Intelligent lock control application method and system based on personal information communication processing system (PICA)
Technical Field
The invention belongs to the technical field of intelligent lock control methods, particularly relates to an intelligent lock control application method based on a personal information communication processing system (PICA), and also provides an intelligent lock control application system based on the PICA.
Background
At present, an intelligent lock control system PICA is designed according to important departments and places, a large number of RFID keys need centralized management, a new management concept and a computer technology are fused, scientific centralized management is carried out on the RFID keys, and the intelligent lock control system PICA has the characteristics of safety, convenience, strong management function and the like. The RFID key management system can strictly manage the authorized RFID key and can record the condition of the RFID key user in detail. Various problems and events caused by improper management of the RFID key are solved as much as possible. It is widely used in: the prior art has the problem that a personal information communication processing system and an intelligent lock control application cannot be fused with each other and intelligently managed in places such as government departments, military offices, warehouses, prisons, financial banks, transportation, museums, apartments, office buildings and the like.
Disclosure of Invention
The invention provides an intelligent lock control application method and system based on a personal information communication processing system (PICA), and aims to solve the problem that the personal information communication processing system and the intelligent lock control application cannot be fused with each other and intelligently managed in the prior art.
The technical problem solved by the invention is realized by adopting the following technical scheme: an intelligent lock control application method based on a personal information communication processing system (PICA) comprises the following steps:
an RFID key access method comprises the following steps:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
the RFID key returning method comprises the following steps:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
Further, the sequentially unlocking includes unlocking the next RFID key according to the number of the next RFID key when the previous RFID key is removed.
Further, the corresponding prompt comprises a corresponding indicator light prompt of the keyhole of the corresponding RFID key.
Further, the remaining RFID keys include RFID keys other than the corresponding RFID key that opened the key door.
Further, before the RFID key retrieving method or the RFID key retrieving method, the method further includes:
the system login method comprises the following steps:
the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password;
the PICA server receives user input information and performs identity authentication;
if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more;
if the identity authentication of the PICA server side is not passed, returning error information;
and the PICA client receives the return information and correspondingly displays the return information.
Further, before the system login method, the method further comprises:
the PICA client adding method comprises the following steps:
the PICA client is automatically connected with a PICA server after being started;
the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server;
if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information;
the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database;
if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator;
if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA;
if the returned information passes, the PICA client can perform corresponding operation on the PICA server;
if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side;
further, the administrator can check the status of the PICA client and the access condition of the PICA and can manually access or refuse the access of the PICA client.
Further, before the adding method of the PICA client, the method further includes:
the PICA client IP setting method comprises the following steps:
the IP address of the PICA client and the IP address of the server to be accessed are set.
Further, before the IP setting method of the PICA client, the method further includes:
the PICA intelligent lock initialization method comprises the following steps:
accessing a PICA intelligent lock;
inserting a key bar into the keyhole;
the PICA client broadcasts an initialization command to the key stick;
the keyhole reads the key bar number and writes initialization information into the keyhole.
The PICA client IP setting method further comprises the following steps:
initializing a raspberry group of a PICA client:
writing a PICA system program into an SD card;
putting the SD card into a raspberry pie of the PICA client;
connecting a network cable to the PICA client and accessing the PICA network;
and after the PICA client is started, the PICA client automatically accesses and detects the updating of the PICA server.
Meanwhile, the invention also provides an intelligent lock control application system based on the personal information communication processing system PICA, which comprises the following steps: the RFID key taking application module and the RFID key returning application module;
the RFID key taking application module is to:
an RFID key access method comprises the following steps:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
the RFID key return application module is configured to:
the RFID key returning method comprises the following steps:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
The invention has the outstanding beneficial technical effects that:
1. an RFID key access method is adopted: if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number; if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed; if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded; the RFID key returning method comprises the following steps: if at least one RFID key is returned, judging the opening and closing state of the key door: if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked; if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked; if all RFID keys are locked, closing the key door, and as the access process is that the key holes are sequentially opened according to the selection sequence of the user, the situation is that after the first RFID key is taken away, the second RFID key is opened, the user can randomly change the selection of the user, if the user selects a plurality of keys, the keys are not taken away, after the door is directly closed, the user does not borrow the keys, if the user selects a plurality of keys, only the part of the keys is taken away, only recording the keys taken away by the user, and returning the process: brushing the PP rod, opening the cabinet door, inserting the PP rod into the lock hole with the indicator light shining, repeating the above operation (brushing the PP rod- > inserting the lock hole) when the PP rod is more than needed, closing the cabinet door, therefore, through the management of getting and returning of the customer intelligent key, the mutual integration and intelligent management of the personal information communication processing system and the intelligent lock control application are realized.
2. The method for taking the RFID key or the method for returning the RFID key, which is adopted by the invention, comprises the following steps: the system login method comprises the following steps: the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password; the PICA server receives user input information and performs identity authentication; if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more; if the identity authentication of the PICA server side is not passed, returning error information; the PICA client receives the return information and correspondingly displays the return information, the login process is to acquire user input information (a user name password, a fingerprint and a card number password) and then send the information to the Server, the Server performs identity verification, the verification is passed, the authority of the user, the user-defined group information, the key state on the key cabinet (if the key is lent, the user cannot borrow any more) is returned, the verification is failed, error information is returned, and the PICA displays the information according to the return information, so that the safety of intelligent lock control application management based on the PICA is improved through login of the PICA with the identity verification.
3. The invention adopts a PICA client adding method: the PICA client is automatically connected with a PICA server after being started; the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server; if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information; the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database; if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator; if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA; if the returned information passes, the PICA client can perform corresponding operation on the PICA server; if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side; the administrator can check the status of the PICA client and the admission condition of the PICA and can manually admit or refuse the access of the PICA client, because the PICA is automatically connected with the Server after being started, the PICA sends Wakeup information to the Server to obtain the feedback information of the Server, and if the Response of the Server is normal, the PICA sends equipment login information (including SN, type, lockhole and key binding information) to the Server. Considering that the information chain is not large, all information can be sent once, multiple communication is avoided, after the Server obtains the PICA information, whether the equipment exists in the database is detected, if the equipment does not exist, the information is recorded, the manual confirmation of an administrator is waited, if the equipment exists, the recovery is sent to the PICA according to the admission condition of the PICA: the manager can check the PICA equipment state and the PICA admission condition in a PICA List Management page of the Server, the manager can manually admit or refuse the access of the PICA equipment, the confirmed (admitted) PICA equipment can appear on a normal use page of the Server, otherwise, the validity of the client access can not be ensured due to the authentication process of the client.
4. The invention adopts a PICA intelligent lock initialization method: accessing a PICA intelligent lock; inserting a key bar into the keyhole; the PICA client broadcasts an initialization command to the key stick; the lockhole reads the serial number of the key bar and writes the initialization information into the lockhole, and the PICA client IP setting method further comprises the following steps: initializing a raspberry group of a PICA client: writing a PICA system program into an SD card; putting the SD card into a raspberry pie of the PICA client; connecting a network cable to the PICA client and accessing the PICA network; the method comprises the steps of automatically accessing and detecting updating of a PICA Server after a PICA client is started, initializing a raspberry group, accessing a card reader provided with an SD card into a computer, executing initialization on the computer, writing a system ROM into the SD card, putting the SD card into the raspberry group, connecting a network cable to the PICA, accessing a special network, automatically detecting and updating after the PICA is started (accessing service on a Server and downloading and updating), initializing a lock hole, connecting the network cable to the PICA, inserting an initialization special PP rod into the lock hole, executing an initialization program on the PC, sending an initialization command to the PICA, broadcasting the command to the lock hole by the PICA, starting reading a PP rod number by the lock hole, and writing information into the lock hole.
The invention is widely applied to places such as government departments, military organs, warehouses, prisons, financial banks, transportation, museums, apartments, office buildings and the like.
The invention provides an intelligent lock control application method and system based on a personal information communication processing system (PICA), which can solve the problem that the personal information communication processing system and the intelligent lock control application cannot be fused with each other and intelligently managed in the prior art, realize the mutual fusion and intelligent management of the personal information communication processing system and the intelligent lock control application, and have the characteristics of high safety, strong legality and simplified initialization process.
Drawings
Fig. 1 is a flowchart of an intelligent lock control application method based on a personal information communication processing system PICA according to the present invention.
Fig. 2 is a structural diagram of an intelligent lock control application system based on a personal information communication processing system PICA according to the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings:
in the figure:
s101-an RFID key access method;
s102-an RFID key return method;
s103-a system login method;
S104-PICA client adding method;
S105-PICA client IP setting method;
S106-PICA intelligent lock initialization method;
s107-a raspberry group initialization method of a PICA client;
1-an RFID key access module;
2-RFID key return module;
3-a system login module;
4-PICA client adds the module;
5-PICA client IP setting module;
6-PICA intelligent lock initialization module;
7-Raspberry pie initialization module of PICA client.
Example (b):
in this embodiment: as shown in fig. 1, an intelligent lock control application method based on a personal information communication processing system PICA includes:
RFID key access method S101:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
RFID key return method S102:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
Due to the adoption of the RFID key access method: if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number; if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed; if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded; the RFID key returning method comprises the following steps: if at least one RFID key is returned, judging the opening and closing state of the key door: if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked; if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked; if all RFID keys are locked, closing the key door, and as the access process is that the key holes are sequentially opened according to the selection sequence of the user, the situation is that after the first RFID key is taken away, the second RFID key is opened, the user can randomly change the selection of the user, if the user selects a plurality of keys, the keys are not taken away, after the door is directly closed, the user does not borrow the keys, if the user selects a plurality of keys, only the part of the keys is taken away, only recording the keys taken away by the user, and returning the process: brushing the PP rod, opening the cabinet door, inserting the PP rod into the lock hole with the indicator light shining, repeating the above operation (brushing the PP rod- > inserting the lock hole) when the PP rod is more than needed, closing the cabinet door, therefore, through the management of getting and returning of the customer intelligent key, the mutual integration and intelligent management of the personal information communication processing system and the intelligent lock control application are realized.
The sequentially unlocking comprises unlocking the next RFID key according to the number of the next RFID key if the previous RFID key is taken away.
The corresponding prompt comprises a corresponding indicator light prompt of the lockhole of the corresponding RFID key.
The remaining RFID keys include RFID keys other than the corresponding RFID key that opened the key door.
The RFID key retrieval method S101 or the RFID key return method S102 further includes:
system login method S103:
the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password;
the PICA server receives user input information and performs identity authentication;
if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more;
if the identity authentication of the PICA server side is not passed, returning error information;
and the PICA client receives the return information and correspondingly displays the return information.
The method for taking the RFID key or the method for returning the RFID key is characterized by comprising the following steps: the system login method comprises the following steps: the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password; the PICA server receives user input information and performs identity authentication; if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more; if the identity authentication of the PICA server side is not passed, returning error information; the PICA client receives the return information and correspondingly displays the return information, the login process is to acquire user input information (a user name password, a fingerprint and a card number password) and then send the information to the Server, the Server performs identity verification, the verification is passed, the authority of the user, the user-defined group information, the key state on the key cabinet (if the key is lent, the user cannot borrow any more) is returned, the verification is failed, error information is returned, and the PICA displays the information according to the return information, so that the safety of intelligent lock control application management based on the PICA is improved through login of the PICA with the identity verification.
The system login method S103 further includes:
PICA client adding method S104:
the PICA client is automatically connected with a PICA server after being started;
the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server;
if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information;
the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database;
if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator;
if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA;
if the returned information passes, the PICA client can perform corresponding operation on the PICA server;
and if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side.
Due to the adoption of the PICA client adding method: the PICA client is automatically connected with a PICA server after being started; the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server; if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information; the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database; if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator; if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA; if the returned information passes, the PICA client can perform corresponding operation on the PICA server; if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side; the administrator can check the status of the PICA client and the admission condition of the PICA and can manually admit or refuse the access of the PICA client, because the PICA is automatically connected with the Server after being started, the PICA sends Wakeup information to the Server to obtain the feedback information of the Server, and if the Response of the Server is normal, the PICA sends equipment login information (including SN, type, lockhole and key binding information) to the Server. Considering that the information chain is not large, all information can be sent once, multiple communication is avoided, after the Server obtains the PICA information, whether the equipment exists in the database is detected, if the equipment does not exist, the information is recorded, the manual confirmation of an administrator is waited, if the equipment exists, the recovery is sent to the PICA according to the admission condition of the PICA: the manager can check the PICA equipment state and the PICA admission condition in a PICA List Management page of the Server, the manager can manually admit or refuse the access of the PICA equipment, the confirmed (admitted) PICA equipment can appear on a normal use page of the Server, otherwise, the validity of the client access can not be ensured due to the authentication process of the client.
The administrator can check the status of the PICA client and the access condition of the PICA and can manually access or refuse the access of the PICA client.
Before the PICA client adding method S104, the method further includes:
PICA client IP setting method S105:
the IP address of the PICA client and the IP address of the server to be accessed are set.
The PICA client IP setting method S105 further includes:
PICA intelligent lock initialization method S106:
accessing a PICA intelligent lock;
inserting a key bar into the keyhole;
the PICA client broadcasts an initialization command to the key stick;
the keyhole reads the serial number of the key bar and writes the initialization information into the keyhole;
the PICA client IP setting method S105 further includes:
initializing a raspberry group of a PICA client:
writing a PICA system program into an SD card;
putting the SD card into a raspberry pie of the PICA client;
connecting a network cable to the PICA client and accessing the PICA network;
and after the PICA client is started, the PICA client automatically accesses and detects the updating of the PICA server.
Because the PICA intelligent lock initialization method is adopted: accessing a PICA intelligent lock; inserting a key bar into the keyhole; the PICA client broadcasts an initialization command to the key stick; the lockhole reads the serial number of the key bar and writes the initialization information into the lockhole, and the PICA client IP setting method further comprises the following steps: initializing a raspberry group of a PICA client: writing a PICA system program into an SD card; putting the SD card into a raspberry pie of the PICA client; connecting a network cable to the PICA client and accessing the PICA network; the method comprises the steps of automatically accessing and detecting updating of a PICA Server after a PICA client is started, initializing a raspberry group, accessing a card reader provided with an SD card into a computer, executing initialization on the computer, writing a system ROM into the SD card, putting the SD card into the raspberry group, connecting a network cable to the PICA, accessing a special network, automatically detecting and updating after the PICA is started (accessing service on a Server and downloading and updating), initializing a lock hole, connecting the network cable to the PICA, inserting an initialization special PP rod into the lock hole, executing an initialization program on the PC, sending an initialization command to the PICA, broadcasting the command to the lock hole by the PICA, starting reading a PP rod number by the lock hole, and writing information into the lock hole.
As shown in fig. 2, an intelligent lock control application system based on a personal information communication processing system PICA includes: the RFID key taking application module and the RFID key returning application module;
the RFID key taking application module is to:
RFID key access method S101:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
the RFID key return application module is configured to:
RFID key return method S102:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
The working principle is as follows:
the invention adopts an RFID key access method: if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number; if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed; if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded; the RFID key returning method comprises the following steps: if at least one RFID key is returned, judging the opening and closing state of the key door: if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked; if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked; if all RFID keys are locked, closing the key door, and as the access process is that the key holes are sequentially opened according to the selection sequence of the user, the situation is that after the first RFID key is taken away, the second RFID key is opened, the user can randomly change the selection of the user, if the user selects a plurality of keys, the keys are not taken away, after the door is directly closed, the user does not borrow the keys, if the user selects a plurality of keys, only the part of the keys is taken away, only recording the keys taken away by the user, and returning the process: the method and the device solve the problem that in the prior art, a personal information communication processing system and intelligent lock control application cannot be fused with each other and intelligently managed, and have the beneficial technical effects that the personal information communication processing system and the intelligent lock control application are fused with each other and intelligently managed, the safety is high, the legality is strong, and the initialization process is simplified.
The technical solutions of the present invention or similar technical solutions designed by those skilled in the art based on the teachings of the technical solutions of the present invention are all within the scope of the present invention to achieve the above technical effects.