CN107939172A - A kind of electronic cipher lockset system and its verification method - Google Patents

A kind of electronic cipher lockset system and its verification method Download PDF

Info

Publication number
CN107939172A
CN107939172A CN201711393327.XA CN201711393327A CN107939172A CN 107939172 A CN107939172 A CN 107939172A CN 201711393327 A CN201711393327 A CN 201711393327A CN 107939172 A CN107939172 A CN 107939172A
Authority
CN
China
Prior art keywords
contact point
lock core
controller
shell
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711393327.XA
Other languages
Chinese (zh)
Inventor
闵浩
张益�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
East Of Nanjing Electric Applicance Co Ltd
Nanjing Easthouse Electrical Co Ltd
Original Assignee
East Of Nanjing Electric Applicance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by East Of Nanjing Electric Applicance Co Ltd filed Critical East Of Nanjing Electric Applicance Co Ltd
Priority to CN201711393327.XA priority Critical patent/CN107939172A/en
Publication of CN107939172A publication Critical patent/CN107939172A/en
Pending legal-status Critical Current

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Abstract

The invention discloses a kind of electronic cipher lockset system and its verification method, including key and lock core, include power module and the first controller in the key;The edge of key sets first interface module, the lock core includes second controller and driving device, the edge of lock core sets second interface module, after the first interface module and the second interface module contact, power module is powered to lock core, after second controller receives the password of the first controller transmission, driving device work, realizes and unlocks.The beneficial effects of the present invention are lock core passive design adds security, strengthens environmental suitability, such as vibrations, waterproof etc..Interface module realizes the nonpolarity use of key, improves the stability and convenience of interface.Lock core, key, mobile terminal, background server cooperating improve security of system.

