CN108171835B - Intelligent lock control application method and system based on personal information communication processing system (PICA) - Google Patents

Intelligent lock control application method and system based on personal information communication processing system (PICA) Download PDF

Info

Publication number
CN108171835B
CN108171835B CN201711435633.5A CN201711435633A CN108171835B CN 108171835 B CN108171835 B CN 108171835B CN 201711435633 A CN201711435633 A CN 201711435633A CN 108171835 B CN108171835 B CN 108171835B
Authority
CN
China
Prior art keywords
pica
key
rfid
client
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711435633.5A
Other languages
Chinese (zh)
Other versions
CN108171835A (en
Inventor
于成龙
孙成文
吴学强
刘艳须
侯冠楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhangjiakou Sanxin Tongda Machinery Manufacturing Co ltd
Original Assignee
Zhangjiakou Meikamande Machinery Manufacturing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhangjiakou Meikamande Machinery Manufacturing Co ltd filed Critical Zhangjiakou Meikamande Machinery Manufacturing Co ltd
Priority to CN201711435633.5A priority Critical patent/CN108171835B/en
Publication of CN108171835A publication Critical patent/CN108171835A/en
Application granted granted Critical
Publication of CN108171835B publication Critical patent/CN108171835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention belongs to the technical field of intelligent lock control methods, in particular to an intelligent lock control application method based on a personal information communication processing system (PICA), and simultaneously provides an intelligent lock control application system based on the PICA, wherein the method comprises the following steps: the invention discloses a method for taking an RFID key, a method for returning the RFID key, a system login method, a PICA client adding method, a PICA client IP setting method, a PICA intelligent lock initialization method and a raspberry group initialization method of a PICA client.

Description

Intelligent lock control application method and system based on personal information communication processing system (PICA)
Technical Field
The invention belongs to the technical field of intelligent lock control methods, particularly relates to an intelligent lock control application method based on a personal information communication processing system (PICA), and also provides an intelligent lock control application system based on the PICA.
Background
At present, an intelligent lock control system PICA is designed according to important departments and places, a large number of RFID keys need centralized management, a new management concept and a computer technology are fused, scientific centralized management is carried out on the RFID keys, and the intelligent lock control system PICA has the characteristics of safety, convenience, strong management function and the like. The RFID key management system can strictly manage the authorized RFID key and can record the condition of the RFID key user in detail. Various problems and events caused by improper management of the RFID key are solved as much as possible. It is widely used in: the prior art has the problem that a personal information communication processing system and an intelligent lock control application cannot be fused with each other and intelligently managed in places such as government departments, military offices, warehouses, prisons, financial banks, transportation, museums, apartments, office buildings and the like.
Disclosure of Invention
The invention provides an intelligent lock control application method and system based on a personal information communication processing system (PICA), and aims to solve the problem that the personal information communication processing system and the intelligent lock control application cannot be fused with each other and intelligently managed in the prior art.
The technical problem solved by the invention is realized by adopting the following technical scheme: an intelligent lock control application method based on a personal information communication processing system (PICA) comprises the following steps:
an RFID key access method comprises the following steps:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
the RFID key returning method comprises the following steps:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
Further, the sequentially unlocking includes unlocking the next RFID key according to the number of the next RFID key when the previous RFID key is removed.
Further, the corresponding prompt comprises a corresponding indicator light prompt of the keyhole of the corresponding RFID key.
Further, the remaining RFID keys include RFID keys other than the corresponding RFID key that opened the key door.
Further, before the RFID key retrieving method or the RFID key retrieving method, the method further includes:
the system login method comprises the following steps:
the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password;
the PICA server receives user input information and performs identity authentication;
if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more;
if the identity authentication of the PICA server side is not passed, returning error information;
and the PICA client receives the return information and correspondingly displays the return information.
Further, before the system login method, the method further comprises:
the PICA client adding method comprises the following steps:
the PICA client is automatically connected with a PICA server after being started;
the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server;
if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information;
the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database;
if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator;
if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA;
if the returned information passes, the PICA client can perform corresponding operation on the PICA server;
if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side;
further, the administrator can check the status of the PICA client and the access condition of the PICA and can manually access or refuse the access of the PICA client.
Further, before the adding method of the PICA client, the method further includes:
the PICA client IP setting method comprises the following steps:
the IP address of the PICA client and the IP address of the server to be accessed are set.
Further, before the IP setting method of the PICA client, the method further includes:
the PICA intelligent lock initialization method comprises the following steps:
accessing a PICA intelligent lock;
inserting a key bar into the keyhole;
the PICA client broadcasts an initialization command to the key stick;
the keyhole reads the key bar number and writes initialization information into the keyhole.
The PICA client IP setting method further comprises the following steps:
initializing a raspberry group of a PICA client:
writing a PICA system program into an SD card;
putting the SD card into a raspberry pie of the PICA client;
connecting a network cable to the PICA client and accessing the PICA network;
and after the PICA client is started, the PICA client automatically accesses and detects the updating of the PICA server.
Meanwhile, the invention also provides an intelligent lock control application system based on the personal information communication processing system PICA, which comprises the following steps: the RFID key taking application module and the RFID key returning application module;
the RFID key taking application module is to:
an RFID key access method comprises the following steps:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
the RFID key return application module is configured to:
the RFID key returning method comprises the following steps:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
The invention has the outstanding beneficial technical effects that:
1. an RFID key access method is adopted: if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number; if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed; if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded; the RFID key returning method comprises the following steps: if at least one RFID key is returned, judging the opening and closing state of the key door: if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked; if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked; if all RFID keys are locked, closing the key door, and as the access process is that the key holes are sequentially opened according to the selection sequence of the user, the situation is that after the first RFID key is taken away, the second RFID key is opened, the user can randomly change the selection of the user, if the user selects a plurality of keys, the keys are not taken away, after the door is directly closed, the user does not borrow the keys, if the user selects a plurality of keys, only the part of the keys is taken away, only recording the keys taken away by the user, and returning the process: brushing the PP rod, opening the cabinet door, inserting the PP rod into the lock hole with the indicator light shining, repeating the above operation (brushing the PP rod- > inserting the lock hole) when the PP rod is more than needed, closing the cabinet door, therefore, through the management of getting and returning of the customer intelligent key, the mutual integration and intelligent management of the personal information communication processing system and the intelligent lock control application are realized.
2. The method for taking the RFID key or the method for returning the RFID key, which is adopted by the invention, comprises the following steps: the system login method comprises the following steps: the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password; the PICA server receives user input information and performs identity authentication; if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more; if the identity authentication of the PICA server side is not passed, returning error information; the PICA client receives the return information and correspondingly displays the return information, the login process is to acquire user input information (a user name password, a fingerprint and a card number password) and then send the information to the Server, the Server performs identity verification, the verification is passed, the authority of the user, the user-defined group information, the key state on the key cabinet (if the key is lent, the user cannot borrow any more) is returned, the verification is failed, error information is returned, and the PICA displays the information according to the return information, so that the safety of intelligent lock control application management based on the PICA is improved through login of the PICA with the identity verification.
3. The invention adopts a PICA client adding method: the PICA client is automatically connected with a PICA server after being started; the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server; if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information; the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database; if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator; if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA; if the returned information passes, the PICA client can perform corresponding operation on the PICA server; if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side; the administrator can check the status of the PICA client and the admission condition of the PICA and can manually admit or refuse the access of the PICA client, because the PICA is automatically connected with the Server after being started, the PICA sends Wakeup information to the Server to obtain the feedback information of the Server, and if the Response of the Server is normal, the PICA sends equipment login information (including SN, type, lockhole and key binding information) to the Server. Considering that the information chain is not large, all information can be sent once, multiple communication is avoided, after the Server obtains the PICA information, whether the equipment exists in the database is detected, if the equipment does not exist, the information is recorded, the manual confirmation of an administrator is waited, if the equipment exists, the recovery is sent to the PICA according to the admission condition of the PICA: the manager can check the PICA equipment state and the PICA admission condition in a PICA List Management page of the Server, the manager can manually admit or refuse the access of the PICA equipment, the confirmed (admitted) PICA equipment can appear on a normal use page of the Server, otherwise, the validity of the client access can not be ensured due to the authentication process of the client.
4. The invention adopts a PICA intelligent lock initialization method: accessing a PICA intelligent lock; inserting a key bar into the keyhole; the PICA client broadcasts an initialization command to the key stick; the lockhole reads the serial number of the key bar and writes the initialization information into the lockhole, and the PICA client IP setting method further comprises the following steps: initializing a raspberry group of a PICA client: writing a PICA system program into an SD card; putting the SD card into a raspberry pie of the PICA client; connecting a network cable to the PICA client and accessing the PICA network; the method comprises the steps of automatically accessing and detecting updating of a PICA Server after a PICA client is started, initializing a raspberry group, accessing a card reader provided with an SD card into a computer, executing initialization on the computer, writing a system ROM into the SD card, putting the SD card into the raspberry group, connecting a network cable to the PICA, accessing a special network, automatically detecting and updating after the PICA is started (accessing service on a Server and downloading and updating), initializing a lock hole, connecting the network cable to the PICA, inserting an initialization special PP rod into the lock hole, executing an initialization program on the PC, sending an initialization command to the PICA, broadcasting the command to the lock hole by the PICA, starting reading a PP rod number by the lock hole, and writing information into the lock hole.
The invention is widely applied to places such as government departments, military organs, warehouses, prisons, financial banks, transportation, museums, apartments, office buildings and the like.
The invention provides an intelligent lock control application method and system based on a personal information communication processing system (PICA), which can solve the problem that the personal information communication processing system and the intelligent lock control application cannot be fused with each other and intelligently managed in the prior art, realize the mutual fusion and intelligent management of the personal information communication processing system and the intelligent lock control application, and have the characteristics of high safety, strong legality and simplified initialization process.
Drawings
Fig. 1 is a flowchart of an intelligent lock control application method based on a personal information communication processing system PICA according to the present invention.
Fig. 2 is a structural diagram of an intelligent lock control application system based on a personal information communication processing system PICA according to the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings:
in the figure:
s101-an RFID key access method;
s102-an RFID key return method;
s103-a system login method;
S104-PICA client adding method;
S105-PICA client IP setting method;
S106-PICA intelligent lock initialization method;
s107-a raspberry group initialization method of a PICA client;
1-an RFID key access module;
2-RFID key return module;
3-a system login module;
4-PICA client adds the module;
5-PICA client IP setting module;
6-PICA intelligent lock initialization module;
7-Raspberry pie initialization module of PICA client.
Example (b):
in this embodiment: as shown in fig. 1, an intelligent lock control application method based on a personal information communication processing system PICA includes:
RFID key access method S101:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
RFID key return method S102:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
Due to the adoption of the RFID key access method: if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number; if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed; if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded; the RFID key returning method comprises the following steps: if at least one RFID key is returned, judging the opening and closing state of the key door: if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked; if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked; if all RFID keys are locked, closing the key door, and as the access process is that the key holes are sequentially opened according to the selection sequence of the user, the situation is that after the first RFID key is taken away, the second RFID key is opened, the user can randomly change the selection of the user, if the user selects a plurality of keys, the keys are not taken away, after the door is directly closed, the user does not borrow the keys, if the user selects a plurality of keys, only the part of the keys is taken away, only recording the keys taken away by the user, and returning the process: brushing the PP rod, opening the cabinet door, inserting the PP rod into the lock hole with the indicator light shining, repeating the above operation (brushing the PP rod- > inserting the lock hole) when the PP rod is more than needed, closing the cabinet door, therefore, through the management of getting and returning of the customer intelligent key, the mutual integration and intelligent management of the personal information communication processing system and the intelligent lock control application are realized.
The sequentially unlocking comprises unlocking the next RFID key according to the number of the next RFID key if the previous RFID key is taken away.
The corresponding prompt comprises a corresponding indicator light prompt of the lockhole of the corresponding RFID key.
The remaining RFID keys include RFID keys other than the corresponding RFID key that opened the key door.
The RFID key retrieval method S101 or the RFID key return method S102 further includes:
system login method S103:
the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password;
the PICA server receives user input information and performs identity authentication;
if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more;
if the identity authentication of the PICA server side is not passed, returning error information;
and the PICA client receives the return information and correspondingly displays the return information.
The method for taking the RFID key or the method for returning the RFID key is characterized by comprising the following steps: the system login method comprises the following steps: the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password; the PICA server receives user input information and performs identity authentication; if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more; if the identity authentication of the PICA server side is not passed, returning error information; the PICA client receives the return information and correspondingly displays the return information, the login process is to acquire user input information (a user name password, a fingerprint and a card number password) and then send the information to the Server, the Server performs identity verification, the verification is passed, the authority of the user, the user-defined group information, the key state on the key cabinet (if the key is lent, the user cannot borrow any more) is returned, the verification is failed, error information is returned, and the PICA displays the information according to the return information, so that the safety of intelligent lock control application management based on the PICA is improved through login of the PICA with the identity verification.
The system login method S103 further includes:
PICA client adding method S104:
the PICA client is automatically connected with a PICA server after being started;
the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server;
if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information;
the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database;
if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator;
if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA;
if the returned information passes, the PICA client can perform corresponding operation on the PICA server;
and if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side.
Due to the adoption of the PICA client adding method: the PICA client is automatically connected with a PICA server after being started; the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server; if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information; the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database; if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator; if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA; if the returned information passes, the PICA client can perform corresponding operation on the PICA server; if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side; the administrator can check the status of the PICA client and the admission condition of the PICA and can manually admit or refuse the access of the PICA client, because the PICA is automatically connected with the Server after being started, the PICA sends Wakeup information to the Server to obtain the feedback information of the Server, and if the Response of the Server is normal, the PICA sends equipment login information (including SN, type, lockhole and key binding information) to the Server. Considering that the information chain is not large, all information can be sent once, multiple communication is avoided, after the Server obtains the PICA information, whether the equipment exists in the database is detected, if the equipment does not exist, the information is recorded, the manual confirmation of an administrator is waited, if the equipment exists, the recovery is sent to the PICA according to the admission condition of the PICA: the manager can check the PICA equipment state and the PICA admission condition in a PICA List Management page of the Server, the manager can manually admit or refuse the access of the PICA equipment, the confirmed (admitted) PICA equipment can appear on a normal use page of the Server, otherwise, the validity of the client access can not be ensured due to the authentication process of the client.
The administrator can check the status of the PICA client and the access condition of the PICA and can manually access or refuse the access of the PICA client.
Before the PICA client adding method S104, the method further includes:
PICA client IP setting method S105:
the IP address of the PICA client and the IP address of the server to be accessed are set.
The PICA client IP setting method S105 further includes:
PICA intelligent lock initialization method S106:
accessing a PICA intelligent lock;
inserting a key bar into the keyhole;
the PICA client broadcasts an initialization command to the key stick;
the keyhole reads the serial number of the key bar and writes the initialization information into the keyhole;
the PICA client IP setting method S105 further includes:
initializing a raspberry group of a PICA client:
writing a PICA system program into an SD card;
putting the SD card into a raspberry pie of the PICA client;
connecting a network cable to the PICA client and accessing the PICA network;
and after the PICA client is started, the PICA client automatically accesses and detects the updating of the PICA server.
Because the PICA intelligent lock initialization method is adopted: accessing a PICA intelligent lock; inserting a key bar into the keyhole; the PICA client broadcasts an initialization command to the key stick; the lockhole reads the serial number of the key bar and writes the initialization information into the lockhole, and the PICA client IP setting method further comprises the following steps: initializing a raspberry group of a PICA client: writing a PICA system program into an SD card; putting the SD card into a raspberry pie of the PICA client; connecting a network cable to the PICA client and accessing the PICA network; the method comprises the steps of automatically accessing and detecting updating of a PICA Server after a PICA client is started, initializing a raspberry group, accessing a card reader provided with an SD card into a computer, executing initialization on the computer, writing a system ROM into the SD card, putting the SD card into the raspberry group, connecting a network cable to the PICA, accessing a special network, automatically detecting and updating after the PICA is started (accessing service on a Server and downloading and updating), initializing a lock hole, connecting the network cable to the PICA, inserting an initialization special PP rod into the lock hole, executing an initialization program on the PC, sending an initialization command to the PICA, broadcasting the command to the lock hole by the PICA, starting reading a PP rod number by the lock hole, and writing information into the lock hole.
As shown in fig. 2, an intelligent lock control application system based on a personal information communication processing system PICA includes: the RFID key taking application module and the RFID key returning application module;
the RFID key taking application module is to:
RFID key access method S101:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
the RFID key return application module is configured to:
RFID key return method S102:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
The working principle is as follows:
the invention adopts an RFID key access method: if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number; if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed; if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded; the RFID key returning method comprises the following steps: if at least one RFID key is returned, judging the opening and closing state of the key door: if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked; if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked; if all RFID keys are locked, closing the key door, and as the access process is that the key holes are sequentially opened according to the selection sequence of the user, the situation is that after the first RFID key is taken away, the second RFID key is opened, the user can randomly change the selection of the user, if the user selects a plurality of keys, the keys are not taken away, after the door is directly closed, the user does not borrow the keys, if the user selects a plurality of keys, only the part of the keys is taken away, only recording the keys taken away by the user, and returning the process: the method and the device solve the problem that in the prior art, a personal information communication processing system and intelligent lock control application cannot be fused with each other and intelligently managed, and have the beneficial technical effects that the personal information communication processing system and the intelligent lock control application are fused with each other and intelligently managed, the safety is high, the legality is strong, and the initialization process is simplified.
The technical solutions of the present invention or similar technical solutions designed by those skilled in the art based on the teachings of the technical solutions of the present invention are all within the scope of the present invention to achieve the above technical effects.

Claims (6)

1. An intelligent lock control application method based on a personal information communication processing system (PICA) is characterized by comprising the following steps:
an RFID key access method comprises the following steps:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
the RFID key returning method comprises the following steps:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, closing the key door;
the RFID key taking method or the RFID key returning method also comprises a system login method before;
the system login method further comprises the following steps:
the PICA client adding method comprises the following steps:
the PICA client is automatically connected with a PICA server after being started;
the PICA client sends wake-up information to the PICA server and obtains the return information of the PICA server;
if the returned information of the PICA server side is normal, the PICA client side sends equipment login information to the PICA server side, wherein the equipment login information comprises the number, the type and the lockhole and key binding information;
the PICA server receives the equipment login information and detects whether equipment corresponding to the equipment information exists in the database;
if the corresponding equipment of the equipment information does not exist in the database, recording the corresponding equipment information and waiting for manual confirmation of an administrator;
if the database has equipment corresponding to the equipment information, returning passing or refusing return information to the PICA client according to the admission condition of the PICA client;
if the returned information passes, the PICA client can perform corresponding operation on the PICA server;
if the returned information is not passed, the PICA client side cannot perform corresponding operation on the PICA server side;
the administrator can check the state of the PICA client and the access condition of the PICA client and can manually access or refuse the access of the PICA client;
the PICA client side adding method further comprises the following steps:
the PICA client IP setting method comprises the following steps:
setting an IP address of a PICA client and an IP address of a server to be accessed;
the PICA client IP setting method further comprises the following steps:
the PICA intelligent lock initialization method comprises the following steps:
accessing a PICA intelligent lock;
inserting a key bar into the keyhole;
the PICA client broadcasts an initialization command to the key stick;
the keyhole reads the serial number of the key bar and writes the initialization information into the keyhole;
the PICA client IP setting method further comprises the following steps:
initializing a raspberry group of a PICA client:
writing a PICA system program into an SD card;
putting the SD card into a raspberry pie of the PICA client;
connecting a network cable to the PICA client and accessing the PICA network;
and after the PICA client is started, the PICA client automatically accesses and detects the updating of the PICA server.
2. The method as claimed in claim 1, wherein the sequentially unlocking includes unlocking the next RFID key according to the number of the next RFID key if the previous RFID key is removed.
3. The method for applying the intelligent lock control based on the PICA according to claim 1, wherein the corresponding prompt comprises a corresponding indicator light prompt of a keyhole of a corresponding RFID key.
4. The method as claimed in claim 1, wherein the remaining RFID keys include RFID keys other than the corresponding RFID key for opening the key door.
5. The method for applying the intelligent lock based on the PICA according to claim 1, wherein the RFID key taking method or the RFID key returning method further comprises the following steps:
the system login method comprises the following steps:
the PICA client acquires user input information and sends the user input information to the PICA server, wherein the user input information comprises a user name, a password, a fingerprint and a card number and a password;
the PICA server receives user input information and performs identity authentication;
if the identity verification of the PICA server side passes, returning the authority of the user, the user-defined group information and the key state on the key cabinet, and if the key is lent, returning the information which can not be borrowed any more;
if the identity authentication of the PICA server side is not passed, returning error information;
and the PICA client receives the return information and correspondingly displays the return information.
6. An intelligent lock control application system based on a personal information communication processing system (PICA), which can realize the intelligent lock control application method according to claim 1 when in use, and is characterized by comprising the following steps: the RFID key taking application module and the RFID key returning application module;
the RFID key taking application module is to:
an RFID key access method comprises the following steps:
if at least one RFID key is selected to be used, unlocking is sequentially carried out according to the selected RFID key number;
if at least one RFID key is selected to be taken but any RFID key is not taken, the selection of the RFID keys is cancelled completely if the key door is closed;
if at least one RFID key is selected to be taken and only part of the RFID keys are taken, if the key door is closed, the taken part of the RFID keys is recorded;
the RFID key return application module is configured to:
the RFID key returning method comprises the following steps:
if at least one RFID key is returned, judging the opening and closing state of the key door:
if the key door is not opened, the key door is opened through any RFID key in a radio frequency mode, and the corresponding RFID key for opening the key door is inserted into the corresponding lock hole and locked;
if the key door is opened, each RFID key in the rest RFID keys is sequentially read by radio frequency, inserted into a corresponding lock hole according to a corresponding prompt and locked;
if all RFID keys are locked, the key door is closed.
CN201711435633.5A 2017-12-26 2017-12-26 Intelligent lock control application method and system based on personal information communication processing system (PICA) Active CN108171835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711435633.5A CN108171835B (en) 2017-12-26 2017-12-26 Intelligent lock control application method and system based on personal information communication processing system (PICA)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711435633.5A CN108171835B (en) 2017-12-26 2017-12-26 Intelligent lock control application method and system based on personal information communication processing system (PICA)

Publications (2)

Publication Number Publication Date
CN108171835A CN108171835A (en) 2018-06-15
CN108171835B true CN108171835B (en) 2021-05-07

Family

ID=62521720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711435633.5A Active CN108171835B (en) 2017-12-26 2017-12-26 Intelligent lock control application method and system based on personal information communication processing system (PICA)

Country Status (1)

Country Link
CN (1) CN108171835B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112286462A (en) * 2020-10-30 2021-01-29 广东科徕尼智能科技有限公司 Log management method and system of intelligent lock, intelligent lock and storage device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859415A (en) * 2010-06-29 2010-10-13 高鹏 Human-computer interaction intelligent key management system and management method thereof
CN102213041A (en) * 2010-04-07 2011-10-12 浙江理工大学 Centralized key management system based on pressure-sensitivity fingerprint identification and use method
CN203882364U (en) * 2014-06-07 2014-10-15 上海奕铄科技有限公司 Key management box and key management system
CN205577713U (en) * 2016-04-08 2016-09-14 国网安徽省电力公司宣城供电公司 Intelligent key management box system
US9526010B2 (en) * 2015-05-14 2016-12-20 Yuan-Chou Chung System for controlling key access using an internet-connected key box device
CN107369233A (en) * 2017-07-13 2017-11-21 云雀科技成都有限责任公司 Application system is unlocked using the electric power of internet
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102213041A (en) * 2010-04-07 2011-10-12 浙江理工大学 Centralized key management system based on pressure-sensitivity fingerprint identification and use method
CN101859415A (en) * 2010-06-29 2010-10-13 高鹏 Human-computer interaction intelligent key management system and management method thereof
CN203882364U (en) * 2014-06-07 2014-10-15 上海奕铄科技有限公司 Key management box and key management system
US9526010B2 (en) * 2015-05-14 2016-12-20 Yuan-Chou Chung System for controlling key access using an internet-connected key box device
CN205577713U (en) * 2016-04-08 2016-09-14 国网安徽省电力公司宣城供电公司 Intelligent key management box system
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method
CN107369233A (en) * 2017-07-13 2017-11-21 云雀科技成都有限责任公司 Application system is unlocked using the electric power of internet

Also Published As

Publication number Publication date
CN108171835A (en) 2018-06-15

Similar Documents

Publication Publication Date Title
US20190371105A1 (en) Methods and systems for offline verification code generation based on smart door lock system
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
US7818783B2 (en) System and method for global access control
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN102598577B (en) Cloud certification is used to carry out device and the system of certification
CN106534080B (en) Object access right management method, corresponding background system, device and user terminal
US20030041085A1 (en) Management system and method for network devices using information recordable medium
CN103607416B (en) A kind of method and application system of the certification of network terminal machine identity
CN104320389B (en) A kind of fusion identity protection system and method based on cloud computing
US10964145B2 (en) Access control system using blockchain ledger
CN103827878B (en) Automate Password Management
US20030056097A1 (en) Method of and apparatus for authenticating client terminal by making use of port access
US20150169860A1 (en) Security key using multi-otp, security service apparatus, security system
CN109831463B (en) Intelligent terminal safety protection system for login verification of operating system
CN110138726A (en) A kind of method and system of intelligent optimization management cloud information
CN108040046A (en) Data access control method and device
US20200098208A1 (en) Security control device, security control method, security system and storage medium
CN104240014A (en) Door access control method and door access control platform
CN109472376A (en) A kind of real estate rents, sells room, traveller's shared system
CN109660514A (en) A kind of implementation method of smart machine system, smart machine control method and system
CN108171835B (en) Intelligent lock control application method and system based on personal information communication processing system (PICA)
CN201145917Y (en) Fingerprint electron storage case
CN110415422A (en) The method and system of quick authorization in offline Intelligent door lock capable of recognizing face
CN109472658B (en) Control system and method for house and guest source electronic lock for renting and selling real estate
CN110232786B (en) Method and device for obtaining or occupying free storage space of intelligent storage cabinet

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210421

Address after: 075000 No.6, industrial Street Lane 1, shangyingtun village, xuanpingbao Township, Wanquan District, Zhangjiakou City, Hebei Province

Applicant after: Zhangjiakou meikamande Machinery Manufacturing Co.,Ltd.

Address before: 300400, Tianjin, Beichen District, Tianjin high-end equipment manufacturing industry park road, No. 88

Applicant before: TIANJIN TAIWONA TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240321

Address after: 075000 No. 5, Tengfei Middle Road, Wanquan Economic Development Zone, Zhangjiakou City, Hebei Province

Patentee after: ZHANGJIAKOU SANXIN TONGDA MACHINERY MANUFACTURING Co.,Ltd.

Country or region after: Zhong Guo

Address before: No. 6, Industrial Street, Lane 1, Shangyingtun Village, Xuanpingbao Township, Wanquan District, Zhangjiakou City, Hebei Province, 075000

Patentee before: Zhangjiakou meikamande Machinery Manufacturing Co.,Ltd.

Country or region before: Zhong Guo