CN107316367A - A kind of lock, Quick Response Code mark, coded lock power supply module that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone - Google Patents
A kind of lock, Quick Response Code mark, coded lock power supply module that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone Download PDFInfo
- Publication number
- CN107316367A CN107316367A CN201710752787.0A CN201710752787A CN107316367A CN 107316367 A CN107316367 A CN 107316367A CN 201710752787 A CN201710752787 A CN 201710752787A CN 107316367 A CN107316367 A CN 107316367A
- Authority
- CN
- China
- Prior art keywords
- password
- lock
- quick response
- response code
- function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
- G07C2009/00484—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a variable code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00634—Power supply for the lock
- G07C2009/0065—Power supply for the lock by solar energy
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention relates to a kind of lock, Quick Response Code mark, coded lock power supply module that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, belong to electronic information and shared lock technology field.The present invention is pressed key, keyboard conductive rubber etc. and constituted by 4 combination disks, 4 cipher rotary knobs, Quick Response Code mark, Quick Response Code built-in hole, elastic force;Each Quick Response Code correspond to an independent function Fn, and this function is present in shaped variable trick lock(8)In internal memory and in back-stage management server function library, as long as there is identical initial value, identical operation result is just had, sending Quick Response Code acquisition input password by mobile phone scanning is unlocked.Realize variable cipher function;When inputing password by mistake continuous more than three times, give a warning;It can complete voluntarily to charge.Lockset Quick Response Code is scanned by mobile phone and realizes logistics net function, the exploitation of lockset cost and early stage lock management program is greatly reduced, only backstage management procedure need to be developed.
Description
Technical field
The present invention relates to it is a kind of with mobile phone scan Quick Response Code respective function obtain the lock of variable cipher, Quick Response Code identify, it is close
Code lock power supply module, belongs to electronic information and shared lock technology field.
Background technology
The bicycle lock that the shared bicycles of OFO are used is not directly entered Internet of Things, but by using the people of shared car
Realized when scanning with the interaction of network, adopt the R & D Cost that can substantially reduce early stage in such a way and voluntarily
The production cost of lock, this is for just entering the enterprise of shared platform, and this pattern is very valuable business mould
Formula, can substantially reduce R&D costs, be easy to promote.But this this pattern exist one it is serious the problem of be exactly OFO locks
Password can not change, for bicycle, because bicycle parking position is not fixed, this is just greatly alleviated
The disadvantage that OFO locks are present.Nonetheless, much want that the people gained extra advantage by unfair means still always enjoys it to deciphering lock.Little Huang bicycles
Lock and password are all fixed, and somebody, which unlocks, to be known after password, as long as ensureing that vehicle is not ridden away, can just continue input close
Code freely uses bicycle;Someone establishes little Huang bicycle passwords with this and shares group, a considerable number of.It is existing nationwide close among these
The shared group of code, password for also having each specific place shares group, and many people directly represent in QQ group chats, by password can in order to avoid
Take and use little Huang bicycles.Substantial amounts of energy is put into for this OFO company, OFO third generations lock is it may be said that reached specialty
The people of unlocking level can guess out its password.It may be said that substantially increase the normal function rate of little Huang cars, prevented 90% with
On the strip wool masses.Forth generation intelligence little Huang car locks are more characteristic be this lock only had four numerals by
Key, still using four pin mode unblocks.Only four buttons are looked, the position of password is few, and the password that four bit combinations go out
Quantity is also seldom, still, it is desirable to crack hardly possible.After continuously password is inputed by mistake several times, lock can send alarm, and forbid
User inputs password, could recover after waiting for a period of time.Although only four passwords, the maximum characteristic of bicycle is shared
It is exactly that mobility is high, even if you remember the password of this car, also differing surely rides up to tomorrow.From the point of view of such situation, OFO
Lock does not solve the problem of password is variable all the time.From the point of view of present case, the problem of being faced with awkward, if password is not
Become, the shared equipment provided will gratuitously be taken;If without using password, and using internet management, it is meant that preceding
Phase development cost is too high.Therefore, exploitation variable cipher lockset can solve above-mentioned double-barreled question.
The content of the invention
Scan Quick Response Code respective function it is an object of the invention to provide a kind of with mobile phone and obtain the locking of variable cipher, two dimension
Code mark, coded lock power supply module.
It is a kind of to scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, it is characterised in that:Swept including logical mobile phone
Code Quick Response Code obtains variable cipher part and built-in function changes unlocking coded lock part;
Part I:Mobile phone barcode scanning Quick Response Code, which obtains variable cipher part, to be used to look into managing web background server by mobile phone
Ask correspondence Quick Response Code function and obtain variable cipher;
Part II:Built-in function, which changes unlocking coded lock part, to be used to input unlatching shaped variable trick lock(8)Password;
The Part I mobile phone barcode scanning Quick Response Code obtains variable cipher part and includes two modules:
1)Quick Response Code mark module:Quick Response Code is identified(10)It is pasted onto cipher lock panel(22)On, Quick Response Code mark(10)In
The heart is provided with Quick Response Code built-in hole(13), pass through Quick Response Code built-in hole(13)It can be seen that lock pin(12), in the lock pin(12)Above
It is pasted with mark patch(11), in lock pin(12)It is provided with lock knob(9), lock knob(9)Can be in cipher lock panel(22)On open up
Moved in hole slot, it is preceding to push away, lock, at the same time mark patch(11)Travel forward, shaped variable trick lock is in blocking, from two
Tie up code built-in hole(13)Seen for blank, pusher is then opened(As shown in Figure 8), at the same time mark patch(11)Transport backward
Dynamic, shaped variable trick lock is in opening, from Quick Response Code built-in hole(13)Seen for black, pass through Quick Response Code built-in hole
(13)Interior mark can differentiate shaped variable trick lock(8)Open and-shut mode.
2)Managing web background server function library inquiry obtains crypto module:Each Quick Response Code correspond to an independence
Function Fn in one of them, this function is present in shaped variable trick lock(8)In internal memory, constitute password and change the sub- journey of function
Sequence;Identical function Fn is existed in platform management server function library simultaneously, as long as there is identical initial value, is just had
Identical operation result;After mobile phone scanning Quick Response Code, Quick Response Code is sent to back-stage management by the special nets of wireless Internet
Function library inquiry Quick Response Code respective function Fn, Quick Response Code built-in hole(13)For blank, coded lock is in blocking;Quick Response Code
Built-in hole(13)For black, coded lock is in unlocking condition, and server program can be according to shaped variable trick lock(8)Quick Response Code in
Put hole(13)Black and white state obtain lock open and-shut mode;If shaped variable trick lock(8)In blocking, then according to the two dimension
Code inquiry respective function and functional value, carry out functional operation Fn (x) for initial value according to the password value x of last time input and go out knot
Really, existing password Fn (x)=Y is calculated;Or functional operation Fn (m) is carried out according to unlocking times m go out Structure Calculation and have
Password Fn (m)=Y;Or FN (t)=Y is calculated according to time t;Functional value Y is sent to client as password by corresponding app
Mobile phone on;If coded lock is in unlocking condition, checkout information is sent out to client, reminds client's checkout.
The Part II changes password unlocking part by built-in function includes following 5 submodules:
1)Keyboard password input submodule;2)Power supply module;3)Single-chip microcomputer model and reset oscillating circuit submodule;4)Unlock electric
Way module; 5)Sound light alarming circuit submodule;Wherein:
1)Keyboard password input submodule includes again:Password Input submodule hardware components, Password Input modular circuit part and
Control and password change module;
A. Password Input submodule hardware components are by 4 combination disks(1), 4 cipher rotary knobs(3), 16 numeral identifications(2), it is close
Code knob(3), button pallet(17), cross recess(18), force turn round nail(19), elastic force pressing key(20), keyboard conductive rubber
(21), cipher lock panel(22), back-moving spring(23)Constitute;Cipher rotary knob(3)With cipher lock panel(22)Between be provided with it is multiple
Position spring(23), cipher rotary knob(3)Axle be sleeve structure, nested knob generating gear(5)Upper shaft, the axle is provided with cross
Groove(18), cipher rotary knob(3)Quill on the inside of provided with force turn round nail(19), embedded knob generating gear(5)The ten of upper shaft
Word groove(18)It is interior, cipher rotary knob(3)The bottom of quill weld elastic pressing key(20), elastic force pressing key(20)Lower section
For button pallet(17), the button pallet(17)Pass through connection sheet and the cipher lock panel of top(22)It is fixed, the button pallet
(17)It is pasted with keyboard conductive rubber(21).
B. Password Input modular circuit part:Password Input modular circuit part:4 keys of Password Input are interference key board
Designed using determinant, 16 buttons line up 4 × 4 matrixes.In design using 8 I/O lines of AT89C51 ports 2 do 16 by
The keyboard scan of key, scanning signal is sent out by P2.0~P2.3, and P2.4~P2.7 reads button data return code(Such as Fig. 4 institutes
Show), detect which button is pressed in the way of program scanning, single pass one row, 4 buttons, the order of scanning is as follows:
(a) send out scanning signal 1110 to scan 4 buttons of C1 row, read button data, judge whether the row have key to press,
If there is key to be pressed, the key being pressed is connected to, line of return state is 0;
(b) send out scanning signal 1101 to scan 4 buttons of C2 row, read button data, judge whether the row have key to press,
If there is key to be pressed, the key being pressed is connected to, line of return state is 0;
(c) send out scanning signal 1011 to scan 4 buttons of C3 row, read button data, judge whether the row have key to press,
If there is key to be pressed, the key being pressed is connected to, line of return state is 0;
(d) send out scanning signal 0111 to scan 4 buttons of C4 row, read button data, judge whether the row have key to press,
If there is key to be pressed, the key being pressed is connected to, line of return state is 0;
(e) return to that step (a) is continuous to do key scan;
The step of above, is continuously repeated, if a button is pressed, and the button is decoded out, when a certain button is pressed,
Its keypad numerals is to count numbering.
C. control program and password change module section:The coding lock system is programmed using assembler language, system journey
Sequence includes main program, keyboard scan subprogram, password multilevel iudge subprogram, Modify password subprogram, sound and light alarm and delay
Subprogram.
A) main program is controlled(Its flow chart is as shown in Figure 5):
The initialization of the function of the module including system, the setting of system initial password, call password multilevel iudge, Modify password
Etc. program module;Password determining program is placed in main program, is read when having button, is judged when determination key is pressed;In journey
The space of 4 bytes is set to deposit the password of setting and the data of 4 bytes storage input through keyboard in sequence;According to the keyboard data of reading
With password successive appraximation set in advance it may determine that input password correctness, by the password of input through keyboard with set it is close
Code is compared, if password is correct, is unlocked, after unlocking terminates, and with this password Y inputs for initial value, calls password to change
Function Fn subprograms, obtain new password;If incorrect, Password Input counting how many times element count does not reach such as 3 times, returns
Keyboard scan module.
b)Password changes module, is following one kind therein:
1) last password is called to change crypto module:Only lock is opened, and can just perform password modification action, password modification
Program requirement recalls last password x, with this password x inputs for initial value, calls password to change function Fn subprograms, carries out
Functional operation Fn (x) goes out result, Fn (x)=y, and the value constitutes new password deposit internal memory and preserved;During specific unlocking, Yong Hutong
Cross mobile phone to sweep the Quick Response Code of this coded lock, this Quick Response Code be sent to the inquiry of managing web background server, password Y is obtained,
Password value Y and single-chip microcomputer internal memory password y carry out additive operation, if result is zero, show that password is correct, then unlock,
It is initial value that x=y is taken after unlocking, calls password to change function Fn subprograms, obtains new password deposit internal memory and preserves, under wait
Once unlock;Unlock each time successfully, password just changes once.
2) allocating time function changes crypto module:Server is with being respectively provided with the same functions with time correlation in coded lock
Fn (t), function Fn (t) regularly update password Y according to fixed time interval, and user scans Quick Response Code by mobile phone and sends clothes
Business device obtains password Y from server, and password Y is inputted during unlocking and is compared with password in single-chip microcomputer, is unlocked when password is identical, no
Coded lock is not opened simultaneously.