Description

A kind of electronic cipher lockset system and its verification method
Technical field
The present invention relates to a kind of lockset, more particularly, to a kind of electronic cipher lockset system and its verification method.
Background technology
Lockset is generally divided into mechanical lock and electronic lock, the electronic password lock alleged by the present invention, including mechanical part and circuit Part.The structure of mechanical part is disclosed via the application for a patent for invention of Application No. 201711097840.4, and the application is main For the circuit structure of the electronic password lock, some mechanical structure is directed to.
The content of the invention
The defects of in order to overcome the prior art, the present invention propose a kind of electronic cipher lockset system and its verification method.
In order to realize foregoing invention purpose, the present invention adopts the following technical scheme that:
A kind of electronic cipher lockset system, including key and lock core, it is characterised in that include power module and the in the key One controller;The edge of key sets first interface module, and the lock core includes second controller and driving device, the side of lock core Edge sets second interface module, and after the first interface module and the second interface module contact, power module gives lock core to supply Electricity, after second controller receives the checking information of the first controller transmission, driving device work, realizes and unlocks.
Preferably, the most external of the key is the first shell, and the power module and the first controller are all provided with Put in the first shell;The edge of first shell is provided with through hole, and first interface module, first interface module bag are set in through hole Second housing is included, at least three contact points are provided with the second housing, is respectively first make contact, the second contact point and the Four contact points;Wherein, first make contact and the 4th contact point connect the cathode of power module by power cord;Second housing passes through Power cord connects the anode of power module;Second contact point connects the first controller by data cable;
The most external of the lock core is the 3rd shell, and the edge of the 3rd shell is provided with through hole, second interface is provided with through hole Module, second interface module include the 4th shell, and the 4th shell is provided with least three contacts, are respectively the 5th contact point, the Six contact points and the 8th contact point;Wherein, the 5th contact point and the 8th contact point are connecting second controller just by power cord Pole connects;4th shell connects the anode of second controller by power cord;6th contact point passes through the second control of data cable connection Device processed.
Preferably, the most external of the key is the first shell, and the power module and the first controller are all provided with Put in the first shell;The edge of first shell is provided with through hole, and first interface module, first interface module bag are set in through hole Second housing is included, at least three contact points are provided with the second housing, is respectively first make contact, the second contact point and the Four contact points;Wherein, first make contact and the 4th contact point connect the cathode or anode of power module by power cord respectively; Second contact point connects the first controller by data cable;
The most external of the lock core is the 3rd shell, and the edge of the 3rd shell is provided with through hole, second interface is provided with through hole Module, second interface module include the 4th shell, and the 4th shell is provided with least three contacts, are respectively the 5th contact point, the Six contact points and the 8th contact point;Wherein, the 5th contact point and the 8th contact point connect the input of rectification circuit by power cord End;The output terminal of rectification circuit is connected to second controller by power cord;6th contact point passes through the second control of data cable connection Device processed.
Preferably, the 3rd contact point is additionally provided with the second housing, the 3rd contact point is connected by data cable Connect the first controller;The 7th contact point is additionally provided with 4th shell, the 7th contact point passes through the second control of data cable connection Device processed;Second contact point and the 3rd contact point do self-adaptive processing or the 6th contact point and the 7th contact point does adaptive place Reason.
Preferably, button is provided with first shell, the button is opening for Keyed interior function module Close.
Preferably, the first make contact, the second contact point and the 4th contact point are arranged in the first shell One end, which is set, to have elastic component, and first make contact, the second contact point and the 4th contact point can realize a degree of displacement;Institute Stating the 5th contact point, the 6th contact point and the 8th contact point keeps a fixed position not change.
Preferably, magnet is provided with the second housing or the 4th shell, outside second housing and/or the 4th Shell uses magnetic material, so as to facilitate first interface module and second interface module to fix.
Preferably, mobile terminal and background server are further included, the first channel radio is additionally provided with the key Believe module, the second wireless communication module and the 3rd wireless communication module are provided with the mobile terminal;In the key One wireless communication module communicates with the second wireless communication module in mobile terminal and realizes the transmission of data;The 3rd in mobile terminal Wireless communication module communicates with background server and realizes the transmission of data.
Preferably, the communication between first wireless communication module and the second wireless communication module It is preferred that bluetooth, NFC, ZIGBEE.
The preferred cellular data mobile communications network of communication mode between 3rd wireless communication module and background server, WiFi, GPRS, NFC.
A kind of verification method of electronic cipher lockset system, comprises the following steps:
After lock core is powered, it is first determined whether being the power supply that legal key is provided to lock core, second controller passes through data cable Request command is sent to the first controller, after the first controller receives request command, sends response command;Second controller receives After response command, the power supply that legal key provides is determined whether;
If request response of step fails by, lock core on the premise of energization, request is resend at regular intervals Order, until receiving response command or power-off;If the request command that second controller is sent is in a time set in advance Do not responded inside, then second controller no longer sends request command, even if lock core is in "on" position at this time;
After second controller receives response command, the unique identification code of each lock core is sent to the first control by data cable Device, after the first controller receives above-mentioned lock core identification code, judges the lock core whether in the range of the default unlocking of the lock core, if not In the range of the default unlocking of the lock core, invalid unlocking processing is done, and can be with trigger attention device;
If in the range of the default unlocking of the lock core, determine whether there is the password of pre- hair in key, if there is pre- hair Password, then the first controller the password of the pre- hair is sent to second controller by data cable, second controller receives password Afterwards, the validity of pre- hair password is checked;If password is effective, driving device work, realizes and unlocks;If password useless, driving device Do not work.
A kind of verification method of electronic cipher lockset system, background server be responsible for register key, lock core, mobile terminal, APP, user;APP is operate in the program in mobile terminal;User is the void for having certain operating right that background server assigns Intend main body;Background server is responsible for unlocking plan;After background server is according to unlocking Project Authorization, by mobile terminal APP login users, initialization key, lock core, unlocked according to the mandate of background server;The key, lock core, movement Terminal, APP, with it is consistent with the mandate of background server per family when, could realize unlocking.
Preferably, the mobile terminal is mobile phone either tablet computer or PDA or PC.
A kind of verification method of electronic cipher lockset system, the background server directly send disposable unlocking cipher To mobile terminal;Directly disposal password is inputted to key, key and lock core contact, lockset by mobile terminal and is opened.
The beneficial effects of the present invention are lock core passive design adds security, strengthens environmental suitability, for example shake Dynamic, waterproof etc..Interface module realizes the nonpolarity use of key, improves the stability and convenience of interface.Lock core, key, Mobile terminal, background server cooperating improve security of system.
Brief description of the drawings
Fig. 1 is the structure diagram of one key of embodiment.
Fig. 2 is the partial enlarged view of Fig. 1.
Fig. 3 is the structure diagram of one lock core of embodiment.
Fig. 4 is the partial enlarged view of Fig. 3.
Fig. 5 is the functional module structure schematic diagram of one key of embodiment and lock core.
Fig. 6 is the functional module structure schematic diagram of one key of embodiment and lock core.
Fig. 7 is the structure diagram of embodiment two.
Embodiment
The present invention is described in more detail below in conjunction with attached drawing.
Embodiment one
As shown in Figure 1, Figure 2, shown in Fig. 3, Fig. 4, Fig. 5 and Fig. 6, embodiment one gives a kind of relatively simple lock system and makes Use method.From one hardware of embodiment physically, the present invention include two parts, key 1 and lock core 2, it is accordingly required in particular to Illustrate, the lock core and the shape of key provided in attached drawing is can be changed according to the demand of design.Lock core 2 and key Spoon 1 is connected by interface module, in use, the first interface module 13 on key 1 to be aligned to the second interface module of lock core 2 23, communication data is transferred to lock core through interface module, after lock core is verified, drives the driving device in lock core, realizes and unlock.
Include 11 and first controller 12 of power module in key 1, power module 11 is to each function module in key 1 Power supply, while also powered by power cord to lock core.It is not provided with power supply in lock core, each function module in lock core needs to power When, it is necessary to external power supply is obtained by second interface module 23.The most external of key 1 is the first shell 10,11 He of power module First controller 12 is arranged in the first shell 10.There is through hole at the edge of first shell 10, and first interface mould is set in through hole Block 13, first interface module 13 include second housing 130, four contact points are provided with the second housing 130, are respectively the One contact point 131, the second contact point 132, the 3rd contact point 133 and the 4th contact point 134;Wherein, first make contact 131 and Four contact points 134 connect power module 11 by power cord;Second contact point 132 and the 3rd contact point 133 are connected by data cable Connect the first controller.
Include second controller 21 and driving device 22 in lock core 2, the most external of lock core is the 3rd shell 20, the 3rd shell 20 edge is provided with through hole, and second interface module 23 is provided with through hole, and second interface module 23 includes the 4th shell 230, 4th shell 230 is provided with four contact points, is respectively the 5th contact point 231, the 6th contact point 232,233 and of the 7th contact point 8th contact point 234.Wherein, the 5th contact point 231 and the 8th contact point 234 need to supply by each inside power cord and lock core The module of electricity is connected, including second controller 21 and driving device 22;6th contact point 232 and the 7th contact point 233 pass through Data cable is connected with second controller.
One of creation point of the present embodiment is, when key 1 and lock core 2 contact, woth no need to consider the positive-negative polarity of power supply, After as long as first interface module 13 and second interface module 23 contact, power module 11 can be supplied by power cord to lock core 2 Electricity.Above-mentioned non-polar design scheme has two schemes, and a kind of scheme is that 131 and the 4th contact point 134 of first make contact passes through electricity The cathode of source line connection power module 11, second housing 130 connect the anode of power module 11 by power cord;It is corresponding, the Five contact points 231 and the 8th contact point 234 connect the cathode of each module for needing to power inside lock core by power cord, and the 4th Shell 230 connects the anode of each module for needing to power inside lock core by power cord.Such scheme feature is key 1 and lock Outermost two contacts are fixedly connected with the cathode of power module in core 2, and ground wire is used as by the use of the shell of interface module.
Another scheme is that 131 and the 4th contact point 134 of first make contact connects power module respectively by power cord 11 cathode or anode;5th contact point 231 and the 8th contact point 234 are connected to the input of rectification circuit 24 by power cord End, the output terminal of rectification circuit 24 connect the cathode and anode of each module for needing to power inside lock core by power cord.On The characteristics of stating scheme is that rectification circuit 24 is added between by electric contact and the function module of electricity consumption in lock core.No matter rectification circuit is defeated Enter the positive-negative polarity at end, the positive-negative polarity of its output terminal is changeless.
On the basis of above-mentioned power supply non-polar design, it is also necessary to consider the matching of data communication interface, embodiment one The contacts of transmission data include the second contact point 132 and the 3rd contact point 133 in key 1, the 6th contact point in lock core 2 232 and the 7th contact point 233.Solution is that the second contact point 132 and the 3rd contact point 133 do self-adaptive processing, Huo Zhe Six contact points 232 and the 7th contact point 233 do self-adaptive processing.For example, the second contact point 132 transmits clock signal, the 3rd connects Transmit data-signal in contact 133;Then the 6th contact point 232 and the 7th contact point 233 can transmit clock signal or pass Send data-signal.
It should be strongly noted that the contact that data cable is connected in key 1 or lock core 2 can be designed as one, three And it is more, embodiment one is only to illustrate the principle of the invention designed by taking two data line contacts as an example.Those skilled in the art Member can select as needed transmission data contact quantity, and according to the present invention spirit data transfer contact is done it is adaptive It should handle.
Another of the present embodiment is created point and is, after key 1 and the contact of lock core 2, in order to realize that both stabilizations are consolidated It is fixed, second housing 130 be either provided with the 4th shell 230 130 or the 4th shell 230 of magnet second housing using iron content, The magnetic material of nickel etc., so as to facilitate the fixation of first interface module 13 and second interface module 23.
Another of the present embodiment is created point and is, first make contact 131, the second contact point 132, the 3rd contact point 133 and the 4th contact point 134 can realize a degree of displacement;5th contact point 231, the contact of the 6th contact point the 232, the 7th 233 and the 8th contact point 234 of point keeps a fixed position not change.So design the advantages of be may insure contact point it Between establish stabilization connection.Key and lock core not in contact with when, first make contact 131, the second contact point 132, the 3rd contact point 133 and the 4th contact point 134 because the effect of flexible member causes it to extend to maximum distance to outside, after contacting point contact, Since the power that magnet produces, or the power due to artificially producing will drive first make contact 131, the second contact point the 132, the 3rd to connect 133 and the 4th contact point 134 of contact is moved to Keyed interior, until first interface module 13 and second interface module 23 is complete Attach.
After lock core 2 is powered, it is power supply of the legal key 1 to the offer of lock core 2 to first have to judge whether, second controller 21 Request command is sent to the first controller 12 by data cable, after the first controller 12 receives request command, response should be sent Order;After second controller 21 receives response command, judgement is the power supply that legal key 1 provides, and can enter next step. Legal key designated herein refers to responding the key of second controller request command, and the process of this request response can It is one of condition for ensureing lock system safety to be accomplished in several ways, if request response of step fails by locking Core resends request command at regular intervals on the premise of energization, until receiving response command or power-off.If the The request command that two controllers 21 are sent is not responded within a time set in advance, then second controller 21 is no longer sent Request command, even if lock core is in "on" position at this time.
After second controller 21 receives response command, the unique identification code of each lock core is sent to first by data cable Controller 12, after the first controller 12 receives above-mentioned lock core identification code, judges the lock core whether in the range of the unlocking of itself, if Not in the range of the unlocking of itself, invalid unlocking processing is done, and can be with trigger attention device.If in the range of the unlocking of itself, Then determine whether there is the password of pre- hair in key, if there is the password of pre- hair, the first controller 12 is by the close of the pre- hair Code is sent to second controller 21 by data cable, after second controller receives password, the validity of the password is verified, if password Effectively, then the supply line of driving device 22 is turned on, so as to fulfill unlocking.
One corresponding lock system of embodiment and method for unlocking are relatively simple system and method, its main feature is that working as key 1 and after lock core 2 correctly contacts, it is possible to unlock, advantage is relatively convenient when using, meanwhile, it is in security the defects of It is similarly obvious.
Embodiment two
The present embodiment is the continuity of embodiment one, in embodiment one, describes the feelings for only there was only key and lock core cooperating Shape, the security risk which can not avoid key from losing and produce.To solve the above-mentioned problems, the present embodiment proposes one The communication means of a high safety and its lock system used.
As shown in fig. 7, the present embodiment further includes mobile terminal 3 on the basis of lock system includes key 1 and lock core 2 With background server 4.The first wireless communication module 14 is additionally provided with key 1, the second wireless communication is provided with mobile terminal 3 32 and the 3rd wireless communication module 33 of module.
The first wireless communication module 14 in key 1 communicates and realizes with the second wireless communication module 32 in mobile terminal 3 The transmission of data.The preferred bluetooth of communication between first wireless communication module 14 and the second wireless communication module 32, NFC、ZIGBEE。
The 3rd wireless communication module 33 communicates with background server 4 and realizes the transmission of data in mobile terminal 3.3rd nothing The preferred cellular data mobile communications network of communication mode, WiFi, GPRS between line communication module 33 and background server 4, NFC。
Background server is responsible for registering key, lock core, mobile terminal, APP, user;Mobile terminal is typically staff Hand-held mobile equipment, can be mobile phone, tablet computer, PDA, PC.APP is operate in the program in mobile terminal, can incite somebody to action It is interpreted as the interface of personal-machine interaction;Need to run APP just because of mobile terminal, therefore mobile terminal is with operation The hardware of system.User be background server assign the virtual subject for having certain operating right, the virtual subject often with spy Fixed staff corresponds to.
Background server is responsible for unlocking plan, unlocks according to plan;Specifically, key, lock core, mobile terminal, APP, With it is consistent with the mandate of background server per family when, could realize unlocking.
After background server mandate, login user, initialization key, lock core, work are operated by the APP in mobile terminal Personnel unlock according to the mandate of background server.
Embodiment three
It is some need energency-unlocking in the case of, the present embodiment proposes a kind of emergent unlocking scheme, by background server Disposable unlocking cipher is directly sent to mobile terminal;Directly disposal password is inputted to key by mobile terminal, will Key and lock core contact, lockset are opened.The password that this sample loading mode produces is used only once, and after lockset closes, original is close Code failure.

Claims (13)

1. a kind of electronic cipher lockset system, including key and lock core, it is characterised in that include in the key power module and First controller;The edge of key sets first interface module, and the lock core includes second controller and driving device, lock core Edge sets second interface module, and after the first interface module and the second interface module contact, power module is to lock core Power supply, after second controller receives the checking information of the first controller transmission, driving device work, realizes and unlocks.
2. a kind of electronic cipher lockset system according to claim 1, it is characterised in that the most external of the key is One shell, the power module and the first controller are arranged in the first shell;The edge of first shell is provided with through hole, leads to First interface module is set in hole, and first interface module includes second housing, and being provided with least three in the second housing connects Contact, is respectively first make contact, the second contact point and the 4th contact point;Wherein, first make contact and the 4th contact point pass through Power cord connects the cathode of power module;Second housing connects the anode of power module by power cord;Second contact point passes through Data cable connects the first controller;
The most external of the lock core is the 3rd shell, and the edge of the 3rd shell is provided with through hole, second interface is provided with through hole Module, second interface module include the 4th shell, and the 4th shell is provided with least three contacts, are respectively the 5th contact point, the Six contact points and the 8th contact point;Wherein, the 5th contact point and the 8th contact point are connecting second controller just by power cord Pole connects;4th shell connects the anode of second controller by power cord;6th contact point passes through the second control of data cable connection Device processed.
3. a kind of electronic cipher lockset system according to claim 1, it is characterised in that the most external of the key is One shell, the power module and the first controller are arranged in the first shell;The edge of first shell is provided with through hole, leads to First interface module is set in hole, and first interface module includes second housing, and being provided with least three in the second housing connects Contact, is respectively first make contact, the second contact point and the 4th contact point;Wherein, first make contact and the 4th contact point pass through Power cord connects the cathode or anode of power module respectively;Second contact point connects the first controller by data cable;
The most external of the lock core is the 3rd shell, and the edge of the 3rd shell is provided with through hole, second interface is provided with through hole Module, second interface module include the 4th shell, and the 4th shell is provided with least three contacts, are respectively the 5th contact point, the Six contact points and the 8th contact point;Wherein, the 5th contact point and the 8th contact point connect the input of rectification circuit by power cord End;The output terminal of rectification circuit is connected to second controller by power cord;6th contact point passes through the second control of data cable connection Device processed.
4. a kind of electronic cipher lockset system according to claim 2 or 3, it is characterised in that in the second housing The 3rd contact point is additionally provided with, the 3rd contact point connects the first controller by data cable;It is additionally provided with 4th shell 7th contact point, the 7th contact point connect second controller by data cable;Second contact point and the 3rd contact point are done adaptively Processing or the 6th contact point and the 7th contact point do self-adaptive processing.
5. a kind of electronic cipher lockset system according to claim 2 or 3, it is characterised in that on first shell Button is provided with, the button is the switch of Keyed interior function module.
6. a kind of electronic cipher lockset system according to claims 1 or 2 or 3, it is characterised in that described first connects One end that contact, the second contact point and the 4th contact point are arranged in the first shell, which is set, to have elastic component, first make contact, the Two contact points and the 4th contact point can realize a degree of displacement;5th contact point, the 6th contact point and the 8th connect Contact keeps a fixed position not change.
7. a kind of electronic cipher lockset system according to claims 1 or 2 or 3, it is characterised in that outside described second Magnet is provided with shell or the 4th shell, second housing and/or the 4th shell use magnetic material, so as to facilitate first interface Module and second interface module are fixed.
8. a kind of electronic cipher lockset system according to claims 1 or 2 or 3, it is characterised in that further include movement Terminal and background server, are additionally provided with the first wireless communication module in the key, second are provided with the mobile terminal Wireless communication module and the 3rd wireless communication module;The first wireless communication module in the key and the second nothing in mobile terminal Line communication module communicates and realizes the transmission of data;The 3rd wireless communication module communicates and real with background server in mobile terminal The transmission of existing data.
A kind of 9. electronic cipher lockset system according to claim 8, it is characterised in that first wireless communication module And the second preferred bluetooth of communication between wireless communication module, NFC, ZIGBEE;3rd wireless communication module is with after The preferred cellular data mobile communications network of communication mode, WiFi, GPRS between platform server, NFC.
10. a kind of verification method of electronic cipher lockset system, it is characterised in that comprise the following steps:
After lock core is powered, it is first determined whether being the power supply that legal key is provided to lock core, second controller passes through data cable Request command is sent to the first controller, after the first controller receives request command, sends response command;Second controller receives After response command, the power supply that legal key provides is determined whether;
If request response of step fails by, lock core on the premise of energization, request is resend at regular intervals Order, until receiving response command or power-off;If the request command that second controller is sent is in a time set in advance Do not responded inside, then second controller no longer sends request command, even if lock core is in "on" position at this time;
After second controller receives response command, the unique identification code of each lock core is sent to the first control by data cable Device, after the first controller receives above-mentioned lock core identification code, judges the lock core whether in the range of the default unlocking of the lock core, if not In the range of the default unlocking of the lock core, invalid unlocking processing is done, and can be with trigger attention device;
If in the range of the default unlocking of the lock core, determine whether there is the password of pre- hair in key, if there is pre- hair Password, then the first controller the password of the pre- hair is sent to second controller by data cable, second controller receives password Afterwards, the validity of pre- hair password is checked;If password is effective, driving device work, realizes and unlocks;If password useless, driving device Do not work.
A kind of 11. verification method of electronic cipher lockset system, it is characterised in that background server be responsible for register key, lock core, Mobile terminal, APP, user;APP is operate in the program in mobile terminal;User be background server assign have certain behaviour Make the virtual subject of authority;Background server is responsible for unlocking plan;After background server is according to unlocking Project Authorization, pass through APP login users in mobile terminal, initialization key, lock core, unlock according to the mandate of background server;The key Spoon, lock core, mobile terminal, APP, with it is consistent with the mandate of background server per family when, could realize unlocking.
12. a kind of verification method of electronic cipher lockset system, it is characterised in that background server directly will disposably unlock close Code is sent to mobile terminal;Directly disposal password is inputted to key, key and lock core contact, lockset by mobile terminal and is beaten Open.
13. a kind of verification method of electronic cipher lockset system according to claim 10 either 11 or 12, its feature It is, the mobile terminal is mobile phone either tablet computer or PDA or PC.
CN201711393327.XA 2017-12-21 2017-12-21 A kind of electronic cipher lockset system and its verification method Pending CN107939172A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711393327.XA CN107939172A (en) 2017-12-21 2017-12-21 A kind of electronic cipher lockset system and its verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711393327.XA CN107939172A (en) 2017-12-21 2017-12-21 A kind of electronic cipher lockset system and its verification method

Publications (1)

Publication Number Publication Date
CN107939172A true CN107939172A (en) 2018-04-20

Family

ID=61941032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711393327.XA Pending CN107939172A (en) 2017-12-21 2017-12-21 A kind of electronic cipher lockset system and its verification method

Country Status (1)

Country Link
CN (1) CN107939172A (en)

Similar Documents

Publication Publication Date Title
CN207761449U (en) A kind of electronic cipher lockset system
CN102561826B (en) Wireless cloud intelligence lock and working method thereof
CN202578196U (en) Intelligent lock
CN103578169A (en) Intelligent informationized passive electronic lockset
CN109204227A (en) Vehicle shared system and vehicle sharing method
CN104484925B (en) Intelligent lock control system
CN107004317A (en) To the certification for the user for accessing physical space
CN204759556U (en) Access control ware
CN104052817A (en) Intelligent door and intelligent door control method and system
CN103049953A (en) Electronic lock
CN102606006B (en) Wireless cloud drawer lock and operating method thereof
CN104123775A (en) Dynamic password lock
CN104484926A (en) Intelligent door lock management system based on wireless control of mobile phone
CN205531778U (en) Wireless remote control intelligence trick lock
CN106330632A (en) Intelligent home Internet of Things communication device
CN110070660A (en) A kind of gate inhibition and the integrated control method of terraced control and system
CN106846582A (en) A kind of intelligent door lock control method
CN110374413A (en) A kind of intelligent wireless door-locking system
CN107939172A (en) A kind of electronic cipher lockset system and its verification method
CN106499262A (en) Vehicular intelligent key based on APP softwares
CN110137812A (en) A kind of intelligent electric cabinet that can be self-locking and its control method
CN206972037U (en) Secrecy box
CN205722057U (en) A kind of electronic lock easily connecing lock module and there is this module
CN205000765U (en) Electronic lock and electronic lock control system
CN105023320A (en) Bluetooth intelligent lock and method for remotely controlling Bluetooth intelligent lock through Bluetooth mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination