CN107939172B - Electronic password lockset system and verification method thereof - Google Patents

Electronic password lockset system and verification method thereof Download PDF

Info

Publication number
CN107939172B
CN107939172B CN201711393327.XA CN201711393327A CN107939172B CN 107939172 B CN107939172 B CN 107939172B CN 201711393327 A CN201711393327 A CN 201711393327A CN 107939172 B CN107939172 B CN 107939172B
Authority
CN
China
Prior art keywords
contact point
shell
controller
key
interface module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711393327.XA
Other languages
Chinese (zh)
Other versions
CN107939172A (en
Inventor
闵浩
张益�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongwu Shian Iot Technology Jiangsu Co ltd
Original Assignee
Dongwu Shian Iot Technology Jiangsu Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongwu Shian Iot Technology Jiangsu Co ltd filed Critical Dongwu Shian Iot Technology Jiangsu Co ltd
Priority to CN201711393327.XA priority Critical patent/CN107939172B/en
Publication of CN107939172A publication Critical patent/CN107939172A/en
Application granted granted Critical
Publication of CN107939172B publication Critical patent/CN107939172B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an electronic coded lock system and a verification method thereof, wherein the electronic coded lock system comprises a key and a lock cylinder, and the key comprises a power supply module and a first controller; the edge of the key is provided with a first interface module, the lock core comprises a second controller and a driving device, the edge of the lock core is provided with a second interface module, after the first interface module is contacted with the second interface module, the power module supplies power to the lock core, and after the second controller receives a password sent by the first controller, the driving device works to unlock. The invention has the beneficial effects that the passive design of the lock cylinder increases the safety and enhances the environmental adaptability, such as vibration, water resistance and the like. The interface module realizes the nonpolar use of the key, and improves the stability and convenience of the interface. The lock core, the key, the mobile terminal and the background server cooperate to improve the safety of the system.

Description

Electronic password lockset system and verification method thereof
Technical Field
The present disclosure relates to locks, and particularly to an electronic password lock system and a verification method thereof.
Background
Locks are generally classified into mechanical locks and electronic locks, and the electronic combination lock referred to in the present invention includes a mechanical part and a circuit part. The structure of the mechanical part is disclosed by the patent application of the invention with the application number 201711097840.4, and the application is mainly aimed at the circuit structure of the electronic coded lock and also relates to part of the mechanical structure.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides an electronic password lockset system and a verification method thereof.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
an electronic coded lock system comprises a key and a lock cylinder, and is characterized in that the key comprises a power module and a first controller; the edge of the key is provided with a first interface module, the lock core comprises a second controller and a driving device, the edge of the lock core is provided with a second interface module, after the first interface module is contacted with the second interface module, the power module supplies power to the lock core, and after the second controller receives verification information sent by the first controller, the driving device works to unlock the lock.
Preferably, the outermost part of the key is a first shell, and the power module and the first controller are both arranged in the first shell; the edge of the first shell is provided with a through hole, a first interface module is arranged in the through hole, the first interface module comprises a second shell, and at least three contact points, namely a first contact point, a second contact point and a fourth contact point, are arranged in the second shell; the first contact point and the fourth contact point are connected with the anode of the power supply module through a power line; the second housing is connected with the negative electrode of the power supply module through a power line; the second contact point is connected with the first controller through a data line;
the outermost part of the lock cylinder is a third shell, a through hole is formed in the edge of the third shell, a second interface module is arranged in the through hole, the second interface module comprises a fourth shell, and the fourth shell is provided with at least three contacts, namely a fifth contact point, a sixth contact point and an eighth contact point; the fifth contact point and the eighth contact point are connected with the positive electrode of the second controller through a power line; the fourth shell is connected with the negative electrode of the second controller through a power line; the sixth contact point is connected with the second controller through a data line.
Preferably, the outermost part of the key is a first shell, and the power module and the first controller are both arranged in the first shell; the edge of the first shell is provided with a through hole, a first interface module is arranged in the through hole, the first interface module comprises a second shell, and at least three contact points, namely a first contact point, a second contact point and a fourth contact point, are arranged in the second shell; the first contact point and the fourth contact point are respectively connected with the positive electrode or the negative electrode of the power supply module through power lines; the second contact point is connected with the first controller through a data line;
the outermost part of the lock cylinder is a third shell, a through hole is formed in the edge of the third shell, a second interface module is arranged in the through hole, the second interface module comprises a fourth shell, and the fourth shell is provided with at least three contacts, namely a fifth contact point, a sixth contact point and an eighth contact point; the fifth contact point and the eighth contact point are connected with the input end of the rectifying circuit through a power line; the output end of the rectifying circuit is connected to the second controller through a power line; the sixth contact point is connected with the second controller through a data line.
As a preferable scheme, a third contact point is further arranged in the second shell, and the third contact point is connected with the first controller through a data line; a seventh contact point is also arranged in the fourth shell and is connected with the second controller through a data line; the second contact point and the third contact point are adaptively processed or the sixth contact point and the seventh contact point are adaptively processed.
Preferably, a button is arranged on the first shell, and the button is a switch of the key internal function module.
As a preferable scheme, one end of the first contact point, the second contact point and the fourth contact point, which are arranged in the first shell, is provided with an elastic element, and the first contact point, the second contact point and the fourth contact point can realize displacement to a certain extent; the fifth, sixth and eighth contact points remain in a fixed position.
Preferably, the second housing or the fourth housing is provided with a magnet, and the second housing and/or the fourth housing are made of magnetic materials, so that the first interface module and the second interface module are convenient to fix.
The key is characterized by further comprising a mobile terminal and a background server, wherein a first wireless communication module is further arranged in the key, and a second wireless communication module and a third wireless communication module are arranged in the mobile terminal; the first wireless communication module in the key communicates with the second wireless communication module in the mobile terminal and realizes data transmission; and the third wireless communication module in the mobile terminal is communicated with the background server and realizes data transmission.
Preferably, the wireless communication mode between the first wireless communication module and the second wireless communication module is bluetooth, NFC or ZIGBEE.
The communication mode between the third wireless communication module and the background server is preferably a cellular data mobile communication network, wiFi, GPRS or NFC.
A verification method of an electronic password lockset system comprises the following steps:
after the lock cylinder is electrified, whether a legal key provides power for the lock cylinder is judged, the second controller sends a request command to the first controller through the data line, and the first controller sends a response command after receiving the request command; after receiving the response command, the second controller judges whether the power supply is provided by a legal key or not;
if the request response step fails, the lock cylinder resends the request command at certain intervals on the premise of being electrified until receiving the response command or powering off; if the request command sent by the second controller is not responded within a preset time, the second controller does not send the request command any more, and even if the lock cylinder is in an electrified state;
after receiving the response command, the second controller sends the unique identification code of each lock cylinder to the first controller through a data line, and after receiving the lock cylinder identification code, the first controller judges whether the lock cylinder is in the preset unlocking range of the lock cylinder, if not, the second controller performs invalid unlocking processing and can trigger the warning device;
if the preset password is within the preset unlocking range of the lock core, further judging whether a preset password exists in the key, if the preset password exists, the first controller sends the preset password to the second controller through a data line, and after the second controller receives the password, the validity of the preset password is checked; if the password is valid, the driving device works to unlock; if the password is invalid, the driving device does not work.
A verification method of electronic password lockset system, background server is responsible for registering key, lock core, mobile terminal, APP, user; APP is a program running in the mobile terminal; the user is a virtual main body with certain operation authority which is endowed by a background server; the background server is responsible for managing unlocking plans; after the background server is authorized according to the unlocking plan, logging in a user through an APP in the mobile terminal, initializing a key and a lock cylinder, and unlocking according to the authorization of the background server; and unlocking can be realized only when the key, the lock core, the mobile terminal, the APP and the user are consistent with the authorization of the background server.
Preferably, the mobile terminal is a mobile phone or a tablet computer or a PDA or a PC.
The method for verifying the electronic password lockset system comprises the steps that a background server directly sends a one-time unlocking password to a mobile terminal; the mobile terminal is used for directly inputting the disposable password into the key, the key is contacted with the lock core, and the lockset is opened.
The invention has the beneficial effects that the passive design of the lock cylinder increases the safety and enhances the environmental adaptability, such as vibration, water resistance and the like. The interface module realizes the nonpolar use of the key, and improves the stability and convenience of the interface. The lock core, the key, the mobile terminal and the background server cooperate to improve the safety of the system.
Drawings
Fig. 1 is a schematic diagram of a key according to an embodiment.
Fig. 2 is a partial enlarged view of fig. 1.
Fig. 3 is a schematic structural view of a lock cylinder according to an embodiment.
Fig. 4 is a partial enlarged view of fig. 3.
Fig. 5 is a schematic diagram of functional modules of a key and a lock cylinder according to an embodiment.
Fig. 6 is a schematic diagram of functional modules of a key and a lock cylinder according to an embodiment.
Fig. 7 is a schematic structural diagram of the second embodiment.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Example 1
As shown in fig. 1, 2, 3, 4, 5 and 6, a relatively simple lock system and method of use is provided in one embodiment. From the physical construction of the hardware of the embodiment, the invention comprises two parts, key 1 and lock cylinder 2, it being noted in particular that the shapes of the lock cylinder and key shown in the figures can be varied according to the design requirements. The lock core 2 and the key 1 are connected through the interface module, when the key is used, the first interface module 13 on the key 1 is aligned with the second interface module 23 of the lock core 2, communication data is transmitted to the lock core through the interface module, and after the lock core passes verification, a driving device in the lock core is driven to unlock.
The key 1 comprises a power module 11 and a first controller 12, wherein the power module 11 supplies power to all functional modules in the key 1 and simultaneously supplies power to the lock cylinder through a power line. The power supply is not arranged in the lock cylinder, and when each functional module in the lock cylinder needs to supply power, the external power supply must be obtained through the second interface module 23. The outermost part of the key 1 is a first housing 10, and both the power module 11 and the first controller 12 are disposed in the first housing 10. The edge of the first housing 10 is provided with a through hole, a first interface module 13 is arranged in the through hole, the first interface module 13 comprises a second housing 130, and four contact points, namely a first contact point 131, a second contact point 132, a third contact point 133 and a fourth contact point 134, are arranged in the second housing 130; wherein the first contact point 131 and the fourth contact point 134 are connected to the power module 11 through a power line; the second contact point 132 and the third contact point 133 are connected to the first controller through data lines.
The lock cylinder 2 comprises a second controller 21 and a driving device 22, the outermost part of the lock cylinder is a third shell 20, the edge of the third shell 20 is provided with a through hole, a second interface module 23 is arranged in the through hole, the second interface module 23 comprises a fourth shell 230, and the fourth shell 230 is provided with four contact points, namely a fifth contact point 231, a sixth contact point 232, a seventh contact point 233 and an eighth contact point 234. The fifth contact point 231 and the eighth contact point 234 are connected with each module needing power supply in the lock cylinder through a power line, and comprise a second controller 21 and a driving device 22; the sixth contact point 232 and the seventh contact point 233 are connected to the second controller through a data line.
One of the points of the present embodiment is that, when the key 1 is in contact with the lock cylinder 2, the power supply module 11 can supply power to the lock cylinder 2 through the power line after the first interface module 13 is in contact with the second interface module 23 without considering the polarity of the power supply. The above-mentioned nonpolar design schemes have two schemes, one scheme is that the first contact point 131 and the fourth contact point 134 are connected with the positive electrode of the power module 11 through a power line, and the second housing 130 is connected with the negative electrode of the power module 11 through a power line; correspondingly, the fifth contact point 231 and the eighth contact point 234 are connected with the positive electrode of each module requiring power supply in the lock cylinder through a power line, and the fourth housing 230 is connected with the negative electrode of each module requiring power supply in the lock cylinder through a power line. The scheme is characterized in that two contacts at the outermost sides in the key 1 and the lock cylinder 2 are fixedly connected with the anode of the power module, and the shell of the interface module is used as a ground wire.
Alternatively, the first contact point 131 and the fourth contact point 134 are connected to the positive electrode or the negative electrode of the power module 11 through power lines, respectively; the fifth contact 231 and the eighth contact 234 are connected to the input end of the rectifying circuit 24 through power lines, and the output end of the rectifying circuit 24 is connected to the positive electrode and the negative electrode of each module requiring power supply inside the lock cylinder through power lines. The characteristic of the scheme is that a rectifying circuit 24 is added between the power receiving contact of the lock cylinder and the power utilization functional module. The positive and negative polarities of the output end of the rectifying circuit are fixed no matter the positive and negative polarities of the input end of the rectifying circuit.
On the basis of the above-mentioned power supply non-polarity design, it is also necessary to consider the matching of the data communication interface, and the contacts for transmitting data in the first embodiment include the second contact 132 and the third contact 133 in the key 1, and the sixth contact 232 and the seventh contact 233 in the lock cylinder 2. The solution is to adapt the second contact point 132 and the third contact point 133 or to adapt the sixth contact point 232 and the seventh contact point 233. For example, the second contact 132 transmits a clock signal and the third contact 133 transmits a data signal; the sixth contact 232 and the seventh contact 233 may transmit both clock signals and data signals.
It should be noted that the contacts of the key 1 or the lock cylinder 2 for connecting the data lines may be designed as one, three or more, and the embodiment only uses two data line contacts as an illustration of the principle of the present invention. The number of contacts to transmit data can be selected by those skilled in the art as desired and the data transmission contacts can be adaptively processed in accordance with the spirit of the present invention.
Another point of the present embodiment is that, after the key 1 and the lock cylinder 2 are contacted, in order to achieve stable fixing of the two, a magnet is disposed on the second housing 130 or the fourth housing 230, and the second housing 130 or the fourth housing 230 is made of a magnetic material containing iron, nickel, etc., so that the fixing of the first interface module 13 and the second interface module 23 is facilitated.
Another point of creation of this embodiment is that the first contact point 131, the second contact point 132, the third contact point 133, and the fourth contact point 134 can be displaced to some extent; the fifth contact point 231, the sixth contact point 232, the seventh contact point 233, and the eighth contact point 234 maintain a fixed position unchanged. The advantage of this design is that a stable connection between the contact points can be ensured. When the key and the lock cylinder are not in contact, the first contact point 131, the second contact point 132, the third contact point 133 and the fourth contact point 134 are extended to the outside to the farthest distance due to the elastic member, and after the contact points are in contact, the first contact point 131, the second contact point 132, the third contact point 133 and the fourth contact point 134 are driven to move toward the inside of the key due to the force generated by the magnet or due to the force generated by the human body until the first interface module 13 and the second interface module 23 are completely attached.
After the lock cylinder 2 is electrified, firstly judging whether the power supplied by the legal key 1 to the lock cylinder 2 is the power supplied by the legal key 1, and sending a request command to the first controller 12 by the second controller 21 through the data line, wherein the first controller 12 should send a response command after receiving the request command; after receiving the response command, the second controller 21 determines that the power supplied by the key 1 is legal, and can proceed to the next step. The legal key refers to a key capable of responding to a request command of the second controller, the request response process can be realized in various modes, and is one of conditions for guaranteeing the safety of the lockset system, if the request response step fails, the lock cylinder resends the request command at certain intervals on the premise of being electrified until receiving the response command or powering off. If the request command issued by the second controller 21 is not responded to within a predetermined time, the second controller 21 does not issue the request command any more even when the key cylinder is in the energized state.
After receiving the response command, the second controller 21 sends the unique identification code of each lock core to the first controller 12 through the data line, and after receiving the lock core identification code, the first controller 12 judges whether the lock core is in the unlocking range of the first controller, if not, the second controller performs invalid unlocking processing, and can trigger the warning device. If the password is within the unlocking range of the first controller 21, the first controller 12 further judges whether a pre-sent password exists in the key, if the pre-sent password exists, the first controller sends the pre-sent password to the second controller 21 through a data line, the second controller verifies the validity of the password after receiving the password, and if the password is valid, the power supply line of the driving device 22 is conducted, so that unlocking is achieved.
The lock system and the unlocking method corresponding to the embodiment are relatively simple systems and methods, and are characterized in that the lock can be unlocked after the key 1 and the lock cylinder 2 are correctly contacted, and the lock has the advantages of convenient use and obvious defects in safety.
Example two
The present embodiment is a continuation of the first embodiment, in which only the key and the lock cylinder cooperate, and the technical solution cannot avoid the safety risk caused by the loss of the key. In order to solve the above-mentioned problems, the present embodiment provides a high-security communication method and a lock system used by the same.
As shown in fig. 7, the lock system of the present embodiment further includes a mobile terminal 3 and a background server 4 on the basis that the lock system includes a key 1 and a key cylinder 2. The key 1 is also provided with a first wireless communication module 14, and the mobile terminal 3 is provided with a second wireless communication module 32 and a third wireless communication module 33.
The first wireless communication module 14 in the key 1 communicates with the second wireless communication module 32 in the mobile terminal 3 and enables the transmission of data. The wireless communication between the first wireless communication module 14 and the second wireless communication module 32 is preferably bluetooth, NFC, ZIGBEE.
The third wireless communication module 33 in the mobile terminal 3 communicates with the background server 4 and enables transmission of data. The communication mode between the third wireless communication module 33 and the background server 4 is preferably a cellular data mobile communication network, wiFi, GPRS, NFC.
The background server is responsible for registering keys, lock cylinders, mobile terminals, APP and users; the mobile terminal is typically a mobile device held by a worker and may be a cell phone, tablet computer, PDA, PC. The APP is a program running in the mobile terminal and can be understood as an interface of human-computer interaction; it is the mobile terminal that is the hardware with the operating system, since it needs to run the APP. The user is a virtual main body with certain operation authority given by the background server, and the virtual main body often corresponds to a specific staff member.
The background server is responsible for managing an unlocking plan and unlocking according to the plan; specifically, when the key, the lock core, the mobile terminal, the APP and the user are consistent with the authorization of the background server, unlocking can be realized.
After the background server is authorized, a user is logged in through APP operation in the mobile terminal, a key and a lock cylinder are initialized, and a worker unlocks according to the authorization of the background server.
Example III
Under the condition that emergency unlocking is needed, the embodiment provides an emergency unlocking scheme, and a background server directly sends a one-time unlocking password to the mobile terminal; the mobile terminal is used for directly inputting the disposable password into the key, the key is contacted with the lock core, and the lockset is opened. The password generated in this way can only be used once, and when the lockset is closed, the original password is invalid.

Claims (6)

1. An electronic coded lock system comprises a key and a lock cylinder, and is characterized in that,
the key comprises a power supply module and a first controller; the edge of the key is provided with a first interface module, the lock cylinder comprises a second controller and a driving device, the edge of the lock cylinder is provided with a second interface module, after the first interface module is contacted with the second interface module, the power module supplies power to the lock cylinder, and after the second controller receives verification information sent by the first controller, the driving device works to unlock the lock;
the outermost part of the key is a first shell, and the power module and the first controller are both arranged in the first shell; the edge of the first shell is provided with a through hole, a first interface module is arranged in the through hole, the first interface module comprises a second shell, and at least three contact points, namely a first contact point, a second contact point and a fourth contact point, are arranged in the second shell; the first contact point and the fourth contact point are connected with the anode of the power supply module through a power line; the second housing is connected with the negative electrode of the power supply module through a power line; the second contact point is connected with the first controller through a data line;
the outermost part of the lock cylinder is a third shell, a through hole is formed in the edge of the third shell, a second interface module is arranged in the through hole, the second interface module comprises a fourth shell, and the fourth shell is provided with at least three contacts, namely a fifth contact point, a sixth contact point and an eighth contact point; the fifth contact point and the eighth contact point are connected with the positive electrode of the second controller through a power line; the fourth shell is connected with the negative electrode of the second controller through a power line; the sixth contact point is connected with the second controller through a data line;
a third contact point is also arranged in the second shell and is connected with the first controller through a data line; a seventh contact point is also arranged in the fourth shell and is connected with the second controller through a data line;
the second contact point and the third contact point are subjected to self-adaption processing or the sixth contact point and the seventh contact point are subjected to self-adaption processing;
one end of the first contact point, the second contact point and the fourth contact point, which are arranged in the first shell, is provided with an elastic element, and the first contact point, the second contact point and the fourth contact point can realize displacement to a certain extent; the fifth contact point, the sixth contact point and the eighth contact point maintain a fixed position unchanged;
the key is in nonpolar fit with the lock cylinder.
2. An electronic coded lock system comprises a key and a lock cylinder, and is characterized in that,
the key comprises a power supply module and a first controller; the edge of the key is provided with a first interface module, the lock cylinder comprises a second controller and a driving device, the edge of the lock cylinder is provided with a second interface module, after the first interface module is contacted with the second interface module, the power module supplies power to the lock cylinder, and after the second controller receives verification information sent by the first controller, the driving device works to unlock the lock;
the outermost part of the key is a first shell, and the power module and the first controller are both arranged in the first shell; the edge of the first shell is provided with a through hole, a first interface module is arranged in the through hole, the first interface module comprises a second shell, and at least three contact points, namely a first contact point, a second contact point and a fourth contact point, are arranged in the second shell; the first contact point and the fourth contact point are respectively connected with the positive electrode or the negative electrode of the power supply module through power lines; the second contact point is connected with the first controller through a data line;
the outermost part of the lock cylinder is a third shell, a through hole is formed in the edge of the third shell, a second interface module is arranged in the through hole, the second interface module comprises a fourth shell, and the fourth shell is provided with at least three contacts, namely a fifth contact point, a sixth contact point and an eighth contact point; the fifth contact point and the eighth contact point are connected with the input end of the rectifying circuit through a power line; the output end of the rectifying circuit is connected to the second controller through a power line; the sixth contact point is connected with the second controller through a data line;
a third contact point is also arranged in the second shell and is connected with the first controller through a data line; a seventh contact point is also arranged in the fourth shell and is connected with the second controller through a data line;
the second contact point and the third contact point are subjected to self-adaption processing or the sixth contact point and the seventh contact point are subjected to self-adaption processing;
one end of the first contact point, the second contact point and the fourth contact point, which are arranged in the first shell, is provided with an elastic element, and the first contact point, the second contact point and the fourth contact point can realize displacement to a certain extent; the fifth contact point, the sixth contact point and the eighth contact point maintain a fixed position unchanged;
the key is in nonpolar fit with the lock cylinder.
3. An electronic combination lock system according to claim 1 or 2, wherein,
the first shell is provided with a button, and the button is a switch of the key internal function module.
4. An electronic combination lock system according to claim 1 or 2, wherein,
the second housing or the fourth housing is provided with a magnet, and the second housing and/or the fourth housing are/is made of magnetic materials, so that the first interface module and the second interface module are convenient to fix.
5. An electronic combination lock system according to claim 1 or 2, wherein,
the key is characterized by further comprising a mobile terminal and a background server, wherein a first wireless communication module is further arranged in the key, and a second wireless communication module and a third wireless communication module are arranged in the mobile terminal; the first wireless communication module in the key communicates with the second wireless communication module in the mobile terminal and realizes data transmission; and the third wireless communication module in the mobile terminal is communicated with the background server and realizes data transmission.
6. The electronic combination lock system of claim 5, wherein,
the wireless communication modes between the first wireless communication module and the second wireless communication module are Bluetooth, NFC and ZIGBEE; the communication mode between the third wireless communication module and the background server is a cellular data mobile communication network, wiFi, GPRS and NFC.
CN201711393327.XA 2017-12-21 2017-12-21 Electronic password lockset system and verification method thereof Active CN107939172B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711393327.XA CN107939172B (en) 2017-12-21 2017-12-21 Electronic password lockset system and verification method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711393327.XA CN107939172B (en) 2017-12-21 2017-12-21 Electronic password lockset system and verification method thereof

Publications (2)

Publication Number Publication Date
CN107939172A CN107939172A (en) 2018-04-20
CN107939172B true CN107939172B (en) 2023-06-06

Family

ID=61941032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711393327.XA Active CN107939172B (en) 2017-12-21 2017-12-21 Electronic password lockset system and verification method thereof

Country Status (1)

Country Link
CN (1) CN107939172B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112785760A (en) * 2021-01-22 2021-05-11 山东智慧生活数据系统有限公司 Electronic key, unlocking system and unlocking method
CN114038095B (en) * 2021-11-08 2024-01-05 东屋世安物联科技(江苏)股份有限公司 Emergency code unlocking method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1570335A (en) * 2004-04-30 2005-01-26 刘建刚 Intelligent passive electronic lock
CN2873963Y (en) * 2005-06-24 2007-02-28 深圳日海通讯技术有限公司 Electric control door lock and outdoor box using said electric control door lock
CN101949239A (en) * 2010-09-03 2011-01-19 深圳市科陆电子科技股份有限公司 Passive power intelligent lock
JP2011064030A (en) * 2009-09-18 2011-03-31 Tokai Riken Kk Locker system and locker program for use in the same
WO2014137427A1 (en) * 2013-03-08 2014-09-12 Sentrilock, Llc Electronic key lockout control in lockbox system
CN206451254U (en) * 2016-08-12 2017-08-29 杭州聪灵科技有限公司 A kind of passive intelligent lock cylinder system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070296545A1 (en) * 2005-12-14 2007-12-27 Checkpoint Systems, Inc. System for management of ubiquitously deployed intelligent locks
CN102400606B (en) * 2011-11-16 2014-04-23 宁波瑞奥物联技术有限公司 Communication verification system and verification method of maintenance-free electronic lock
CN104234523B (en) * 2014-09-09 2017-04-05 黄伟仁 Key, energy-saving anti-theft electronic lock and energy-saving anti-theft electric lockset
CN104504782A (en) * 2014-10-24 2015-04-08 国家电网公司 Intelligent door lock system of hydropower station
CN107313660A (en) * 2017-07-07 2017-11-03 安徽德诺科技股份公司 The method for unlocking of intelligent lock system and smart lock
CN107230272A (en) * 2017-07-23 2017-10-03 福建强闽信息科技有限公司 Intelligent key and passive intelligent lock core and its application method based on arrowband Internet of Things
CN207761449U (en) * 2017-12-21 2018-08-24 南京东屋电气有限公司 A kind of electronic cipher lockset system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1570335A (en) * 2004-04-30 2005-01-26 刘建刚 Intelligent passive electronic lock
CN2873963Y (en) * 2005-06-24 2007-02-28 深圳日海通讯技术有限公司 Electric control door lock and outdoor box using said electric control door lock
JP2011064030A (en) * 2009-09-18 2011-03-31 Tokai Riken Kk Locker system and locker program for use in the same
CN101949239A (en) * 2010-09-03 2011-01-19 深圳市科陆电子科技股份有限公司 Passive power intelligent lock
WO2014137427A1 (en) * 2013-03-08 2014-09-12 Sentrilock, Llc Electronic key lockout control in lockbox system
CN206451254U (en) * 2016-08-12 2017-08-29 杭州聪灵科技有限公司 A kind of passive intelligent lock cylinder system

Also Published As

Publication number Publication date
CN107939172A (en) 2018-04-20

Similar Documents

Publication Publication Date Title
CN102800140B (en) intelligent lock system and remote switch method
CN103886658B (en) Based on distributed Internet of Things lock device and the method for unlocking thereof of multimodal Biometrics
CN103578169B (en) Intelligent information passive electronic lockset
CN106437317B (en) A kind of wireless power intelligent door lock
CN109204227A (en) Vehicle shared system and vehicle sharing method
CN107004317A (en) To the certification for the user for accessing physical space
CN106223742A (en) Intelligence padlock, the method for unlocking of intelligence padlock and intelligence padlock system
CN203271358U (en) Remote-authorization intelligent unlocking device
CN107230272A (en) Intelligent key and passive intelligent lock core and its application method based on arrowband Internet of Things
CN103927809A (en) Intelligent electronic lock management system and method
CN102121335B (en) Bluetooth electronic lock system based on random number unlocking
CN109312576A (en) The wireless locksets of angle of arrival (AOA) detection with integration
CN205502775U (en) Passive electronic lock through smart mobile phone power supply
CN101882335A (en) Electronic intelligent lock system for remote control by using mobile phone and use method thereof
CN104809793A (en) Smart door lock system for unlocking hotel guest room by utilizing smart mobile phone
CN207761449U (en) A kind of electronic cipher lockset system
CN105678875B (en) Intelligent door lock control system and control method
CN103093531A (en) Lock system controlled by internet
CN107939172B (en) Electronic password lockset system and verification method thereof
CN205080626U (en) Intelligence lock system based on thing networking
CN204759556U (en) Access control ware
CN106499262A (en) Vehicular intelligent key based on APP softwares
CN107798761A (en) The intelligence system that a kind of barcode scanning is opened the door
CN102215292B (en) System and method for controlling electronic lock by mobile phone Bluetooth module
CN104831998A (en) Intellectualized security and protection device for opening mechanical lock in antitheft mode

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: No. 27, Puzhou Road, Pukou District, Nanjing City, Jiangsu Province, 210032

Applicant after: Dongwu Shian IOT Technology (Jiangsu) Co.,Ltd.

Address before: No. 27, Puzhou Road, Pukou District, Nanjing City, Jiangsu Province, 210032

Applicant before: NANJING EASTHOUSE ELECTRICAL Co.,Ltd.

GR01 Patent grant
GR01 Patent grant