3)Unlocking times function is called to change crypto module:Server is identical with time correlation with being respectively provided with coded lock
Function Fn (m), is often performed when once unlocking and shut, and single-chip microcomputer counts m in coded lock, simultaneously closes off after lockset, user passes through
Scan the mode of Quick Response Code payment and send a signal to server, server counts m by the payment information that receives, server and
Single-chip microcomputer call function Fn (m) generation passwords Y inside coded lock;Sent when opening institute by way of scanning Quick Response Code to server
Acquisition of information function Fn (m) password, is compared by inputting password Y to coded lock, coded lock is opened when the two is identical, different
When coded lock do not open.
b)The acquisition and unlocking of new password:User sweeps the Quick Response Code of this coded lock by mobile phone, and this Quick Response Code is sent
To the inquiry of managing web background server, password Y is obtained, password value Y and single-chip microcomputer internal memory password y carry out additive operation,
If result is zero, shows that password is correct, then unlock, it is initial value that x=y is taken after unlocking, call password to change function Fn
Program, obtains new password deposit internal memory and preserves, wait is unlocked next time.Unlock each time successfully, password just changes once.Its journey
Program flow diagram is as shown in Figure 6.
2)Power supply module, for shaped variable trick lock(8)In the case of being inputted again without any external electric energy, confession is realized
Electricity;
Shaped variable trick lock(8)Power supply module is divided into mechanical charge and solar recharging two parts:
a)Mechanical charge:By 4 combination disks(1), 4 cipher rotary knobs(3), 16 numeral identifications(2), microgenerator(4)With
And knob generating gear(5)Constitute;Cipher rotary knob(3)With knob generating gear(5)It is coaxially connected, cipher rotary knob(3)Here is
Combination disk(1), combination disk(1)It is pasted onto panel surface, cipher rotary knob(3)With knob generating gear(5)Between have panel isolation,
4 knob generating gears(5)While and motor gear(24)Engagement, 4 knob generating gears(5)Do not engage each other(Such as Fig. 7 institutes
Show), motor gear(24)With microgenerator(4)Coaxially;Microgenerator(4)Output circuit concatenates rectifier bridge stack(6)And connect
Rechargeable battery(7), rechargeable battery(7)For shaped variable trick lock(8)Electric energy is provided;
b)Solar recharging:By solar panel(14), voltage-regulator diode(15), anti-return diode(16)Constitute;The sun
Can cell panel(14)Output reversely concatenates voltage-regulator diode(15)It is positive afterwards to concatenate anti-return diode(16).
3)Single-chip microcomputer and reset oscillating circuit submodule
The present invention uses AT89C51 single-chip microcomputers, has a high gain inverting amplifier, its input in AT89C51 chip internals
For chip pin XTAL1, its output end is pin XTAL2;And crystal oscillation is bridged between chip internal, XTAL1 and XTAL2
Device and trimmer, so that a stable self-excited oscillator is constituted, here it is the clock circuit of single-chip microcomputer, in present invention use
Electrification reset circuit.
4)Unlocking circuit module submodule
When user inputs correct password, the P3.5 mouths of AT89C51 system just export high level signal, and transistor saturation is led
Logical, relay adhesive, driving electronic fractional motor running, electronic lock is opened;Conversely, when the password of input error, single-chip microcomputer
AT89C51 P3.5 mouths output low level, transistor cutoff, relay is unable to adhesive, and motor is inoperative.Circuit is as shown in Figure 3.
5)Sound light alarming circuit submodule
By 555 timer U2, the composition sound light alarming circuit such as loudspeaker LS1, common red light emitting diodes LED2.
Further, described a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to aobvious
Show and unlocking times n or time t is shown on module and function resets switch, display module, function resets switch passes through single-chip microcomputer
I/O mouthfuls of connection single-chip microcomputers, by press function resets switch can be inputted using keyboard password input submodule correct number of times m and
Time t, so as to change the functional value inside single-chip microcomputer;When described server is sent to client password, server note is contained
The unlocking numerical value m or time t of record;, can when user, which repeatedly inputs, not to be unlocked successfully yet after the password obtained from server
Number of times m and time t that server issues user are inputted using with keyboard password input submodule, so as to change inside single-chip microcomputer
Functional value.
Further, a kind of described lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to shake
Dynamic sensor assembly, shock sensor module is by single-chip processor i/o mouthful connection single-chip microcomputer, when coded lock is closed and is shaken
Dynamic sensor assembly is detected can send signal to single-chip microcomputer after sharp pounding, the alarm of MCU driving alarm module.
Further, a kind of described lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to indigo plant
Tooth communication module, bluetooth communication can be passed through by single-chip processor i/o mouthful connection single-chip microcomputer, bluetooth communication with handheld device
Bluetooth is communicated, and is realized exchanging information for server and single-chip microcomputer by handheld device, is made server to solve error correction information
Functional operation with single-chip microcomputer is consistent, while the password obtained from server can also be sent to by single-chip microcomputer by handheld device,
Password comparison is carried out by single-chip microcomputer and realizes unlocking function.
Operation principle:
Quick Response Code is identified(10)It is pasted onto cipher lock panel(22)On, Quick Response Code mark(10)Be provided centrally with built in Quick Response Code
Hole(13), pass through Quick Response Code built-in hole(13)It can be seen that lock pin(12), in the lock pin(12)Mark patch is pasted with above(11),
Lock pin(12)It is provided with lock knob(9), lock knob(9)Can be in cipher lock panel(22)On move in the hole slot that opens up, it is preceding to push away, lock
Tightly, at the same time mark is pasted(11)Travel forward, shaped variable trick lock is in blocking, from Quick Response Code built-in hole(13)Seen
For blank, pusher is then opened(As shown in Figure 8), at the same time mark patch(11)Move backward, shaped variable trick lock, which is in, to be opened
State, from Quick Response Code built-in hole(13)Seen for black, pass through Quick Response Code built-in hole(13)Interior mark can differentiate can
Become coded lock(8)Open and-shut mode.
Managing web background server function library inquiry obtains crypto module:Each Quick Response Code correspond to one it is independent
One of them in function Fn, this function is present in shaped variable trick lock(8)In internal memory, constitute password and change function subprogram;
Identical function Fn is existed in platform management server function library simultaneously, as long as there is identical initial value, just has phase
Same operation result;After mobile phone scanning Quick Response Code, Quick Response Code is sent to back-stage management letter by the special nets of wireless Internet
Number library inquiry Quick Response Code respective function Fn, Quick Response Code built-in hole(13)For blank, coded lock is in blocking;In Quick Response Code
Put hole(13)For black, coded lock is in unlocking condition, and server program can be according to shaped variable trick lock(8)Quick Response Code built in
Hole(13)Black and white state obtain lock open and-shut mode;If shaped variable trick lock(8)In blocking, then according to the Quick Response Code
Respective function and functional value are inquired about, carrying out functional operation FN (x) according to the password value x of last time input for initial value goes out knot
Really, existing password FN (x)=Y is calculated;Or functional operation FN (m) is carried out according to unlocking times m go out Structure Calculation and have
Password FN (m)=Y;Or FN (t)=Y is calculated according to time t;Functional value Y is sent to client as password by corresponding app
Mobile phone on;If coded lock is in unlocking condition, checkout information is sent out to client, reminds client's checkout.
For shaped variable trick lock(8)Itself, password determining program is placed in main program, is read when having button, when true
Determine to judge when key is pressed;The password and 4 bytes of the space storage setting of 4 bytes is set to deposit input through keyboard in a program
Data;, will according to the keyboard data of reading and password successive appraximation set in advance it may determine that inputting the correctness of password
The password of input through keyboard is compared with the password set, if password is correct, is unlocked, defeated with this password Y after unlocking terminates
Enter for initial value, call password to change function Fn subprograms, obtain new password;If incorrect, Password Input counting how many times list
Member is counted, and is not reached such as 3 times, returns to keyboard scan module;If counting up to 3 times, alarm module is called;Its flow chart is as schemed
Shown in 5.
When user sweeps the Quick Response Code of this coded lock by mobile phone, this Quick Response Code is sent to managing web background server
Inquiry, obtains password Y, and password value Y and single-chip microcomputer internal memory password y carry out additive operation, if result is zero, shows password
Correctly, then unlock, it is initial value that x=y is taken after unlocking, call password to change function Fn subprograms, obtain in new password deposit
Preservation is deposited, wait is unlocked next time.Unlock each time successfully, password just changes once.Its program flow diagram is as shown in Figure 6.
Cipher rotary knob(3)With cipher lock panel(22)Between be provided with back-moving spring(23), cipher rotary knob(3)Axle for set
Tubular construction, nested knob generating gear(5)Upper shaft, the axle is provided with cross recess(18), cipher rotary knob(3)Quill on the inside of
Nail is turned round provided with force(19), embedded knob generating gear(5)The cross recess of upper shaft(18)Interior, such structure causes user to exist
Rotational password knob(3)At this time, force turns round nail(19)In cross recess(18)Horizontal clearance in, will not produce down and hold up behaviour
Make;Cipher rotary knob(3)The bottom of quill weld elastic pressing key(20), elastic force pressing key(20)Lower section be button support
Disk(17), the button pallet(17)Pass through connection sheet and the cipher lock panel of top(22)It is fixed, the button pallet(17)Paste
There is keyboard conductive rubber(21), turn to after set password position, press down on cipher rotary knob(3), elastic force pressing key(20)
With button pallet(17)Upper keyboard conductive rubber(21)Contact conducting, inputs a password value.When hand decontrols cipher rotary knob(3)'s
When, in the presence of back-moving spring, set back.
Because the coded lock is used out of doors for a long time, without external power supply, it is therefore necessary to obtain electricity by open-air conditions
Can, electric energy is obtained in the following way.
Cipher rotary knob(3)With knob generating gear(5)It is coaxially connected, cipher rotary knob(3)It is combination disk below(1), password
Disk(1)It is pasted onto panel surface, cipher rotary knob(3)With knob generating gear(5)Between have panel isolation, 4 knob generating teeth
Wheel(5)While and motor gear(24)Engagement, 4 knob generating gears(5)Do not engage each other(As shown in Figure 7), motor gear
(24)With microgenerator(4)Coaxially;Microgenerator(4)Output circuit concatenates rectifier bridge stack(6)And connect rechargeable battery(7),
Rechargeable battery(7)For shaped variable trick lock(8)Electric energy is provided.Such structure causes user rotating one of cipher rotary knob
(3)When, knob generating gear(5)Also rotate, drive the motor gear being meshed therewith(24)Rotate, band actuating miniature
Generator(4)Generated electricity, output current passes through rectifier bridge stack(6)To rechargeable battery after rectification(7)Charged.
Solar panel(14)Output reversely concatenates voltage-regulator diode(15)It is positive afterwards to concatenate anti-return diode(16).
This structure causes when sunlight strong, solar panel(14)Export a high voltage, the pole of voltage breakdown voltage stabilizing two
Pipe(15)To rechargeable battery(7)Charged, if light is weak, for example at night, rechargeable battery(7)It is higher than in voltage
Solar panel(14)Output voltage, forward direction concatenation anti-return diode(16)Current reflux can be prevented.
When user, which repeatedly inputs, not to be unlocked successfully yet after the password obtained from server, using defeated with keyboard password
Enter number of times m and time t that submodule input server issues user, so as to change the functional value inside single-chip microcomputer.
Letter can be sent after coded lock is closed and shock sensor module detects sharp pounding to single-chip microcomputer
Number, the alarm of MCU driving alarm module.
Exchanging information for server and single-chip microcomputer is realized by handheld device, makes server and monolithic to solve error correction information
The functional operation of machine is consistent, while the password obtained from server can also be sent into single-chip microcomputer by handheld device, passes through list
Piece machine carries out password comparison and realizes unlocking function.
Major function of the present invention:
(1) 4 passwords are set, and password passes through 4 cipher rotary knobs(3)Input, if password is correct, lock is opened.
(2) after user only opens lock, the modification of password next time could be carried out.
(3) often come in and go out a password, password next time can be all obtained by functional operation, password is a changing value,
Realize variable cipher function.
(4) if password inputs number of times by mistake more than 3 times, system will send sound and light alarm.
(5) without external power supply, it can complete voluntarily to charge, it is adaptable to which open air is without charged area.
(6) there is automatic regulating function, do not unlocked yet successfully after user is repeatedly inputted from the password that server is obtained
When, number of times m and time t that server issues user are inputted using with keyboard password input submodule, so as to change single-chip microcomputer
Internal functional value.
(7) there is auto-alarm function, when coded lock is closed and shock sensor module detects strong shake
Signal, the alarm of MCU driving alarm module can be sent after dynamic to single-chip microcomputer.
(8)Exchanging information for server and single-chip microcomputer is realized by handheld device, with solve error correction information make server with
The functional operation of single-chip microcomputer is consistent, while the password obtained from server can also be sent into single-chip microcomputer by handheld device, leads to
Cross single-chip microcomputer progress password comparison and realize unlocking function
The beneficial effects of the invention are as follows:A kind of intelligent cipher electronics with variable cipher and sound and light alarm feature of the present invention
Lock.The Puzzle electronic lock can reach 10 using 4 passwords, password combination4Kind, with settable multiple cipher, repeatedly rewrite and
Preserve the advantage of password;Password is a changing value, realizes variable cipher function;When inputing password by mistake continuous more than three times,
System will send tweeting sound, while red flare, gives a warning;It can complete voluntarily to charge.There is the system software and hardware to set
Meter is simple, it is easy to develop, cost is relatively low, safe and reliable, the features such as easy to operate, can be widely applied to the pipe of various shared equipment
Reason, scans lockset Quick Response Code by mobile phone and realizes logistics net function, greatly reduces lockset cost and early stage lockset management journey
The exploitation of sequence, only need to develop backstage management procedure.
Brief description of the drawings
Fig. 1 is variable cipher theory diagram of the present invention;
Fig. 2 is present system fundamental diagram;
Fig. 3 is unlocking circuit of the present invention;
Fig. 4 is that invention keyboard scan controls circuit;
Fig. 5 transfers the main program flow chart of last time cipher function computing new password for the present invention;
Fig. 6 transfers the main program flow chart of unlocking times functional operation new password for the present invention;
Fig. 7 transfers the main program flow chart of function of time computing new password for the present invention;
Fig. 8 is shaped variable trick lock automatic generating structure schematic diagram of the present invention;
Fig. 9 is that Quick Response Code unlocking condition of the present invention shows and dead bolt relation intention;
Figure 10 is coded lock matrix keyboard cross-sectional view of the present invention.
In figure it is each marked as:1:Combination disk, 2:Numeral identification, 3:Cipher rotary knob, 4:Microgenerator, 5:Knob generating tooth
Wheel, 6:Rectifier bridge stack, 7:Rechargeable battery, 8:Shaped variable trick lock, 9:Lock knob, 10:Quick Response Code is identified, and 11:Mark patch, 12:Lock pin,
13:Quick Response Code built-in hole, 14:Solar panel, 15:Voltage-regulator diode, 16:Anti-return diode, 17:Button pallet, 18:
Cross recess, 19:Force turns round nail, 20:Elastic force presses key, 21 keyboard conductive rubbers, 22:Cipher lock panel, 23:Back-moving spring.
Embodiment
With reference to the accompanying drawings and examples, the invention will be further described, but present disclosure be not limited to it is described
Scope.
Embodiment 1:Shaped variable trick lock is in blocking, from Quick Response Code built-in hole(13)Seen for blank, it is variable
Coded lock is in opening, from Quick Response Code built-in hole(13)Seen for black, pass through Quick Response Code built-in hole(13)Interior
Mark can differentiate shaped variable trick lock(8)Open and-shut mode.
Each Quick Response Code correspond to one of them in an independent function Fn, and this function is present in variable cipher
Lock(8)In internal memory, constitute password and change function subprogram;Identical function Fn exists in platform management server letter simultaneously
In number storehouse, as long as there is identical initial value, identical operation result is just had;After mobile phone scanning Quick Response Code, Quick Response Code is led to
Cross the special nets of wireless Internet and be sent to back-stage management function library inquiry Quick Response Code respective function Fn, Quick Response Code built-in hole(13)
For blank, coded lock is in blocking;Quick Response Code built-in hole(13)For black, coded lock is in unlocking condition, server journey
Sequence can be according to shaped variable trick lock(8)Quick Response Code built-in hole(13)Black and white state obtain lock open and-shut mode;If variable
Coded lock(8)In blocking, then respective function and functional value are inquired about according to the Quick Response Code, according to the password of last time input
Value x is that initial value progress functional operation Fn (x) goes out result, calculates existing password F n (x)=Y;Or according to unlocking times n
Progress functional operation Fn (m) goes out Structure Calculation and has password Fn (m)=Y;Or FN (t)=Y is calculated according to time t;Function
Value Y is sent on the mobile phone of client as password by corresponding app;If coded lock is in unlocking condition, knot is sent out
Account information reminds client's checkout to client.
During use, client opens shaped variable trick lock(8)Afterwards, after shared equipment is finished, lock again
Shaped variable trick lock(8)Afterwards, it is necessary to scanning confirms and paid again, just really terminate to use.If customer is forgotten after locking,
Charge state can be constantly in, these will and be demonstrated using client in advance, and be write exactly in Terms of Use.
For shaped variable trick lock(8)Itself, password determining program is placed in main program, is read when having button, when true
Determine to judge when key is pressed;The password and 4 bytes of the space storage setting of 4 bytes is set to deposit input through keyboard in a program
Data;, will according to the keyboard data of reading and password successive appraximation set in advance it may determine that inputting the correctness of password
The password of input through keyboard is compared with the password set, if password is correct, is unlocked, defeated with this password Y after unlocking terminates
Enter for initial value, call password to change function Fn subprograms, obtain new password;If incorrect, Password Input counting how many times list
Member is counted, and is not reached such as 3 times, returns to keyboard scan module;If counting up to 3 times, alarm module is called;Its flow chart is as schemed
Shown in 5.
During specific unlocking, user sweeps the Quick Response Code of this coded lock by mobile phone, and this Quick Response Code is sent into management
Website background server inquiry, obtains password Y, password value Y and single-chip microcomputer internal memory password y carry out additive operation, if result
It is zero, then shows that password is correct, then unlock, it is initial value that x=y is taken after unlocking, call password to change function Fn subprograms,
Obtain new password deposit internal memory to preserve, wait is unlocked next time.Unlock each time successfully, password just changes once.Its program flow
Journey figure is as shown in Figure 6.
Cipher rotary knob(3)With cipher lock panel(22)Between be provided with back-moving spring(23), cipher rotary knob(3)Axle for set
Tubular construction, nested knob generating gear(5)Upper shaft, the axle is provided with cross recess(18), cipher rotary knob(3)Quill on the inside of
Nail is turned round provided with force(19), embedded knob generating gear(5)The cross recess of upper shaft(18)Interior, such structure causes user to exist
Rotational password knob(3)At this time, force turns round nail(19)In cross recess(18)Horizontal clearance in, will not produce down and hold up behaviour
Make;Cipher rotary knob(3)The bottom of quill weld elastic pressing key(20), elastic force pressing key(20)Lower section be button support
Disk(17), the button pallet(17)Pass through connection sheet and the cipher lock panel of top(22)It is fixed, the button pallet(17)Paste
There is keyboard conductive rubber(21), turn to after set password position, press down on cipher rotary knob(3), elastic force pressing key(20)
With button pallet(17)Upper keyboard conductive rubber(21)Contact conducting, inputs a password value.When hand decontrols cipher rotary knob(3)'s
When, in the presence of back-moving spring, set back.
Because the coded lock is used out of doors for a long time, without external power supply, it is therefore necessary to obtain electricity by open-air conditions
Can, electric energy is obtained in the following way.
Cipher rotary knob(3)With knob generating gear(5)It is coaxially connected, cipher rotary knob(3)It is combination disk below(1), password
Disk(1)It is pasted onto panel surface, cipher rotary knob(3)With knob generating gear(5)Between have panel isolation, 4 knob generating teeth
Wheel(5)While and motor gear(24)Engagement, 4 knob generating gears(5)Do not engage each other(As shown in Figure 7), motor gear
(24)With microgenerator(4)Coaxially;Microgenerator(4)Output circuit concatenates rectifier bridge stack(6)And connect rechargeable battery(7),
Rechargeable battery(7)For shaped variable trick lock(8)Electric energy is provided.Such structure causes user rotating one of cipher rotary knob
(3)When, knob generating gear(5)Also rotate, drive the motor gear being meshed therewith(24)Rotate, band actuating miniature
Generator(4)Generated electricity, output current passes through rectifier bridge stack(6)To rechargeable battery after rectification(7)Charged.
Solar panel(14)Output reversely concatenates voltage-regulator diode(15)It is positive afterwards to concatenate anti-return diode(16).
This structure causes when sunlight strong, solar panel(14)Export a high voltage, the pole of voltage breakdown voltage stabilizing two
Pipe(15)To rechargeable battery(7)Charged, if light is weak, for example at night, rechargeable battery(7)It is higher than in voltage
Solar panel(14)Output voltage, forward direction concatenation anti-return diode(16)Current reflux can be prevented.
Further, described a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to aobvious
Show and unlocking times m or time t is shown on module and function resets switch, display module, function resets switch passes through single-chip microcomputer
I/O mouthfuls of connection single-chip microcomputers, by press function resets switch can be inputted using keyboard password input submodule correct number of times m and
Time t, so as to change the functional value inside single-chip microcomputer;When described server is sent to client password, server note is contained
The unlocking numerical value m or time t of record;, can when user, which repeatedly inputs, not to be unlocked successfully yet after the password obtained from server
Number of times m and time t that server issues user are inputted using with keyboard password input submodule, so as to change inside single-chip microcomputer
Functional value.
Further, a kind of described lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to shake
Dynamic sensor assembly, shock sensor module is by single-chip processor i/o mouthful connection single-chip microcomputer, when coded lock is closed and is shaken
Dynamic sensor assembly is detected can send signal to single-chip microcomputer after sharp pounding, the alarm of MCU driving alarm module.
Further, a kind of described lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone, in addition to indigo plant
Tooth communication module, bluetooth communication can be passed through by single-chip processor i/o mouthful connection single-chip microcomputer, bluetooth communication with handheld device
Bluetooth is communicated, and is realized exchanging information for server and single-chip microcomputer by handheld device, is made server to solve error correction information
Functional operation with single-chip microcomputer is consistent, while the password obtained from server can also be sent to by single-chip microcomputer by handheld device,
Password comparison is carried out by single-chip microcomputer and realizes unlocking function.
Claims (10)
1. a kind of scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, it is characterised in that:Including mobile phone barcode scanning two
Tie up code and obtain variable cipher part and built-in function change unlocking coded lock part:
Part I:Mobile phone barcode scanning Quick Response Code, which obtains variable cipher part, to be used to look into managing web background server by mobile phone
Ask correspondence Quick Response Code function and obtain variable cipher;
Part II:Built-in function, which changes unlocking coded lock part, to be used to input unlatching shaped variable trick lock(8)Password.
2. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 1, its feature
It is:The Part I mobile phone barcode scanning Quick Response Code obtains variable cipher part and includes two modules:
1)Quick Response Code mark module:Quick Response Code is identified(10)It is pasted onto cipher lock panel(22)On, Quick Response Code mark(10)In
The heart is provided with Quick Response Code built-in hole(13), pass through Quick Response Code built-in hole(13)It can be seen that lock pin(12), in the lock pin(12)Above
It is pasted with mark patch(11), in lock pin(12)It is provided with lock knob(9), lock knob(9)Can be in cipher lock panel(22)On open up
Moved in hole slot, it is preceding to push away, lock, at the same time mark patch(11)Travel forward, shaped variable trick lock is in blocking, from two
Tie up code built-in hole(13)Seen for blank, pusher is then opened(As shown in Figure 8), at the same time mark patch(11)Transport backward
Dynamic, shaped variable trick lock is in opening, from Quick Response Code built-in hole(13)Seen for black, pass through Quick Response Code built-in hole
(13)Interior mark can differentiate shaped variable trick lock(8)Open and-shut mode;
2)Managing web background server function library inquiry obtains crypto module:Each Quick Response Code correspond to an independent letter
One of them in Fn is counted, this function is present in shaped variable trick lock(8)In internal memory, constitute password and change function subprogram;It is complete
Exactly the same function Fn is existed in platform management server function library simultaneously, as long as there is identical initial value, is just had identical
Operation result;After mobile phone scanning Quick Response Code, Quick Response Code is sent to back-stage management function by the special nets of wireless Internet
Library inquiry Quick Response Code respective function Fn, Quick Response Code built-in hole(13)For blank, coded lock is in blocking;Built in Quick Response Code
Hole(13)For black, coded lock is in unlocking condition, and server program can be according to shaped variable trick lock(8)Quick Response Code built-in hole
(13)Black and white state obtain lock open and-shut mode;If shaped variable trick lock(8)In blocking, then looked into according to the Quick Response Code
Respective function and functional value are ask, carrying out functional operation Fn (x) according to the password value x of last time input for initial value goes out result, counts
Calculate existing password Fn (x)=Y;Or functional operation Fn (m) is carried out according to unlocking times m go out Structure Calculation and have password
Fn (m)=Y;Or F n (t)=Y is calculated according to time t;Functional value Y is sent to the hand of client as password by corresponding app
On machine;If coded lock is in unlocking condition, checkout information is sent out to client, reminds client's checkout.
3. it is a kind of with mobile phone scanning Quick Response Code respective function acquisition variable cipher according to claim 1 or claim 2
Lock, it is characterised in that:The Part II changes password unlocking part by built-in function includes following 4 submodules:
Keyboard password input submodule;2)Power supply module;3)Single-chip microcomputer model and reset oscillating circuit submodule;4)Unlocking circuit
Submodule.
4. a kind of according to claim 3 scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, its feature exists
In:Described keyboard password input submodule include Password Input submodule hardware components, Password Input modular circuit part and
Control and password change module, wherein:
A. Password Input submodule hardware components are by 4 combination disks(1), 4 cipher rotary knobs(3), 16 numeral identifications(2), it is close
Code knob(3), button pallet(17), cross recess(18), force turn round nail(19), elastic force pressing key(20), keyboard conductive rubber
(21), cipher lock panel(22), back-moving spring(23)Constitute;Cipher rotary knob(3)With cipher lock panel(22)Between be provided with it is multiple
Position spring(23), cipher rotary knob(3)Axle be sleeve structure, nested knob generating gear(5)Upper shaft, the axle is provided with cross
Groove(18), cipher rotary knob(3)Quill on the inside of provided with force turn round nail(19), embedded knob generating gear(5)The ten of upper shaft
Word groove(18)It is interior, cipher rotary knob(3)The bottom of quill weld elastic pressing key(20), elastic force pressing key(20)Lower section
For button pallet(17), the button pallet(17)Pass through connection sheet and the cipher lock panel of top(22)It is fixed;
B. control program and password change module section:
A) main program is controlled:
The initialization of the function of the module including system, the setting of system initial password, call password multilevel iudge, Modify password
Etc. program module;Password determining program is placed in main program, is read when having button, is judged when determination key is pressed;In journey
The space of 4 bytes is set to deposit the password of setting and the data of 4 bytes storage input through keyboard in sequence;According to the keyboard data of reading
With password successive appraximation set in advance it may determine that input password correctness, by the password of input through keyboard with set it is close
Code is compared, if password is correct, is unlocked, after unlocking terminates, and with this password Y inputs for initial value, calls password to change
Function Fn subprograms, obtain new password;If incorrect, Password Input counting how many times element count does not reach such as 3 times, returns
Keyboard scan module;
b)Password changes module, is following one kind therein:
1) last password is called to change crypto module:Only lock is opened, and can just perform password modification action, password modification
Program requirement recalls last password x, with this password x inputs for initial value, calls password to change function Fn subprograms, carries out
Functional operation Fn (x) goes out result, Fn (x)=y, and the value constitutes new password deposit internal memory and preserved;During specific unlocking, Yong Hutong
Cross mobile phone to sweep the Quick Response Code of this coded lock, this Quick Response Code be sent to the inquiry of managing web background server, password Y is obtained,
Password value Y and single-chip microcomputer internal memory password y carry out additive operation, if result is zero, show that password is correct, then unlock,
It is initial value that x=y is taken after unlocking, calls password to change function Fn subprograms, obtains new password deposit internal memory and preserves, under wait
Once unlock;Unlock each time successfully, password just changes once;
2) allocating time function changes crypto module:Server is with being respectively provided with the same functions Fn with time correlation in coded lock
(t), function Fn (t) regularly updates password Y according to fixed time interval, and user scans Quick Response Code by mobile phone and sends service
Device obtains password Y from server, and password Y is inputted during unlocking and is compared with password in single-chip microcomputer, is unlocked when password is identical, different
When coded lock do not open;
3)Unlocking times function is called to change crypto module:Server is with being respectively provided with the same functions with time correlation in coded lock
Fn (m), is often performed when once unlocking and shut, and single-chip microcomputer counts m in coded lock, simultaneously closes off after lockset, and user passes through scanning
The mode of Quick Response Code payment sends a signal to server, and server counts m, server and password by the payment information received
Internal single-chip microcomputer call function Fn (m) the generation password Y of lock;When opening institute information is sent by way of scanning Quick Response Code to server
Function Fn (m) password is obtained, is compared by inputting password Y to coded lock, coded lock is opened when the two is identical, it is close when different
Code lock is not opened.
5. a kind of according to claim 4 scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, its feature exists
In:Switched including display module and function resets, unlocking times m or time t is shown on display module, function resets switch is logical
Single-chip processor i/o mouthful connection single-chip microcomputer is crossed, can be correct using the input of keyboard password input submodule by pressing function resets switch
Number of times m and time t, so as to change the functional value inside single-chip microcomputer;When described server is sent to client password, contain
The unlocking numerical value m or time t of server record;Do not unlocked into yet after user is repeatedly inputted from the password that server is obtained
During work(, number of times m and time t that server issues user are inputted using with keyboard password input submodule, so as to change monolithic
Functional value inside machine.
6. a kind of according to claim 4 scan the lock that Quick Response Code respective function obtains variable cipher with mobile phone, its feature exists
In:Described keyboard password input submodule includes also including alarm module, when input password is counted up to 3 times, then calls report
Alert module realizes alarm.
7. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 1,2,3, its
It is characterised by:For shaped variable trick lock(8)In the case of being inputted again without any external electric energy, realized and confessed using power supply module
Electricity.
8. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 7, its feature
It is:The power supply module, including mechanical charge part, it is by 4 combination disks(1), 4 knobs(3), 16 numeral identifications
(2), microgenerator(4)And knob generating gear(5)Constitute;Cipher rotary knob(3)With knob generating gear(5)Coaxially connect
Connect, cipher rotary knob(3)It is combination disk below(1), combination disk(1)It is pasted onto panel surface, cipher rotary knob(3)With knob generating tooth
Wheel(5)Between have panel isolation, 4 knob generating gears(5)While and motor gear(24)Engagement, 4 knob generating gears
(5)Do not engage each other(As shown in Figure 7), motor gear(24)With microgenerator(4)Coaxially;Microgenerator(4)Output electricity
Road concatenates rectifier bridge stack(6)And connect rechargeable battery(7), rechargeable battery(7)For shaped variable trick lock(8)Electric energy is provided.
9. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 7, its feature
It is:The power supply module, including solar powered part, it is by solar panel(14), voltage-regulator diode(15), prevent back
Flow diode(16)Constitute;Solar panel(14)Output reversely concatenates voltage-regulator diode(15)It is positive afterwards to concatenate anti-return two
Pole pipe(16).
10. a kind of lock that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone according to claim 7, its feature
It is:Also include shock sensor module, shock sensor module is by single-chip processor i/o mouthful connection single-chip microcomputer, at coded lock
Signal can be sent to single-chip microcomputer by being detected in closed mode and shock sensor module after sharp pounding, MCU driving alarm mould
Block is alarmed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710752787.0A CN107316367B (en) | 2017-08-29 | 2017-08-29 | Lock, two-dimensional code identification and coded lock power supply module for obtaining variable code by scanning two-dimensional code corresponding function through mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710752787.0A CN107316367B (en) | 2017-08-29 | 2017-08-29 | Lock, two-dimensional code identification and coded lock power supply module for obtaining variable code by scanning two-dimensional code corresponding function through mobile phone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107316367A true CN107316367A (en) | 2017-11-03 |
CN107316367B CN107316367B (en) | 2021-07-06 |
Family
ID=60176121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710752787.0A Active CN107316367B (en) | 2017-08-29 | 2017-08-29 | Lock, two-dimensional code identification and coded lock power supply module for obtaining variable code by scanning two-dimensional code corresponding function through mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107316367B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723362A (en) * | 2019-03-22 | 2020-09-29 | 倪晓 | Permission password generation method, system and device and terminal equipment |
CN114341956A (en) * | 2019-10-07 | 2022-04-12 | 李基喆 | Multiple locking device using random number cipher |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN206162780U (en) * | 2016-10-12 | 2017-05-10 | 杭州行我行网络有限公司 | Bicycle intelligence trick lock |
CN206236205U (en) * | 2016-12-08 | 2017-06-09 | 南京信息工程大学 | A kind of campus Bicycle hire based on Quick Response Code |
CN206256768U (en) * | 2016-12-07 | 2017-06-16 | 珠海优特电力科技股份有限公司 | Status display is locked |
CN106875253A (en) * | 2017-01-19 | 2017-06-20 | 杭州骑行科技有限公司 | Be applied to bicycle rental system has leased equipment and method of work of the station without stake |
CN106934892A (en) * | 2017-03-10 | 2017-07-07 | 华南理工大学 | A kind of shared bicycle intelligent bicycle lock and its charging method |
CN106952372A (en) * | 2017-03-23 | 2017-07-14 | 成都信息工程大学 | Lock safety vehicle and implementation method based on dynamic password |
CN106951812A (en) * | 2017-03-31 | 2017-07-14 | 腾讯科技(深圳)有限公司 | Recognize method, device and the terminal of Quick Response Code |
-
2017
- 2017-08-29 CN CN201710752787.0A patent/CN107316367B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN206162780U (en) * | 2016-10-12 | 2017-05-10 | 杭州行我行网络有限公司 | Bicycle intelligence trick lock |
CN206256768U (en) * | 2016-12-07 | 2017-06-16 | 珠海优特电力科技股份有限公司 | Status display is locked |
CN206236205U (en) * | 2016-12-08 | 2017-06-09 | 南京信息工程大学 | A kind of campus Bicycle hire based on Quick Response Code |
CN106875253A (en) * | 2017-01-19 | 2017-06-20 | 杭州骑行科技有限公司 | Be applied to bicycle rental system has leased equipment and method of work of the station without stake |
CN106934892A (en) * | 2017-03-10 | 2017-07-07 | 华南理工大学 | A kind of shared bicycle intelligent bicycle lock and its charging method |
CN106952372A (en) * | 2017-03-23 | 2017-07-14 | 成都信息工程大学 | Lock safety vehicle and implementation method based on dynamic password |
CN106951812A (en) * | 2017-03-31 | 2017-07-14 | 腾讯科技(深圳)有限公司 | Recognize method, device and the terminal of Quick Response Code |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723362A (en) * | 2019-03-22 | 2020-09-29 | 倪晓 | Permission password generation method, system and device and terminal equipment |
CN111723362B (en) * | 2019-03-22 | 2023-09-08 | 倪晓 | Authority password generation method, system, device and terminal equipment |
CN114341956A (en) * | 2019-10-07 | 2022-04-12 | 李基喆 | Multiple locking device using random number cipher |
CN114341956B (en) * | 2019-10-07 | 2023-03-14 | 李基喆 | Multiple locking device using random number cipher |
Also Published As
Publication number | Publication date |
---|---|
CN107316367B (en) | 2021-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107293027A (en) | A kind of variable two-dimension code lock | |
CN201554280U (en) | Photoelectric cipher lock system | |
CN203490747U (en) | Multidirectional intelligent access control system | |
CN103824365B (en) | RFID technology based intelligent padlock and its unlocking method | |
CN107316367A (en) | A kind of lock, Quick Response Code mark, coded lock power supply module that Quick Response Code respective function acquisition variable cipher is scanned with mobile phone | |
CN208251851U (en) | The smart lock and system of a kind of substation's relay protection room | |
CN108360925A (en) | A kind of intelligent lock system and its control method | |
CN106934903A (en) | A kind of blue-tooth intelligence lock | |
CN206903420U (en) | A kind of suitcase lock for integrating NFC electronic locks and electronic ink screen | |
CN207380827U (en) | Shared bicycle management system based on ZIGBEE | |
CN107578504A (en) | A kind of variable two-dimension code lock, variable two-dimension code and variable two-dimension code lock method of work | |
CN109356460A (en) | A kind of control circuit and control method of smart lock | |
CN106703542A (en) | Intelligent multi-angle knock-on type algorithm coded lock | |
CN105730563B (en) | Based on the self-locking bicycle lock of cipher control and its method | |
CN206271038U (en) | A kind of bicycle based on smart lock and intelligent battery rents also system | |
CN206903419U (en) | A kind of suitcase provided with NFC electronic locks | |
CN107358706A (en) | A kind of variable two-dimension code lock, variable two-dimension code | |
CN104346589B (en) | A kind of password setting, unlocking system and method | |
CN206646928U (en) | SCM Based touch singly-bound coded lock | |
CN203480514U (en) | Password setting system and password decoding system | |
CN107139882A (en) | Electric car remote control dynamical system unit | |
CN202249269U (en) | Solar coded lock circuit | |
CN205880947U (en) | Intelligence lock based on GPS and bluetooth control | |
CN204557505U (en) | Safety-type car locking device | |
CN107191070A (en) | A kind of Intelligent Passive electronics idle-run lock pin |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210617 Address after: 264200 room 113, building A3, No. 52, Lushan Road, Zhangcun Town, Huancui District, Weihai City, Shandong Province Applicant after: Weihai Chuanghui Information Technology Co.,Ltd. Address before: No. 66, Guan Shang Dong Road, Guandu District, Kunming, Yunnan Applicant before: Long Wenkai |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |