CN107316367A - A kind of lock, Quick Response Code mark, coded lock power supply module that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone - Google Patents

A kind of lock, Quick Response Code mark, coded lock power supply module that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone Download PDF

Info

Publication number
CN107316367A
CN107316367A CN201710752787.0A CN201710752787A CN107316367A CN 107316367 A CN107316367 A CN 107316367A CN 201710752787 A CN201710752787 A CN 201710752787A CN 107316367 A CN107316367 A CN 107316367A
Authority
CN
China
Prior art keywords
password
lock
quick response
response code
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710752787.0A
Other languages
Chinese (zh)
Other versions
CN107316367B (en
Inventor
陈蜀乔
龙文凯
郭荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weihai Chuanghui Information Technology Co.,Ltd.
Original Assignee
龙文凯
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 龙文凯 filed Critical 龙文凯
Priority to CN201710752787.0A priority Critical patent/CN107316367B/en
Publication of CN107316367A publication Critical patent/CN107316367A/en
Application granted granted Critical
Publication of CN107316367B publication Critical patent/CN107316367B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/00484Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a variable code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • G07C2009/0065Power supply for the lock by solar energy
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to a kind of lock, Quick Response Code mark, coded lock power supply module that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, belong to electronic information and shared lock technology field.The present invention is pressed key, keyboard conductive rubber etc. and constituted by 4 combination disks, 4 cipher rotary knobs, Quick Response Code mark, Quick Response Code built-in hole, elastic force;Each Quick Response Code correspond to an independent function Fn, and this function is present in shaped variable trick lock(8)In internal memory and in back-stage management server function library, as long as there is identical initial value, identical operation result is just had, sending Quick Response Code acquisition input password by mobile phone scanning is unlocked.Realize variable cipher function;When inputing password by mistake continuous more than three times, give a warning;It can complete voluntarily to charge.Lockset Quick Response Code is scanned by mobile phone and realizes logistics net function, the exploitation of lockset cost and early stage lock management program is greatly reduced, only backstage management procedure need to be developed.

Description

It is a kind of to scan lock, Quick Response Code that Quick Response Code respective function obtains variable cipher with mobile phone Mark, coded lock power supply module
Technical field
The present invention relates to it is a kind of with mobile phone scan Quick Response Code respective function obtain the lock of variable cipher, Quick Response Code identify, it is close Code lock power supply module, belongs to electronic information and shared lock technology field.
Background technology
The bicycle lock that the shared bicycles of OFO are used is not directly entered Internet of Things, but by using the people of shared car Realized when scanning with the interaction of network, adopt the R & D Cost that can substantially reduce early stage in such a way and voluntarily The production cost of lock, this is for just entering the enterprise of shared platform, and this pattern is very valuable business mould Formula, can substantially reduce R&D costs, be easy to promote.But this this pattern exist one it is serious the problem of be exactly OFO locks Password can not change, for bicycle, because bicycle parking position is not fixed, this is just greatly alleviated The disadvantage that OFO locks are present.Nonetheless, much want that the people gained extra advantage by unfair means still always enjoys it to deciphering lock.Little Huang bicycles Lock and password are all fixed, and somebody, which unlocks, to be known after password, as long as ensureing that vehicle is not ridden away, can just continue input close Code freely uses bicycle;Someone establishes little Huang bicycle passwords with this and shares group, a considerable number of.It is existing nationwide close among these The shared group of code, password for also having each specific place shares group, and many people directly represent in QQ group chats, by password can in order to avoid Take and use little Huang bicycles.Substantial amounts of energy is put into for this OFO company, OFO third generations lock is it may be said that reached specialty The people of unlocking level can guess out its password.It may be said that substantially increase the normal function rate of little Huang cars, prevented 90% with On the strip wool masses.Forth generation intelligence little Huang car locks are more characteristic be this lock only had four numerals by Key, still using four pin mode unblocks.Only four buttons are looked, the position of password is few, and the password that four bit combinations go out Quantity is also seldom, still, it is desirable to crack hardly possible.After continuously password is inputed by mistake several times, lock can send alarm, and forbid User inputs password, could recover after waiting for a period of time.Although only four passwords, the maximum characteristic of bicycle is shared It is exactly that mobility is high, even if you remember the password of this car, also differing surely rides up to tomorrow.From the point of view of such situation, OFO Lock does not solve the problem of password is variable all the time.From the point of view of present case, the problem of being faced with awkward, if password is not Become, the shared equipment provided will gratuitously be taken;If without using password, and using internet management, it is meant that preceding Phase development cost is too high.Therefore, exploitation variable cipher lockset can solve above-mentioned double-barreled question.
The content of the invention
Scan Quick Response Code respective function it is an object of the invention to provide a kind of with mobile phone and obtain the locking of variable cipher, two dimension Code mark, coded lock power supply module.
It is a kind of to scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, it is characterised in that:Swept including logical mobile phone Code Quick Response Code obtains variable cipher part and built-in function changes unlocking coded lock part;
Part I:Mobile phone barcode scanning Quick Response Code, which obtains variable cipher part, to be used to look into managing web background server by mobile phone Ask correspondence Quick Response Code function and obtain variable cipher;
Part II:Built-in function, which changes unlocking coded lock part, to be used to input unlatching shaped variable trick lock(8)Password;
The Part I mobile phone barcode scanning Quick Response Code obtains variable cipher part and includes two modules:
1)Quick Response Code mark module:Quick Response Code is identified(10)It is pasted onto cipher lock panel(22)On, Quick Response Code mark(10)In The heart is provided with Quick Response Code built-in hole(13), pass through Quick Response Code built-in hole(13)It can be seen that lock pin(12), in the lock pin(12)Above It is pasted with mark patch(11), in lock pin(12)It is provided with lock knob(9), lock knob(9)Can be in cipher lock panel(22)On open up Moved in hole slot, it is preceding to push away, lock, at the same time mark patch(11)Travel forward, shaped variable trick lock is in blocking, from two Tie up code built-in hole(13)Seen for blank, pusher is then opened(As shown in Figure 8), at the same time mark patch(11)Transport backward Dynamic, shaped variable trick lock is in opening, from Quick Response Code built-in hole(13)Seen for black, pass through Quick Response Code built-in hole (13)Interior mark can differentiate shaped variable trick lock(8)Open and-shut mode.
2)Managing web background server function library inquiry obtains crypto module:Each Quick Response Code correspond to an independence Function Fn in one of them, this function is present in shaped variable trick lock(8)In internal memory, constitute password and change the sub- journey of function Sequence;Identical function Fn is existed in platform management server function library simultaneously, as long as there is identical initial value, is just had Identical operation result;After mobile phone scanning Quick Response Code, Quick Response Code is sent to back-stage management by the special nets of wireless Internet Function library inquiry Quick Response Code respective function Fn, Quick Response Code built-in hole(13)For blank, coded lock is in blocking;Quick Response Code Built-in hole(13)For black, coded lock is in unlocking condition, and server program can be according to shaped variable trick lock(8)Quick Response Code in Put hole(13)Black and white state obtain lock open and-shut mode;If shaped variable trick lock(8)In blocking, then according to the two dimension Code inquiry respective function and functional value, carry out functional operation Fn (x) for initial value according to the password value x of last time input and go out knot Really, existing password Fn (x)=Y is calculated;Or functional operation Fn (m) is carried out according to unlocking times m go out Structure Calculation and have Password Fn (m)=Y;Or FN (t)=Y is calculated according to time t;Functional value Y is sent to client as password by corresponding app Mobile phone on;If coded lock is in unlocking condition, checkout information is sent out to client, reminds client's checkout.
The Part II changes password unlocking part by built-in function includes following 5 submodules:
1)Keyboard password input submodule;2)Power supply module;3)Single-chip microcomputer model and reset oscillating circuit submodule;4)Unlock electric Way module; 5)Sound light alarming circuit submodule;Wherein:
1)Keyboard password input submodule includes again:Password Input submodule hardware components, Password Input modular circuit part and Control and password change module;
A. Password Input submodule hardware components are by 4 combination disks(1), 4 cipher rotary knobs(3), 16 numeral identifications(2), it is close Code knob(3), button pallet(17), cross recess(18), force turn round nail(19), elastic force pressing key(20), keyboard conductive rubber (21), cipher lock panel(22), back-moving spring(23)Constitute;Cipher rotary knob(3)With cipher lock panel(22)Between be provided with it is multiple Position spring(23), cipher rotary knob(3)Axle be sleeve structure, nested knob generating gear(5)Upper shaft, the axle is provided with cross Groove(18), cipher rotary knob(3)Quill on the inside of provided with force turn round nail(19), embedded knob generating gear(5)The ten of upper shaft Word groove(18)It is interior, cipher rotary knob(3)The bottom of quill weld elastic pressing key(20), elastic force pressing key(20)Lower section For button pallet(17), the button pallet(17)Pass through connection sheet and the cipher lock panel of top(22)It is fixed, the button pallet (17)It is pasted with keyboard conductive rubber(21).
B. Password Input modular circuit part:Password Input modular circuit part:4 keys of Password Input are interference key board Designed using determinant, 16 buttons line up 4 × 4 matrixes.In design using 8 I/O lines of AT89C51 ports 2 do 16 by The keyboard scan of key, scanning signal is sent out by P2.0~P2.3, and P2.4~P2.7 reads button data return code(Such as Fig. 4 institutes Show), detect which button is pressed in the way of program scanning, single pass one row, 4 buttons, the order of scanning is as follows:
(a) send out scanning signal 1110 to scan 4 buttons of C1 row, read button data, judge whether the row have key to press, If there is key to be pressed, the key being pressed is connected to, line of return state is 0;
(b) send out scanning signal 1101 to scan 4 buttons of C2 row, read button data, judge whether the row have key to press, If there is key to be pressed, the key being pressed is connected to, line of return state is 0;
(c) send out scanning signal 1011 to scan 4 buttons of C3 row, read button data, judge whether the row have key to press, If there is key to be pressed, the key being pressed is connected to, line of return state is 0;
(d) send out scanning signal 0111 to scan 4 buttons of C4 row, read button data, judge whether the row have key to press, If there is key to be pressed, the key being pressed is connected to, line of return state is 0;
(e) return to that step (a) is continuous to do key scan;
The step of above, is continuously repeated, if a button is pressed, and the button is decoded out, when a certain button is pressed, Its keypad numerals is to count numbering.
C. control program and password change module section:The coding lock system is programmed using assembler language, system journey Sequence includes main program, keyboard scan subprogram, password multilevel iudge subprogram, Modify password subprogram, sound and light alarm and delay Subprogram.
A) main program is controlled(Its flow chart is as shown in Figure 5):
The initialization of the function of the module including system, the setting of system initial password, call password multilevel iudge, Modify password Etc. program module;Password determining program is placed in main program, is read when having button, is judged when determination key is pressed;In journey The space of 4 bytes is set to deposit the password of setting and the data of 4 bytes storage input through keyboard in sequence;According to the keyboard data of reading With password successive appraximation set in advance it may determine that input password correctness, by the password of input through keyboard with set it is close Code is compared, if password is correct, is unlocked, after unlocking terminates, and with this password Y inputs for initial value, calls password to change Function Fn subprograms, obtain new password;If incorrect, Password Input counting how many times element count does not reach such as 3 times, returns Keyboard scan module.
b)Password changes module, is following one kind therein:
1) last password is called to change crypto module:Only lock is opened, and can just perform password modification action, password modification Program requirement recalls last password x, with this password x inputs for initial value, calls password to change function Fn subprograms, carries out Functional operation Fn (x) goes out result, Fn (x)=y, and the value constitutes new password deposit internal memory and preserved;During specific unlocking, Yong Hutong Cross mobile phone to sweep the Quick Response Code of this coded lock, this Quick Response Code be sent to the inquiry of managing web background server, password Y is obtained, Password value Y and single-chip microcomputer internal memory password y carry out additive operation, if result is zero, show that password is correct, then unlock, It is initial value that x=y is taken after unlocking, calls password to change function Fn subprograms, obtains new password deposit internal memory and preserves, under wait Once unlock;Unlock each time successfully, password just changes once.
2) allocating time function changes crypto module:Server is with being respectively provided with the same functions with time correlation in coded lock Fn (t), function Fn (t) regularly update password Y according to fixed time interval, and user scans Quick Response Code by mobile phone and sends clothes Business device obtains password Y from server, and password Y is inputted during unlocking and is compared with password in single-chip microcomputer, is unlocked when password is identical, no Coded lock is not opened simultaneously.
3)Unlocking times function is called to change crypto module:Server is identical with time correlation with being respectively provided with coded lock Function Fn (m), is often performed when once unlocking and shut, and single-chip microcomputer counts m in coded lock, simultaneously closes off after lockset, user passes through Scan the mode of Quick Response Code payment and send a signal to server, server counts m by the payment information that receives, server and Single-chip microcomputer call function Fn (m) generation passwords Y inside coded lock;Sent when opening institute by way of scanning Quick Response Code to server Acquisition of information function Fn (m) password, is compared by inputting password Y to coded lock, coded lock is opened when the two is identical, different When coded lock do not open.
b)The acquisition and unlocking of new password:User sweeps the Quick Response Code of this coded lock by mobile phone, and this Quick Response Code is sent To the inquiry of managing web background server, password Y is obtained, password value Y and single-chip microcomputer internal memory password y carry out additive operation, If result is zero, shows that password is correct, then unlock, it is initial value that x=y is taken after unlocking, call password to change function Fn Program, obtains new password deposit internal memory and preserves, wait is unlocked next time.Unlock each time successfully, password just changes once.Its journey Program flow diagram is as shown in Figure 6.
2)Power supply module, for shaped variable trick lock(8)In the case of being inputted again without any external electric energy, confession is realized Electricity;
Shaped variable trick lock(8)Power supply module is divided into mechanical charge and solar recharging two parts:
a)Mechanical charge:By 4 combination disks(1), 4 cipher rotary knobs(3), 16 numeral identifications(2), microgenerator(4)With And knob generating gear(5)Constitute;Cipher rotary knob(3)With knob generating gear(5)It is coaxially connected, cipher rotary knob(3)Here is Combination disk(1), combination disk(1)It is pasted onto panel surface, cipher rotary knob(3)With knob generating gear(5)Between have panel isolation, 4 knob generating gears(5)While and motor gear(24)Engagement, 4 knob generating gears(5)Do not engage each other(Such as Fig. 7 institutes Show), motor gear(24)With microgenerator(4)Coaxially;Microgenerator(4)Output circuit concatenates rectifier bridge stack(6)And connect Rechargeable battery(7), rechargeable battery(7)For shaped variable trick lock(8)Electric energy is provided;
b)Solar recharging:By solar panel(14), voltage-regulator diode(15), anti-return diode(16)Constitute;The sun Can cell panel(14)Output reversely concatenates voltage-regulator diode(15)It is positive afterwards to concatenate anti-return diode(16).
3)Single-chip microcomputer and reset oscillating circuit submodule
The present invention uses AT89C51 single-chip microcomputers, has a high gain inverting amplifier, its input in AT89C51 chip internals For chip pin XTAL1, its output end is pin XTAL2;And crystal oscillation is bridged between chip internal, XTAL1 and XTAL2 Device and trimmer, so that a stable self-excited oscillator is constituted, here it is the clock circuit of single-chip microcomputer, in present invention use Electrification reset circuit.
4)Unlocking circuit module submodule
When user inputs correct password, the P3.5 mouths of AT89C51 system just export high level signal, and transistor saturation is led Logical, relay adhesive, driving electronic fractional motor running, electronic lock is opened;Conversely, when the password of input error, single-chip microcomputer AT89C51 P3.5 mouths output low level, transistor cutoff, relay is unable to adhesive, and motor is inoperative.Circuit is as shown in Figure 3.
5)Sound light alarming circuit submodule
By 555 timer U2, the composition sound light alarming circuit such as loudspeaker LS1, common red light emitting diodes LED2.
Further, described a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to aobvious Show and unlocking times n or time t is shown on module and function resets switch, display module, function resets switch passes through single-chip microcomputer I/O mouthfuls of connection single-chip microcomputers, by press function resets switch can be inputted using keyboard password input submodule correct number of times m and Time t, so as to change the functional value inside single-chip microcomputer;When described server is sent to client password, server note is contained The unlocking numerical value m or time t of record;, can when user, which repeatedly inputs, not to be unlocked successfully yet after the password obtained from server Number of times m and time t that server issues user are inputted using with keyboard password input submodule, so as to change inside single-chip microcomputer Functional value.
Further, a kind of described lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to shake Dynamic sensor assembly, shock sensor module is by single-chip processor i/o mouthful connection single-chip microcomputer, when coded lock is closed and is shaken Dynamic sensor assembly is detected can send signal to single-chip microcomputer after sharp pounding, the alarm of MCU driving alarm module.
Further, a kind of described lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to indigo plant Tooth communication module, bluetooth communication can be passed through by single-chip processor i/o mouthful connection single-chip microcomputer, bluetooth communication with handheld device Bluetooth is communicated, and is realized exchanging information for server and single-chip microcomputer by handheld device, is made server to solve error correction information Functional operation with single-chip microcomputer is consistent, while the password obtained from server can also be sent to by single-chip microcomputer by handheld device, Password comparison is carried out by single-chip microcomputer and realizes unlocking function.
Operation principle:
Quick Response Code is identified(10)It is pasted onto cipher lock panel(22)On, Quick Response Code mark(10)Be provided centrally with built in Quick Response Code Hole(13), pass through Quick Response Code built-in hole(13)It can be seen that lock pin(12), in the lock pin(12)Mark patch is pasted with above(11), Lock pin(12)It is provided with lock knob(9), lock knob(9)Can be in cipher lock panel(22)On move in the hole slot that opens up, it is preceding to push away, lock Tightly, at the same time mark is pasted(11)Travel forward, shaped variable trick lock is in blocking, from Quick Response Code built-in hole(13)Seen For blank, pusher is then opened(As shown in Figure 8), at the same time mark patch(11)Move backward, shaped variable trick lock, which is in, to be opened State, from Quick Response Code built-in hole(13)Seen for black, pass through Quick Response Code built-in hole(13)Interior mark can differentiate can Become coded lock(8)Open and-shut mode.
Managing web background server function library inquiry obtains crypto module:Each Quick Response Code correspond to one it is independent One of them in function Fn, this function is present in shaped variable trick lock(8)In internal memory, constitute password and change function subprogram; Identical function Fn is existed in platform management server function library simultaneously, as long as there is identical initial value, just has phase Same operation result;After mobile phone scanning Quick Response Code, Quick Response Code is sent to back-stage management letter by the special nets of wireless Internet Number library inquiry Quick Response Code respective function Fn, Quick Response Code built-in hole(13)For blank, coded lock is in blocking;In Quick Response Code Put hole(13)For black, coded lock is in unlocking condition, and server program can be according to shaped variable trick lock(8)Quick Response Code built in Hole(13)Black and white state obtain lock open and-shut mode;If shaped variable trick lock(8)In blocking, then according to the Quick Response Code Respective function and functional value are inquired about, carrying out functional operation FN (x) according to the password value x of last time input for initial value goes out knot Really, existing password FN (x)=Y is calculated;Or functional operation FN (m) is carried out according to unlocking times m go out Structure Calculation and have Password FN (m)=Y;Or FN (t)=Y is calculated according to time t;Functional value Y is sent to client as password by corresponding app Mobile phone on;If coded lock is in unlocking condition, checkout information is sent out to client, reminds client's checkout.
For shaped variable trick lock(8)Itself, password determining program is placed in main program, is read when having button, when true Determine to judge when key is pressed;The password and 4 bytes of the space storage setting of 4 bytes is set to deposit input through keyboard in a program Data;, will according to the keyboard data of reading and password successive appraximation set in advance it may determine that inputting the correctness of password The password of input through keyboard is compared with the password set, if password is correct, is unlocked, defeated with this password Y after unlocking terminates Enter for initial value, call password to change function Fn subprograms, obtain new password;If incorrect, Password Input counting how many times list Member is counted, and is not reached such as 3 times, returns to keyboard scan module;If counting up to 3 times, alarm module is called;Its flow chart is as schemed Shown in 5.
When user sweeps the Quick Response Code of this coded lock by mobile phone, this Quick Response Code is sent to managing web background server Inquiry, obtains password Y, and password value Y and single-chip microcomputer internal memory password y carry out additive operation, if result is zero, shows password Correctly, then unlock, it is initial value that x=y is taken after unlocking, call password to change function Fn subprograms, obtain in new password deposit Preservation is deposited, wait is unlocked next time.Unlock each time successfully, password just changes once.Its program flow diagram is as shown in Figure 6.
Cipher rotary knob(3)With cipher lock panel(22)Between be provided with back-moving spring(23), cipher rotary knob(3)Axle for set Tubular construction, nested knob generating gear(5)Upper shaft, the axle is provided with cross recess(18), cipher rotary knob(3)Quill on the inside of Nail is turned round provided with force(19), embedded knob generating gear(5)The cross recess of upper shaft(18)Interior, such structure causes user to exist Rotational password knob(3)At this time, force turns round nail(19)In cross recess(18)Horizontal clearance in, will not produce down and hold up behaviour Make;Cipher rotary knob(3)The bottom of quill weld elastic pressing key(20), elastic force pressing key(20)Lower section be button support Disk(17), the button pallet(17)Pass through connection sheet and the cipher lock panel of top(22)It is fixed, the button pallet(17)Paste There is keyboard conductive rubber(21), turn to after set password position, press down on cipher rotary knob(3), elastic force pressing key(20) With button pallet(17)Upper keyboard conductive rubber(21)Contact conducting, inputs a password value.When hand decontrols cipher rotary knob(3)'s When, in the presence of back-moving spring, set back.
Because the coded lock is used out of doors for a long time, without external power supply, it is therefore necessary to obtain electricity by open-air conditions Can, electric energy is obtained in the following way.
Cipher rotary knob(3)With knob generating gear(5)It is coaxially connected, cipher rotary knob(3)It is combination disk below(1), password Disk(1)It is pasted onto panel surface, cipher rotary knob(3)With knob generating gear(5)Between have panel isolation, 4 knob generating teeth Wheel(5)While and motor gear(24)Engagement, 4 knob generating gears(5)Do not engage each other(As shown in Figure 7), motor gear (24)With microgenerator(4)Coaxially;Microgenerator(4)Output circuit concatenates rectifier bridge stack(6)And connect rechargeable battery(7), Rechargeable battery(7)For shaped variable trick lock(8)Electric energy is provided.Such structure causes user rotating one of cipher rotary knob (3)When, knob generating gear(5)Also rotate, drive the motor gear being meshed therewith(24)Rotate, band actuating miniature Generator(4)Generated electricity, output current passes through rectifier bridge stack(6)To rechargeable battery after rectification(7)Charged.
Solar panel(14)Output reversely concatenates voltage-regulator diode(15)It is positive afterwards to concatenate anti-return diode(16). This structure causes when sunlight strong, solar panel(14)Export a high voltage, the pole of voltage breakdown voltage stabilizing two Pipe(15)To rechargeable battery(7)Charged, if light is weak, for example at night, rechargeable battery(7)It is higher than in voltage Solar panel(14)Output voltage, forward direction concatenation anti-return diode(16)Current reflux can be prevented.
When user, which repeatedly inputs, not to be unlocked successfully yet after the password obtained from server, using defeated with keyboard password Enter number of times m and time t that submodule input server issues user, so as to change the functional value inside single-chip microcomputer.
Letter can be sent after coded lock is closed and shock sensor module detects sharp pounding to single-chip microcomputer Number, the alarm of MCU driving alarm module.
Exchanging information for server and single-chip microcomputer is realized by handheld device, makes server and monolithic to solve error correction information The functional operation of machine is consistent, while the password obtained from server can also be sent into single-chip microcomputer by handheld device, passes through list Piece machine carries out password comparison and realizes unlocking function.
Major function of the present invention:
(1) 4 passwords are set, and password passes through 4 cipher rotary knobs(3)Input, if password is correct, lock is opened.
(2) after user only opens lock, the modification of password next time could be carried out.
(3) often come in and go out a password, password next time can be all obtained by functional operation, password is a changing value, Realize variable cipher function.
(4) if password inputs number of times by mistake more than 3 times, system will send sound and light alarm.
(5) without external power supply, it can complete voluntarily to charge, it is adaptable to which open air is without charged area.
(6) there is automatic regulating function, do not unlocked yet successfully after user is repeatedly inputted from the password that server is obtained When, number of times m and time t that server issues user are inputted using with keyboard password input submodule, so as to change single-chip microcomputer Internal functional value.
(7) there is auto-alarm function, when coded lock is closed and shock sensor module detects strong shake Signal, the alarm of MCU driving alarm module can be sent after dynamic to single-chip microcomputer.
(8)Exchanging information for server and single-chip microcomputer is realized by handheld device, with solve error correction information make server with The functional operation of single-chip microcomputer is consistent, while the password obtained from server can also be sent into single-chip microcomputer by handheld device, leads to Cross single-chip microcomputer progress password comparison and realize unlocking function
The beneficial effects of the invention are as follows:A kind of intelligent cipher electronics with variable cipher and sound and light alarm feature of the present invention Lock.The Puzzle electronic lock can reach 10 using 4 passwords, password combination4Kind, with settable multiple cipher, repeatedly rewrite and Preserve the advantage of password;Password is a changing value, realizes variable cipher function;When inputing password by mistake continuous more than three times, System will send tweeting sound, while red flare, gives a warning;It can complete voluntarily to charge.There is the system software and hardware to set Meter is simple, it is easy to develop, cost is relatively low, safe and reliable, the features such as easy to operate, can be widely applied to the pipe of various shared equipment Reason, scans lockset Quick Response Code by mobile phone and realizes logistics net function, greatly reduces lockset cost and early stage lockset management journey The exploitation of sequence, only need to develop backstage management procedure.
Brief description of the drawings
Fig. 1 is variable cipher theory diagram of the present invention;
Fig. 2 is present system fundamental diagram;
Fig. 3 is unlocking circuit of the present invention;
Fig. 4 is that invention keyboard scan controls circuit;
Fig. 5 transfers the main program flow chart of last time cipher function computing new password for the present invention;
Fig. 6 transfers the main program flow chart of unlocking times functional operation new password for the present invention;
Fig. 7 transfers the main program flow chart of function of time computing new password for the present invention;
Fig. 8 is shaped variable trick lock automatic generating structure schematic diagram of the present invention;
Fig. 9 is that Quick Response Code unlocking condition of the present invention shows and dead bolt relation intention;
Figure 10 is coded lock matrix keyboard cross-sectional view of the present invention.
In figure it is each marked as:1:Combination disk, 2:Numeral identification, 3:Cipher rotary knob, 4:Microgenerator, 5:Knob generating tooth Wheel, 6:Rectifier bridge stack, 7:Rechargeable battery, 8:Shaped variable trick lock, 9:Lock knob, 10:Quick Response Code is identified, and 11:Mark patch, 12:Lock pin, 13:Quick Response Code built-in hole, 14:Solar panel, 15:Voltage-regulator diode, 16:Anti-return diode, 17:Button pallet, 18: Cross recess, 19:Force turns round nail, 20:Elastic force presses key, 21 keyboard conductive rubbers, 22:Cipher lock panel, 23:Back-moving spring.
Embodiment
With reference to the accompanying drawings and examples, the invention will be further described, but present disclosure be not limited to it is described Scope.
Embodiment 1:Shaped variable trick lock is in blocking, from Quick Response Code built-in hole(13)Seen for blank, it is variable Coded lock is in opening, from Quick Response Code built-in hole(13)Seen for black, pass through Quick Response Code built-in hole(13)Interior Mark can differentiate shaped variable trick lock(8)Open and-shut mode.
Each Quick Response Code correspond to one of them in an independent function Fn, and this function is present in variable cipher Lock(8)In internal memory, constitute password and change function subprogram;Identical function Fn exists in platform management server letter simultaneously In number storehouse, as long as there is identical initial value, identical operation result is just had;After mobile phone scanning Quick Response Code, Quick Response Code is led to Cross the special nets of wireless Internet and be sent to back-stage management function library inquiry Quick Response Code respective function Fn, Quick Response Code built-in hole(13) For blank, coded lock is in blocking;Quick Response Code built-in hole(13)For black, coded lock is in unlocking condition, server journey Sequence can be according to shaped variable trick lock(8)Quick Response Code built-in hole(13)Black and white state obtain lock open and-shut mode;If variable Coded lock(8)In blocking, then respective function and functional value are inquired about according to the Quick Response Code, according to the password of last time input Value x is that initial value progress functional operation Fn (x) goes out result, calculates existing password F n (x)=Y;Or according to unlocking times n Progress functional operation Fn (m) goes out Structure Calculation and has password Fn (m)=Y;Or FN (t)=Y is calculated according to time t;Function Value Y is sent on the mobile phone of client as password by corresponding app;If coded lock is in unlocking condition, knot is sent out Account information reminds client's checkout to client.
During use, client opens shaped variable trick lock(8)Afterwards, after shared equipment is finished, lock again Shaped variable trick lock(8)Afterwards, it is necessary to scanning confirms and paid again, just really terminate to use.If customer is forgotten after locking, Charge state can be constantly in, these will and be demonstrated using client in advance, and be write exactly in Terms of Use.
For shaped variable trick lock(8)Itself, password determining program is placed in main program, is read when having button, when true Determine to judge when key is pressed;The password and 4 bytes of the space storage setting of 4 bytes is set to deposit input through keyboard in a program Data;, will according to the keyboard data of reading and password successive appraximation set in advance it may determine that inputting the correctness of password The password of input through keyboard is compared with the password set, if password is correct, is unlocked, defeated with this password Y after unlocking terminates Enter for initial value, call password to change function Fn subprograms, obtain new password;If incorrect, Password Input counting how many times list Member is counted, and is not reached such as 3 times, returns to keyboard scan module;If counting up to 3 times, alarm module is called;Its flow chart is as schemed Shown in 5.
During specific unlocking, user sweeps the Quick Response Code of this coded lock by mobile phone, and this Quick Response Code is sent into management Website background server inquiry, obtains password Y, password value Y and single-chip microcomputer internal memory password y carry out additive operation, if result It is zero, then shows that password is correct, then unlock, it is initial value that x=y is taken after unlocking, call password to change function Fn subprograms, Obtain new password deposit internal memory to preserve, wait is unlocked next time.Unlock each time successfully, password just changes once.Its program flow Journey figure is as shown in Figure 6.
Cipher rotary knob(3)With cipher lock panel(22)Between be provided with back-moving spring(23), cipher rotary knob(3)Axle for set Tubular construction, nested knob generating gear(5)Upper shaft, the axle is provided with cross recess(18), cipher rotary knob(3)Quill on the inside of Nail is turned round provided with force(19), embedded knob generating gear(5)The cross recess of upper shaft(18)Interior, such structure causes user to exist Rotational password knob(3)At this time, force turns round nail(19)In cross recess(18)Horizontal clearance in, will not produce down and hold up behaviour Make;Cipher rotary knob(3)The bottom of quill weld elastic pressing key(20), elastic force pressing key(20)Lower section be button support Disk(17), the button pallet(17)Pass through connection sheet and the cipher lock panel of top(22)It is fixed, the button pallet(17)Paste There is keyboard conductive rubber(21), turn to after set password position, press down on cipher rotary knob(3), elastic force pressing key(20) With button pallet(17)Upper keyboard conductive rubber(21)Contact conducting, inputs a password value.When hand decontrols cipher rotary knob(3)'s When, in the presence of back-moving spring, set back.
Because the coded lock is used out of doors for a long time, without external power supply, it is therefore necessary to obtain electricity by open-air conditions Can, electric energy is obtained in the following way.
Cipher rotary knob(3)With knob generating gear(5)It is coaxially connected, cipher rotary knob(3)It is combination disk below(1), password Disk(1)It is pasted onto panel surface, cipher rotary knob(3)With knob generating gear(5)Between have panel isolation, 4 knob generating teeth Wheel(5)While and motor gear(24)Engagement, 4 knob generating gears(5)Do not engage each other(As shown in Figure 7), motor gear (24)With microgenerator(4)Coaxially;Microgenerator(4)Output circuit concatenates rectifier bridge stack(6)And connect rechargeable battery(7), Rechargeable battery(7)For shaped variable trick lock(8)Electric energy is provided.Such structure causes user rotating one of cipher rotary knob (3)When, knob generating gear(5)Also rotate, drive the motor gear being meshed therewith(24)Rotate, band actuating miniature Generator(4)Generated electricity, output current passes through rectifier bridge stack(6)To rechargeable battery after rectification(7)Charged.
Solar panel(14)Output reversely concatenates voltage-regulator diode(15)It is positive afterwards to concatenate anti-return diode(16). This structure causes when sunlight strong, solar panel(14)Export a high voltage, the pole of voltage breakdown voltage stabilizing two Pipe(15)To rechargeable battery(7)Charged, if light is weak, for example at night, rechargeable battery(7)It is higher than in voltage Solar panel(14)Output voltage, forward direction concatenation anti-return diode(16)Current reflux can be prevented.
Further, described a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to aobvious Show and unlocking times m or time t is shown on module and function resets switch, display module, function resets switch passes through single-chip microcomputer I/O mouthfuls of connection single-chip microcomputers, by press function resets switch can be inputted using keyboard password input submodule correct number of times m and Time t, so as to change the functional value inside single-chip microcomputer;When described server is sent to client password, server note is contained The unlocking numerical value m or time t of record;, can when user, which repeatedly inputs, not to be unlocked successfully yet after the password obtained from server Number of times m and time t that server issues user are inputted using with keyboard password input submodule, so as to change inside single-chip microcomputer Functional value.
Further, a kind of described lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to shake Dynamic sensor assembly, shock sensor module is by single-chip processor i/o mouthful connection single-chip microcomputer, when coded lock is closed and is shaken Dynamic sensor assembly is detected can send signal to single-chip microcomputer after sharp pounding, the alarm of MCU driving alarm module.
Further, a kind of described lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to indigo plant Tooth communication module, bluetooth communication can be passed through by single-chip processor i/o mouthful connection single-chip microcomputer, bluetooth communication with handheld device Bluetooth is communicated, and is realized exchanging information for server and single-chip microcomputer by handheld device, is made server to solve error correction information Functional operation with single-chip microcomputer is consistent, while the password obtained from server can also be sent to by single-chip microcomputer by handheld device, Password comparison is carried out by single-chip microcomputer and realizes unlocking function.

Claims (10)

1. a kind of scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, it is characterised in that:Including mobile phone barcode scanning two Tie up code and obtain variable cipher part and built-in function change unlocking coded lock part:
Part I:Mobile phone barcode scanning Quick Response Code, which obtains variable cipher part, to be used to look into managing web background server by mobile phone Ask correspondence Quick Response Code function and obtain variable cipher;
Part II:Built-in function, which changes unlocking coded lock part, to be used to input unlatching shaped variable trick lock(8)Password.
2. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 1, its feature It is:The Part I mobile phone barcode scanning Quick Response Code obtains variable cipher part and includes two modules:
1)Quick Response Code mark module:Quick Response Code is identified(10)It is pasted onto cipher lock panel(22)On, Quick Response Code mark(10)In The heart is provided with Quick Response Code built-in hole(13), pass through Quick Response Code built-in hole(13)It can be seen that lock pin(12), in the lock pin(12)Above It is pasted with mark patch(11), in lock pin(12)It is provided with lock knob(9), lock knob(9)Can be in cipher lock panel(22)On open up Moved in hole slot, it is preceding to push away, lock, at the same time mark patch(11)Travel forward, shaped variable trick lock is in blocking, from two Tie up code built-in hole(13)Seen for blank, pusher is then opened(As shown in Figure 8), at the same time mark patch(11)Transport backward Dynamic, shaped variable trick lock is in opening, from Quick Response Code built-in hole(13)Seen for black, pass through Quick Response Code built-in hole (13)Interior mark can differentiate shaped variable trick lock(8)Open and-shut mode;
2)Managing web background server function library inquiry obtains crypto module:Each Quick Response Code correspond to an independent letter One of them in Fn is counted, this function is present in shaped variable trick lock(8)In internal memory, constitute password and change function subprogram;It is complete Exactly the same function Fn is existed in platform management server function library simultaneously, as long as there is identical initial value, is just had identical Operation result;After mobile phone scanning Quick Response Code, Quick Response Code is sent to back-stage management function by the special nets of wireless Internet Library inquiry Quick Response Code respective function Fn, Quick Response Code built-in hole(13)For blank, coded lock is in blocking;Built in Quick Response Code Hole(13)For black, coded lock is in unlocking condition, and server program can be according to shaped variable trick lock(8)Quick Response Code built-in hole (13)Black and white state obtain lock open and-shut mode;If shaped variable trick lock(8)In blocking, then looked into according to the Quick Response Code Respective function and functional value are ask, carrying out functional operation Fn (x) according to the password value x of last time input for initial value goes out result, counts Calculate existing password Fn (x)=Y;Or functional operation Fn (m) is carried out according to unlocking times m go out Structure Calculation and have password Fn (m)=Y;Or F n (t)=Y is calculated according to time t;Functional value Y is sent to the hand of client as password by corresponding app On machine;If coded lock is in unlocking condition, checkout information is sent out to client, reminds client's checkout.
3. it is a kind of with mobile phone scanning Quick Response Code respective function acquisition variable cipher according to claim 1 or claim 2 Lock, it is characterised in that:The Part II changes password unlocking part by built-in function includes following 4 submodules:
Keyboard password input submodule;2)Power supply module;3)Single-chip microcomputer model and reset oscillating circuit submodule;4)Unlocking circuit Submodule.
4. a kind of according to claim 3 scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, its feature exists In:Described keyboard password input submodule include Password Input submodule hardware components, Password Input modular circuit part and Control and password change module, wherein:
A. Password Input submodule hardware components are by 4 combination disks(1), 4 cipher rotary knobs(3), 16 numeral identifications(2), it is close Code knob(3), button pallet(17), cross recess(18), force turn round nail(19), elastic force pressing key(20), keyboard conductive rubber (21), cipher lock panel(22), back-moving spring(23)Constitute;Cipher rotary knob(3)With cipher lock panel(22)Between be provided with it is multiple Position spring(23), cipher rotary knob(3)Axle be sleeve structure, nested knob generating gear(5)Upper shaft, the axle is provided with cross Groove(18), cipher rotary knob(3)Quill on the inside of provided with force turn round nail(19), embedded knob generating gear(5)The ten of upper shaft Word groove(18)It is interior, cipher rotary knob(3)The bottom of quill weld elastic pressing key(20), elastic force pressing key(20)Lower section For button pallet(17), the button pallet(17)Pass through connection sheet and the cipher lock panel of top(22)It is fixed;
B. control program and password change module section:
A) main program is controlled:
The initialization of the function of the module including system, the setting of system initial password, call password multilevel iudge, Modify password Etc. program module;Password determining program is placed in main program, is read when having button, is judged when determination key is pressed;In journey The space of 4 bytes is set to deposit the password of setting and the data of 4 bytes storage input through keyboard in sequence;According to the keyboard data of reading With password successive appraximation set in advance it may determine that input password correctness, by the password of input through keyboard with set it is close Code is compared, if password is correct, is unlocked, after unlocking terminates, and with this password Y inputs for initial value, calls password to change Function Fn subprograms, obtain new password;If incorrect, Password Input counting how many times element count does not reach such as 3 times, returns Keyboard scan module;
b)Password changes module, is following one kind therein:
1) last password is called to change crypto module:Only lock is opened, and can just perform password modification action, password modification Program requirement recalls last password x, with this password x inputs for initial value, calls password to change function Fn subprograms, carries out Functional operation Fn (x) goes out result, Fn (x)=y, and the value constitutes new password deposit internal memory and preserved;During specific unlocking, Yong Hutong Cross mobile phone to sweep the Quick Response Code of this coded lock, this Quick Response Code be sent to the inquiry of managing web background server, password Y is obtained, Password value Y and single-chip microcomputer internal memory password y carry out additive operation, if result is zero, show that password is correct, then unlock, It is initial value that x=y is taken after unlocking, calls password to change function Fn subprograms, obtains new password deposit internal memory and preserves, under wait Once unlock;Unlock each time successfully, password just changes once;
2) allocating time function changes crypto module:Server is with being respectively provided with the same functions Fn with time correlation in coded lock (t), function Fn (t) regularly updates password Y according to fixed time interval, and user scans Quick Response Code by mobile phone and sends service Device obtains password Y from server, and password Y is inputted during unlocking and is compared with password in single-chip microcomputer, is unlocked when password is identical, different When coded lock do not open;
3)Unlocking times function is called to change crypto module:Server is with being respectively provided with the same functions with time correlation in coded lock Fn (m), is often performed when once unlocking and shut, and single-chip microcomputer counts m in coded lock, simultaneously closes off after lockset, and user passes through scanning The mode of Quick Response Code payment sends a signal to server, and server counts m, server and password by the payment information received Internal single-chip microcomputer call function Fn (m) the generation password Y of lock;When opening institute information is sent by way of scanning Quick Response Code to server Function Fn (m) password is obtained, is compared by inputting password Y to coded lock, coded lock is opened when the two is identical, it is close when different Code lock is not opened.
5. a kind of according to claim 4 scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, its feature exists In:Switched including display module and function resets, unlocking times m or time t is shown on display module, function resets switch is logical Single-chip processor i/o mouthful connection single-chip microcomputer is crossed, can be correct using the input of keyboard password input submodule by pressing function resets switch Number of times m and time t, so as to change the functional value inside single-chip microcomputer;When described server is sent to client password, contain The unlocking numerical value m or time t of server record;Do not unlocked into yet after user is repeatedly inputted from the password that server is obtained During work(, number of times m and time t that server issues user are inputted using with keyboard password input submodule, so as to change monolithic Functional value inside machine.
6. a kind of according to claim 4 scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, its feature exists In:Described keyboard password input submodule includes also including alarm module, when input password is counted up to 3 times, then calls report Alert module realizes alarm.
7. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 1,2,3, its It is characterised by:For shaped variable trick lock(8)In the case of being inputted again without any external electric energy, realized and confessed using power supply module Electricity.
8. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 7, its feature It is:The power supply module, including mechanical charge part, it is by 4 combination disks(1), 4 knobs(3), 16 numeral identifications (2), microgenerator(4)And knob generating gear(5)Constitute;Cipher rotary knob(3)With knob generating gear(5)Coaxially connect Connect, cipher rotary knob(3)It is combination disk below(1), combination disk(1)It is pasted onto panel surface, cipher rotary knob(3)With knob generating tooth Wheel(5)Between have panel isolation, 4 knob generating gears(5)While and motor gear(24)Engagement, 4 knob generating gears (5)Do not engage each other(As shown in Figure 7), motor gear(24)With microgenerator(4)Coaxially;Microgenerator(4)Output electricity Road concatenates rectifier bridge stack(6)And connect rechargeable battery(7), rechargeable battery(7)For shaped variable trick lock(8)Electric energy is provided.
9. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 7, its feature It is:The power supply module, including solar powered part, it is by solar panel(14), voltage-regulator diode(15), prevent back Flow diode(16)Constitute;Solar panel(14)Output reversely concatenates voltage-regulator diode(15)It is positive afterwards to concatenate anti-return two Pole pipe(16).
10. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 7, its feature It is:Also include shock sensor module, shock sensor module is by single-chip processor i/o mouthful connection single-chip microcomputer, at coded lock Signal can be sent to single-chip microcomputer by being detected in closed mode and shock sensor module after sharp pounding, MCU driving alarm mould Block is alarmed.
CN201710752787.0A 2017-08-29 2017-08-29 Lock, two-dimensional code identification and coded lock power supply module for obtaining variable code by scanning two-dimensional code corresponding function through mobile phone Active CN107316367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710752787.0A CN107316367B (en) 2017-08-29 2017-08-29 Lock, two-dimensional code identification and coded lock power supply module for obtaining variable code by scanning two-dimensional code corresponding function through mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710752787.0A CN107316367B (en) 2017-08-29 2017-08-29 Lock, two-dimensional code identification and coded lock power supply module for obtaining variable code by scanning two-dimensional code corresponding function through mobile phone

Publications (2)

Publication Number Publication Date
CN107316367A true CN107316367A (en) 2017-11-03
CN107316367B CN107316367B (en) 2021-07-06

Family

ID=60176121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710752787.0A Active CN107316367B (en) 2017-08-29 2017-08-29 Lock, two-dimensional code identification and coded lock power supply module for obtaining variable code by scanning two-dimensional code corresponding function through mobile phone

Country Status (1)

Country Link
CN (1) CN107316367B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723362A (en) * 2019-03-22 2020-09-29 倪晓 Permission password generation method, system and device and terminal equipment
CN114341956A (en) * 2019-10-07 2022-04-12 李基喆 Multiple locking device using random number cipher

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206162780U (en) * 2016-10-12 2017-05-10 杭州行我行网络有限公司 Bicycle intelligence trick lock
CN206236205U (en) * 2016-12-08 2017-06-09 南京信息工程大学 A kind of campus Bicycle hire based on Quick Response Code
CN206256768U (en) * 2016-12-07 2017-06-16 珠海优特电力科技股份有限公司 Status display is locked
CN106875253A (en) * 2017-01-19 2017-06-20 杭州骑行科技有限公司 Be applied to bicycle rental system has leased equipment and method of work of the station without stake
CN106934892A (en) * 2017-03-10 2017-07-07 华南理工大学 A kind of shared bicycle intelligent bicycle lock and its charging method
CN106952372A (en) * 2017-03-23 2017-07-14 成都信息工程大学 Lock safety vehicle and implementation method based on dynamic password
CN106951812A (en) * 2017-03-31 2017-07-14 腾讯科技(深圳)有限公司 Recognize method, device and the terminal of Quick Response Code

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN206162780U (en) * 2016-10-12 2017-05-10 杭州行我行网络有限公司 Bicycle intelligence trick lock
CN206256768U (en) * 2016-12-07 2017-06-16 珠海优特电力科技股份有限公司 Status display is locked
CN206236205U (en) * 2016-12-08 2017-06-09 南京信息工程大学 A kind of campus Bicycle hire based on Quick Response Code
CN106875253A (en) * 2017-01-19 2017-06-20 杭州骑行科技有限公司 Be applied to bicycle rental system has leased equipment and method of work of the station without stake
CN106934892A (en) * 2017-03-10 2017-07-07 华南理工大学 A kind of shared bicycle intelligent bicycle lock and its charging method
CN106952372A (en) * 2017-03-23 2017-07-14 成都信息工程大学 Lock safety vehicle and implementation method based on dynamic password
CN106951812A (en) * 2017-03-31 2017-07-14 腾讯科技(深圳)有限公司 Recognize method, device and the terminal of Quick Response Code

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723362A (en) * 2019-03-22 2020-09-29 倪晓 Permission password generation method, system and device and terminal equipment
CN111723362B (en) * 2019-03-22 2023-09-08 倪晓 Authority password generation method, system, device and terminal equipment
CN114341956A (en) * 2019-10-07 2022-04-12 李基喆 Multiple locking device using random number cipher
CN114341956B (en) * 2019-10-07 2023-03-14 李基喆 Multiple locking device using random number cipher

Also Published As

Publication number Publication date
CN107316367B (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN107293027A (en) A kind of variable two-dimension code lock
CN201554280U (en) Photoelectric cipher lock system
CN203490747U (en) Multidirectional intelligent access control system
CN103824365B (en) RFID technology based intelligent padlock and its unlocking method
CN107316367A (en) A kind of lock, Quick Response Code mark, coded lock power supply module that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone
CN208251851U (en) The smart lock and system of a kind of substation's relay protection room
CN108360925A (en) A kind of intelligent lock system and its control method
CN106934903A (en) A kind of blue-tooth intelligence lock
CN206903420U (en) A kind of suitcase lock for integrating NFC electronic locks and electronic ink screen
CN207380827U (en) Shared bicycle management system based on ZIGBEE
CN107578504A (en) A kind of variable two-dimension code lock, variable two-dimension code and variable two-dimension code lock method of work
CN109356460A (en) A kind of control circuit and control method of smart lock
CN106703542A (en) Intelligent multi-angle knock-on type algorithm coded lock
CN105730563B (en) Based on the self-locking bicycle lock of cipher control and its method
CN206271038U (en) A kind of bicycle based on smart lock and intelligent battery rents also system
CN206903419U (en) A kind of suitcase provided with NFC electronic locks
CN107358706A (en) A kind of variable two-dimension code lock, variable two-dimension code
CN104346589B (en) A kind of password setting, unlocking system and method
CN206646928U (en) SCM Based touch singly-bound coded lock
CN203480514U (en) Password setting system and password decoding system
CN107139882A (en) Electric car remote control dynamical system unit
CN202249269U (en) Solar coded lock circuit
CN205880947U (en) Intelligence lock based on GPS and bluetooth control
CN204557505U (en) Safety-type car locking device
CN107191070A (en) A kind of Intelligent Passive electronics idle-run lock pin

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210617

Address after: 264200 room 113, building A3, No. 52, Lushan Road, Zhangcun Town, Huancui District, Weihai City, Shandong Province

Applicant after: Weihai Chuanghui Information Technology Co.,Ltd.

Address before: No. 66, Guan Shang Dong Road, Guandu District, Kunming, Yunnan

Applicant before: Long Wenkai

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant