module, described code module to be used for when to the identification domain scanning Start, corresponding identification code can obtain by this pair of code module;The barcode scanning module is used to start in scanning validation process, leads to The barcode scanning module is crossed to can obtain corresponding password and verify.
By using the coded lock to code system, during to code, the multiple identifications of password correspondence can be achieved Code, so can greatly simplify the flow to code, facilitate operating personnel quickly to carry out operating code.
Further, the coded lock to code system also includes computer (not shown), the code reader and the meter Calculation machine is connected, so that password and corresponding identification code are transferred in the memory by the computer.Can by computer Convenient operation, carries out rapidly inputting and storing for password and identification code.
Further, the coded lock also includes finished product box (not shown) to code system, is provided with the finished product box Provided with several mounting grooves for laying the coded lock in the plastics suction mould being stacked, every layer of plastics suction mould.In this way, can be square Just the quick packing and storage of the coded lock after verifying.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the scope of the invention, it is every at this Under the inventive concept of invention, the equivalent structure transformation made using description of the invention and accompanying drawing content, or directly/use indirectly It is included in other related technical fields in the scope of patent protection of the present invention.

Claims (5)

1. a kind of coded lock to code method, it is characterised in that comprise the following steps:
Preparatory process, same password is adjusted to by the password of the coded lock of the same case of production, will have cog region and password phase Same coded lock is placed in same case, and pastes the password for showing the coded lock;
To code process, by the Password Input of the coded lock into a memory, reuse a code reader and the cog region is entered Row is scanned and is identified code, and the identification code is uploaded in memory, and corresponding with corresponding password;
Quality inspection process, the combination disk of all coded locks is dialled disorderly, checks whether the coded lock can lock, if cannot lock Tightly, then it regard the coded lock as waste disposal;If can lock, by correct Password Input, check whether the password can be by The coded lock is opened, if can, into subsequent processing, if can not, it regard the coded lock as waste disposal;
Scanning validation process, obtains corresponding password to the cog region barcode scanning by the code reader, verifies that the password is It is no the coded lock to be opened, if can, it is packaged preservation;If can not, the coded lock is recycled;
Statistical analysis process, the quantity of identification code contrasted in the process to code is with the password quantity in scanning validation process It is no consistent, if unanimously, carrying out subsequent processing;If inconsistent, re-start to code process;
Dial-up vanning process, the combination disk of the coded lock is dialled disorderly, and is respectively put into different finished product boxes.
2. coded lock as claimed in claim 1 to code method, it is characterised in that the coded lock include shell and inner casing, Sign Board is connected with the shell, the Sign Board is provided with the cog region.
3. coded lock as claimed in claim 2 to code method, it is characterised in that the cog region include bar code recognition Area, Quick Response Code cog region and encryption cog region, the encryption cog region has to be applied on the identification code, the encryption cog region It is covered with and scrapes silver-colored figure layer.
4. coded lock as claimed in claim 1 to code method, it is characterised in that the finished product box is provided with what is be stacked Provided with several mounting grooves for laying the coded lock in plastics suction mould, every layer of plastics suction mould.
5. coded lock as claimed in claim 1 to code method, it is characterised in that the code reader pass through connecting line with calculate Machine is connected, and the identification code and password are transferred in memory by the computer and stored.
CN201610024926.3A 2016-01-14 2016-01-14 Coded lock to code method and coded lock to code system Active CN105550622B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610024926.3A CN105550622B (en) 2016-01-14 2016-01-14 Coded lock to code method and coded lock to code system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610024926.3A CN105550622B (en) 2016-01-14 2016-01-14 Coded lock to code method and coded lock to code system

Publications (2)

Publication Number Publication Date
CN105550622A CN105550622A (en) 2016-05-04
CN105550622B true CN105550622B (en) 2017-09-05

Family

ID=55829806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610024926.3A Active CN105550622B (en) 2016-01-14 2016-01-14 Coded lock to code method and coded lock to code system

Country Status (1)

Country Link
CN (1) CN105550622B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108952337A (en) * 2017-05-22 2018-12-07 宋渤海 A kind of coded lock password setting method and its coded lock authentication system
US10842713B1 (en) 2019-08-15 2020-11-24 Secure Medication Systems, Llc Lockable container

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102446273B (en) * 2011-09-06 2013-10-02 贵州卓霖防伪科技有限公司 Method for producing pair code of code-locked anti-counterfeit bottle cap
CN102708184A (en) * 2012-05-11 2012-10-03 贵州卓霖防伪科技有限公司 Method for inquiring anti-fake two-dimension code of coded lock

Also Published As

Publication number Publication date
CN105550622A (en) 2016-05-04

Similar Documents

Publication Publication Date Title
CN104574167B (en) Lease processing method, related device and system
US20210358246A1 (en) Smart locks unlocking methods, mobile terminals, servers, and computer-readable storage media
CN204791234U (en) Opening system
CN110737881B (en) Fingerprint verification method and device for intelligent equipment
CN105550622B (en) Coded lock to code method and coded lock to code system
CN106355709A (en) Access control system and door opening method based on dynamic quick response code
CN108960850B (en) Anti-counterfeiting method and device and anti-counterfeiting traceability system
KR20130082243A (en) Method for authenticating using a qr code
Huang et al. Data matrix code location based on finder pattern detection and bar code border fitting
CN206557867U (en) Gate control system based on dynamic two-dimension code
CN109426716A (en) Terminal fingerprints typing, unlocking method, device, storage medium and computer equipment
US20200302449A1 (en) Hardware integration for part tracking using texture extraction and networked distributed ledgers
CN104734852A (en) Identity authentication method and device
CN107492164B (en) Intelligent lock control method and device, terminal equipment and readable storage medium
CN105743850A (en) Method and device for obtaining user verification information during delivering of articles through express box
CN102708184A (en) Method for inquiring anti-fake two-dimension code of coded lock
CN106686573A (en) Method of interlocking SIM card with device
US20200234309A1 (en) System, Method, and Computer Program Product for Authenticating Identification Documents
CN102693490A (en) Method and system for product anti-forgery enquiry based on machine vision for individual users
CN110163164B (en) Fingerprint detection method and device
CN106650588A (en) Electronic sign-off method and device
CN106557450A (en) A kind of express delivery extraction equipment identity identifying method and express delivery extraction equipment
CN111698220A (en) Block chain anti-counterfeiting traceability verification system
CN104091264A (en) Purple clay teapot identity information query system and purple clay teapot identity information query method based on raw ore particle distribution
KR101672599B1 (en) Biometric authentication device and method using Bluetooth Low Energy technique

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 518000 Guangdong province Shenzhen city Nanshan District South Road No. 1029 building C room 704 Wanrong

Patentee after: Shenzhen Mellow Internet of Things Tech Co., Ltd.

Address before: 518000 Guangdong province Shenzhen city Nanshan District South Road No. 1029 building C room 704 Wanrong

Patentee before: SHENZHEN GANZHI MELLOW INTERNET OF THINGS CO., LTD.

CP01 Change in the name or title of a patent holder