CN110648418A - Passive intelligent lock, terminal, inspection system and inspection method - Google Patents

Passive intelligent lock, terminal, inspection system and inspection method Download PDF

Info

Publication number
CN110648418A
CN110648418A CN201910830276.5A CN201910830276A CN110648418A CN 110648418 A CN110648418 A CN 110648418A CN 201910830276 A CN201910830276 A CN 201910830276A CN 110648418 A CN110648418 A CN 110648418A
Authority
CN
China
Prior art keywords
inspection
password
module
request
intelligent lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910830276.5A
Other languages
Chinese (zh)
Other versions
CN110648418B (en
Inventor
尹健
张春
郑东曦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Weide Information Technology Co., Ltd
Original Assignee
Weide (guangdong) Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weide (guangdong) Information Technology Co Ltd filed Critical Weide (guangdong) Information Technology Co Ltd
Priority to CN201910830276.5A priority Critical patent/CN110648418B/en
Publication of CN110648418A publication Critical patent/CN110648418A/en
Application granted granted Critical
Publication of CN110648418B publication Critical patent/CN110648418B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Abstract

The invention discloses a passive intelligent lock, a terminal, an inspection system and an inspection method, wherein the passive intelligent lock comprises a power receiving module, a communication module, a control module and an electronic lock execution module, wherein the control module is used for acquiring an inspection request through the communication module, further acquiring corresponding inspection records and password sequences according to the source request of the inspection request, and verifying the legality of the inspection request according to the acquired inspection records and password sequences; and generating an unlocking instruction for the condition that the routing inspection request is verified to be legal, wherein the electronic lock execution module is used for keeping a locking state at ordinary times and switching to an unlocking state when responding to the unlocking instruction. The passive intelligent lock can prevent illegal inspection operation, realizes supervision of inspection personnel, avoids the conditions that the inspection personnel is idle, does not execute inspection tasks according to an inspection schedule and the like, and ensures inspection working quality. The invention is widely applied to the technical field of electronic locks.

Description

Passive intelligent lock, terminal, inspection system and inspection method
Technical Field
The invention relates to the technical field of electronic locks, in particular to a passive intelligent lock, a terminal, an inspection system and an inspection method.
Background
In general, a plurality of production facilities and control facilities are installed in a production plant or the like, and for the purpose of preventing theft, protection, and interference, it is common to protect these facilities using a device such as a protection box with a lock, and to allow only a specific person to open the protection box for inspection or operation. In the production process, equipment needs to be inspected, namely, the equipment needs to be inspected in a daily inspection mode through visual observation, abnormal phenomena and hidden dangers of the equipment are found in the inspection process according to standards, initial information of equipment faults is mastered, fault points, parts, items and contents of the equipment to be inspected are provided for point inspection personnel, and the point inspection personnel can conduct equipment point inspection purposefully and directionally.
The inspection of the production equipment is performed according to certain specifications, which may provide requirements for inspection sequence, inspection frequency and each inspection time of each equipment, and require the inspection work to be recorded so as to realize the tracing and rechecking of the inspection work. In the prior art, the inspection work is usually performed according to the following procedures: the supervisor provides keys and the inspection schedule to the authorized inspection personnel, so that the inspection personnel can go to each production equipment to be inspected according to the sequence indicated by the inspection schedule, the keys are used for opening the protection boxes to inspect the production equipment, and the inspection logs are registered on the paper log book before and after the inspection work is completed. In the prior art, the operation is complicated, the inspection staff is burdened with technical work such as inspection on production equipment and also burdened with flow work such as recording inspection work, the workload of the inspection staff and the possibility of errors are increased, meanwhile, the inspection flow depends on the participation of manual operation, the supervision on the inspection staff is lacked, and the possibility that the inspection staff is idle and inspection tasks are not executed according to an inspection schedule, so that the inspection quality is influenced exists.
Interpretation of terms: passive intelligence lock is a neotype tool to lock, it can be based on neotype NFC framework and trigger actuating mechanism and unblank or action such as shutting, the characteristics of passive intelligence lock are that the lock body itself does not set up the power, and set up the power on the intelligent key, when the user places the intelligent key when being close to the characteristics region of lock body, the intelligent key is through wireless filling mode such as ability to the lock body power supply, make the smart chip on the lock body can obtain working power supply, thereby communicate and operation such as handshake with the intelligent key, make the intelligent chip on the lock body can confirm the legitimacy of intelligent key, and then trigger actuating mechanism on the lock body and unblank or action such as shutting. Because the lock body of the passive intelligent lock is not provided with a power supply, the passive intelligent lock has the advantages of low energy consumption, convenience in maintenance, difficulty in damage and the like, and is widely applied to the fields of entrance guard, security and the like. However, compared with locks such as active and passive smart locks, the lock body of the passive smart lock relies on the smart key to provide working power, and the power provided by the smart key is limited, which limits the hardware setting on the lock body.
Disclosure of Invention
In order to solve the technical problems, the invention aims to provide a passive intelligent lock, a terminal, an inspection system and an inspection method.
In one aspect, an embodiment of the present invention includes a passive intelligent lock, including a power receiving module, a communication module, a control module, and an electronic lock execution module;
the power receiving module is used for receiving external energy so as to supply power to the communication module, the control module and the electronic lock execution module;
the communication module is used for providing a channel for external communication for the control module;
the control module is used for acquiring an inspection request through the communication module, further acquiring corresponding inspection records and password sequences aiming at a source request of the inspection request, and verifying the legality of the inspection request according to the acquired inspection records and password sequences; generating an unlocking instruction for the condition that the routing inspection request is verified to be legal;
the electronic lock execution module is used for keeping a locking state at ordinary times and switching to an unlocking state when responding to the unlocking instruction.
Further, the control module is configured to, when verifying the validity of the patrol request according to the obtained patrol record and the password sequence, specifically execute the following steps:
analyzing all the ID information contained in the routing inspection record;
verifying the matching of each ID information and the corresponding password in the password sequence one by one;
and when all the ID information is detected to correspond to the matched passwords, judging that the routing inspection request is legal.
Further, the control module is configured to, when verifying one-by-one matching between each piece of ID information and a corresponding password in the password sequence, specifically execute the following steps:
generating corresponding verification codes according to the ID information by using an encryption algorithm solidified in the control module;
comparing the identity of each verification code with the corresponding password in the password sequence one by one;
and when detecting that the passwords in the password sequence correspond to the same verification code, judging that the password is matched with the ID information for generating the verification code.
Further, the control module is further configured to execute the following steps after determining that the inspection request is legal:
calling ID information solidified in the control module;
generating a password according to the called ID information by using an encryption algorithm solidified in the control module;
returning the generated password to the source of the patrol request.
Further, the control module is also used for generating an unlocking record after detecting that the electronic lock execution module is switched to an unlocking state, and storing the unlocking record in the storage module.
On the other hand, the embodiment of the invention also comprises a terminal, which is used for polling the passive intelligent lock in the embodiment and is provided with an external power supply module and an intelligent module;
the external power supply module is used for being coupled with a power receiving module in the passive intelligent lock so as to provide power for the power receiving module;
the intelligent module is used for sending an inspection request, an inspection record and a password sequence to the passive intelligent lock, so that the electronic lock execution module in the passive intelligent lock is switched to an unlocking state.
Further, the intelligent module is also used for acquiring the password returned by the passive intelligent lock and adding the acquired password to the password sequence stored by the intelligent module.
Further, the terminal is also used for requesting the passive intelligent lock to acquire an unlocking record and storing and/or displaying the unlocking record.
On the other hand, the embodiment of the invention also comprises an inspection system based on the passive intelligent lock, which comprises the passive intelligent lock as claimed in any one of claims 1 to 5 and the terminal in the embodiment.
On the other hand, the embodiment of the invention also comprises an inspection method based on the passive intelligent lock, and the inspection system in the embodiment is specifically used for executing the following steps:
the passive intelligent lock acquires a patrol request sent by a terminal, further acquires corresponding patrol records and password sequences aiming at a source request of the patrol request, and verifies the validity of the patrol request according to the acquired patrol records and password sequences; generating an unlocking instruction for the condition that the routing inspection request is verified to be legal;
the passive intelligent lock is kept in a locking state at ordinary times, and is switched to an unlocking state when responding to the unlocking instruction.
The invention has the beneficial effects that: the passive intelligent lock can realize the functions of identifying and approving the patrol personnel, the approval result is determined according to the condition that the patrol personnel executes the patrol work according to the patrol plan, if the patrol personnel does not execute the patrol work according to the patrol plan, the patrol personnel can not provide the correct patrol record and password acquired in the patrol process before the corresponding passive intelligent lock when patrolling and examining a certain production device, so that the passive intelligent lock can not be verified by the passive intelligent lock, the passive intelligent lock can not be switched to an unlocking state, the illegal patrol operation can be prevented, the supervision of the patrol personnel can be realized, the condition that the patrol personnel is idle, the patrol task is not executed according to the patrol plan table and the like can be avoided, and the patrol quality is ensured. The passive intelligent lock can transfer a task of storing key data to an active terminal under the condition that a large-capacity nonvolatile memory cannot be used for recording, requires the terminal to store a password, and verifies the password stored by the terminal. Therefore, the passive intelligent lock in the embodiment can be obtained by simply changing the control logic on the basis of the hardware of the existing passive intelligent lock, the hardware is not required to be modified, and the equipment updating cost is reduced. The terminal is matched with the passive intelligent lock for use and can be combined into an inspection system, and the inspection system and the corresponding inspection method can achieve the same technical effect as the passive intelligent lock.
Drawings
Fig. 1 is a schematic structural diagram of the passive intelligent lock according to the embodiment of the present invention;
fig. 2 is a schematic view of a usage scenario of the passive smart lock according to the embodiment of the present invention;
fig. 3 is a schematic diagram of a connection relationship between the passive intelligent lock and the terminal in the embodiment of the present invention.
Detailed Description
Example 1
In this embodiment, the passive intelligent lock includes a power receiving module, a communication module, a control module, and an electronic lock execution module;
the power receiving module is used for receiving external energy so as to supply power to the communication module, the control module and the electronic lock execution module;
the communication module is used for providing a channel for external communication for the control module;
the control module is used for acquiring an inspection request through the communication module, further acquiring corresponding inspection records and password sequences aiming at a source request of the inspection request, and verifying the legality of the inspection request according to the acquired inspection records and password sequences; generating an unlocking instruction for the condition that the routing inspection request is verified to be legal;
the electronic lock execution module is used for keeping a locking state at ordinary times and switching to an unlocking state when responding to the unlocking instruction.
Referring to fig. 1, the passive intelligent lock is composed of a power receiving module, a communication module, a control module, an electronic lock execution module and the like. The main components of the power receiving module are a wireless charging coil and a voltage stabilizing circuit. When a user uses a key or a terminal matched with the passive intelligent lock to be close to the passive intelligent lock, the key or the terminal sends out an alternating electromagnetic field, so that a wireless charging coil of a power receiving module in the passive intelligent lock is positioned in the alternating electromagnetic field to induce voltage, and the voltage is used as a working power supply for components such as a communication module, a control module, an electronic lock execution module and the like in the passive intelligent lock after being transformed and stabilized by a voltage stabilizing circuit.
In this embodiment, a single chip microcomputer such as STM32 may be used as the control module, and a communication module having an NFC or ZigBee protocol is used. The control module is respectively connected with the communication module and the electronic lock execution module. The communication module scans hardware externally through an NFC protocol or ZigBee, receives data sent by the scanned hardware and sends the data to the control module, and the control module can send the generated or processed data to the communication module and send the data to the scanned external hardware. The electronic lock execution module is a module consisting of a lock rod, an elastic device, a ball, a locking execution device, a driving device and the like, and the control module can send a trigger signal to the driving device in the electronic lock execution module, so that the driving device can control the action of the locking execution device, and the electronic lock execution module is switched from an unlocking state to a locking state or from the locking state to the unlocking state. The electronic lock actuator module used in the present embodiment can be realized by the conventional technology, for example, the electronic lock sold in the market at present has a function of performing an action according to a trigger signal, and patent documents with publication numbers CN208073162U and CN106337606A, etc. describe the conventional electronic lock actuator module technology.
Fig. 1 illustrates an application scenario of the passive smart lock in the present embodiment. In this application scenario, a production facility to be patrolled and examined is placed in a guard box, and this guard box is equipped with the shutter, sets up the passive intelligence lock in this embodiment on the shutter. When the electronic lock execution module is in an unlocking state, inspection personnel can open the protection door, so that the production equipment in the protection box can be inspected, maintained and the like; when the electronic lock execution module is in a locking state, inspection personnel can not open the protection door and can not contact production equipment in the protection box.
The passive intelligent lock in the embodiment is in one-to-one correspondence with the production equipment to be patrolled, namely, a protection box is arranged for one production equipment, and one passive intelligent lock is installed. Generally, a production unit is provided with a plurality of production devices to be inspected, and each production device is provided with a protection box and a passive intelligent lock, so as to form the scenario shown in fig. 2.
When the inspection work is specifically executed, an inspection worker accesses a special management system by using a mobile phone and other terminals with an external wireless charging function or a customized inspection special terminal so as to obtain an inspection task work order. The content of the task work order is used for instructing the inspection personnel to execute corresponding inspection work according to the planned sequence.
The electronic lock execution modules arranged on the protection boxes are kept in a locking state at ordinary times, so that the protection boxes cannot be opened. Before the inspection personnel use the terminal to come to a passive intelligent lock, the inspection personnel manually or automatically edit the inspection request according to the inspection task work order.
The patrol inspection request is a section of computer program code or instruction and is used for requesting the passive intelligent lock receiving the patrol inspection request to be switched to an unlocking state, so that patrol inspection personnel can operate. The patrol request may contain the following information: the system comprises a patrol plan task number, a patrol object (namely, production equipment to be patrolled), a corresponding passive intelligent lock number, patrol work contents and patrol work execution time.
When a control module in a passive intelligent lock receives a patrol request sent by a terminal through a communication module, the control module executes the following operations: and requesting to acquire the routing inspection record and the password sequence stored on the terminal aiming at the source of the routing inspection request, namely the terminal used by the routing inspection personnel. And the passive intelligent lock verifies whether the polling request is legal or not according to the polling record and the password sequence fed back by the terminal used by the polling personnel. Specifically, the passive intelligent lock calls an encryption program or other programs which are solidified by the passive intelligent lock, recalculates the routing inspection record fed back by the terminal once, verifies whether the recalculated result is consistent with a password fed back by the terminal, judges that the routing inspection request is legal if the recalculated result is consistent with the password fed back by the terminal, generates an unlocking instruction, sends the unlocking instruction to an electronic lock execution module of the passive intelligent lock, and can trigger the electronic lock execution module to be switched to an unlocking state, so that routing inspection personnel can open a protection box for inspection and maintenance. If the recalculated result is inconsistent with the password fed back by the terminal, the inspection request is judged to be illegal, an unlocking instruction is not generated, and the electronic lock execution module is kept in a locking state, so that the inspection personnel cannot open the protection box.
In the process, the passive intelligent lock requests the patrol records and the password sequences fed back by the terminal, and the patrol records and the password sequences are accumulated by information respectively acquired from each passive intelligent lock in the process that the patrol personnel use the terminal to patrol the plurality of production equipment. For example, with respect to the scenario shown in fig. 2, according to the inspection plan, the inspector should perform inspection in the order of the production apparatus 1, the production apparatus 2, the production apparatus 3, and the production apparatus 4, that is, before performing inspection of the production apparatus 3, the inspection of the production apparatus 1 and the production apparatus 2 should be completed. After the inspection of the production equipment 1 is completed, the passive intelligent lock 1 corresponding to the production equipment 1 uses the encryption algorithm solidified in the passive intelligent lock 1, and the ID information 0013 corresponding to the passive intelligent lock 1 and the time information at that time are called as random seeds of the encryption algorithm, so that the password EBVS2AFV is generated. After the inspection of the production device 2 is completed, the passive intelligent lock 2 corresponding to the production device 2 uses the encryption algorithm solidified in the passive intelligent lock 2, and the ID information 0025 corresponding to the passive intelligent lock 2 and the time information at that time are called as random seeds of the encryption algorithm, so as to generate the password TP53 LKML. The password EBVS2AFV, the password TP53LKML and the passwords acquired from other passive intelligent locks in the subsequent inspection work are accumulated and stored in a terminal used by an inspector to form a password sequence. The terminal used by the patrol inspector also stores accumulated patrol record information, and the data structure of the terminal is shown in table 1.
TABLE 1
Figure BDA0002190432990000061
In the usage scenario shown in fig. 2 and table 1, the inspector has completed the inspection work on the production equipment 1 and the production equipment 2 and obtains the passwords EBVS2AFV and EBVS2AFV generated and sent by the corresponding passive smart locks 1 and 2. At this time, the inspection staff checks the production equipment 3 according to the inspection plan. After the patrol personnel carry out the connection of the physical layer and the data layer with the terminal and the passive intelligent lock 3, the patrol personnel use the terminal to send a patrol request to the passive intelligent lock 3. Under the triggering of the polling request, the passive intelligent lock further requests the terminal to provide polling records and password sequences accumulated in the polling process of the production equipment 1 and the production equipment 2. The terminal feeds back data shown in two rows of which the sequence numbers of the polling records in the table 1 are 1 and 2 respectively to the passive intelligent lock 3.
The control module in the passive intelligent lock 3 analyzes all the contained ID information from the routing inspection record, namely the ID information 0013 of the passive intelligent lock 1 and the ID information 0025 of the passive intelligent lock 2, and then verifies the matching performance of each ID information and the corresponding password in the password sequence one by one, namely, whether the ID information 0013 of the passive intelligent lock 1 is matched with the corresponding password EBVS2AFV or not is verified, and whether the ID information 0025 of the passive intelligent lock 2 is matched with the corresponding password TP53LKML or not is verified.
For the verification process, the control module in the passive intelligent lock 3 uses an encryption algorithm solidified in the control module, generates a corresponding verification code according to the ID information 0013 and the time information at that time as a random seed of the encryption algorithm, compares whether the generated verification code is the same as the password EBVS2AFV, and judges that the ID information 0013 is matched with the password EBVS2AFV if the generated verification code is the EBVS2 AFV; similarly, the control module in the passive intelligent lock 3 uses the encryption algorithm solidified in the control module, generates a corresponding verification code according to the ID information 0025 and the time information at that time as the random seed of the encryption algorithm, compares whether the generated verification code is the same as the password TP53LKML, and determines that the ID information 0025 is matched with the password TP53LKML if the generated verification code is TP53 LKML.
In the process, for the production equipment 1 and the production equipment 2 which have been checked in the inspection process, the ID information 0013 of the passive intelligent lock 1 fed back by the terminal used by the inspection staff is matched with the corresponding password EBVS2AFV, and the ID information 0025 of the passive intelligent lock 2 is also matched with the corresponding password TP53LKML, so that the inspection request can be judged to be legal.
The principle of the above process is that: in the process of mass production, the passive intelligent locks 1, 2 and 3 solidify the same encryption algorithm or random number generation algorithm in their control modules, and respectively solidify different ID information in their control modules. These encryption algorithms or random number generation algorithms use their ID information and the current time information as random number seeds and generate random numbers as passwords. The time information can be set to be larger counting scale according to the characteristics of the routing inspection work, for example, the time is taken as a timing unit, so that corresponding ID information is input into each passive intelligent lock, a random number can be output to be used as a password, the same ID information is input into different passive intelligent locks on the same day, and the same password is returned by different passive intelligent locks due to the fact that the time information and the ID information which are used as random number seeds are the same. When a passive intelligent lock uses the ID information of the passive intelligent lock to generate a password, the password can be used for feeding back to the terminal for the terminal to store; when one passive intelligent lock obtains the ID information of other passive intelligent locks from the terminal and generates the verification code by using the ID information of the other passive intelligent locks, the password provided by the terminal can be verified according to the generated verification code. If some of the passwords provided by the terminal are not verified, the result generally indicates that the patrol inspection work of other production equipment has abnormal conditions, so that the correct passwords are not obtained from the corresponding passive intelligent locks, and therefore the passive intelligent locks receiving the patrol inspection requests can not respond to the patrol inspection requests and continue to be kept in a locked state, the patrol inspection work is prevented from continuing, and the execution of the patrol inspection work is urged.
Further as a preferred embodiment, the control module is further configured to, after determining that the inspection request is legal, execute the following steps:
A1. calling ID information solidified in the control module;
A2. generating a password according to the called ID information by using an encryption algorithm solidified in the control module;
A3. returning the generated password to the source of the patrol request.
In the usage scenario shown in fig. 2 and table 1, the inspector has completed the inspection work on the production equipment 1 and the production equipment 2 and obtains the passwords EBVS2AFV and EBVS2AFV generated and sent by the corresponding passive smart locks 1 and 2. On this basis, the patrol inspection personnel uses the terminal to send a patrol inspection request to the passive intelligent lock 3, the passive intelligent lock 3 verifies the matching performance of the ID information 0013 of the passive intelligent lock 1, the ID information 0025 of the passive intelligent lock 2 and the corresponding passwords EBVS2AFV and EBVS2AFV stored in the terminal, and after the matching is confirmed and the patrol inspection request is judged to be legal, the control module in the passive intelligent lock 3 further executes the steps A1-A3.
By executing step a1, the control module of the passive smart lock 3 retrieves the solidified ID information 0036 from its solidified data area.
By executing step a2, the control module of the passive smart lock 3 reads the encryption algorithm from its solidified program area and generates the password XTQIRIJ8 from ID information 0036.
By executing step a3, the control module of the passive smart lock 3 returns the generated password XTQIRIJ8 to the source that issued the patrol request, i.e., the terminal used by the patrol officer, through the communication module of the passive smart lock 3, so that the terminal can store the password XTQIRIJ8 returned by the passive smart lock 3. The terminal updates its stored patrol record and password sequence according to the returned password XTQIRIJ8 so that the contents of its stored patrol record and password sequence are changed from those shown in table 1 to those shown in table 2.
TABLE 2
Figure BDA0002190432990000081
When the inspection personnel finish the inspection of the production equipment 3 and go to the production equipment 4 to inspect according to the inspection plan, the inspection personnel need to use the terminal to send an inspection request to the passive intelligent lock 4 corresponding to the production equipment 4. The passive intelligent lock 4 responds to the polling request and requires the terminal to provide polling records and password sequences. The terminal sends the polling record and the password sequence shown in table 2 to the passive intelligent lock 4, and the passive intelligent lock 4 executes the same verification process of the passive intelligent lock 3 in the embodiment, so as to judge whether the polling request sent by the terminal is legal or not, and further determine whether to switch from a locking state to an unlocking state for polling personnel to check the production equipment 4.
Further, as a preferred embodiment, the control module is further configured to generate an unlocking record after detecting that the electronic lock execution module is switched to the unlocking state, and store the unlocking record in the storage module.
The unlocking record can contain the following contents: the time for switching from the locking state to the unlocking state, the time for switching from the unlocking state to the locking state, the time for receiving the inspection request, the ID information of the terminal sending the inspection request and the like.
Through the record of unblanking can be to patrolling and examining the work and take notes, and the record of unblanking can be provided for the terminal and look over to convenient follow-up maintenance process to production facility.
To sum up, passive intelligent lock can realize discerning the function of examining and approving the personnel of patrolling and examining to the result of examining and approving is decided according to the condition that the personnel of patrolling and examining were patrolled and examined the work according to patrolling and examining the plan execution, if the personnel of patrolling and examining do not carry out the work of patrolling and examining according to the plan of patrolling and examining, when the personnel of patrolling and examining were patrolled and examined to certain production facility, will fail to provide the accurate record and the password of patrolling and examining that obtain before the corresponding passive intelligent lock patrolling and examining, consequently can't pass through the verification of passive intelligent lock, then can't make passive intelligent lock switch to the state of unblanking, thereby avoid the operation of patrolling and examining in violation of the.
The passive intelligent lock in the embodiment can transfer the task of storing the key data to the active terminal under the condition that the large-capacity nonvolatile memory cannot be used for recording, require the terminal to store the password, and verify the password stored by the terminal. Therefore, the passive intelligent lock in the embodiment can be obtained by simply changing the control logic on the basis of the hardware of the existing passive intelligent lock, the hardware is not required to be modified, and the equipment updating cost is reduced.
Further, passive intelligence lock can also be to patrolling and examining the work and taking notes, avoids needing to patrol and examine among the prior art personnel and carries out loaded down with trivial details flow nature work for patrol and examine the personnel and can be absorbed in technical work such as carrying out the inspection, reduce the work load of patrolling and examining the personnel and the possibility of makeing mistakes. The terminal is matched with the passive intelligent lock for use and can be combined into an inspection system, and the inspection system and the corresponding inspection method can achieve the same technical effect as the passive intelligent lock.
Example 2
The terminal in this embodiment is used for polling the passive intelligent lock in embodiment 1. The terminal is composed of an external power supply module and an intelligent module, the external power supply module mainly comprises a battery, a voltage transformation circuit, an oscillation circuit, a coil and the like, high-frequency current with radiation capability is formed by the oscillation circuit after the electric power provided by the battery is transformed by the voltage transformation circuit, and the high-frequency current is radiated outside through the coil, so that when the terminal is close to the passive intelligent lock in the embodiment 1, a power receiving module in the passive intelligent lock can obtain electric power from an electromagnetic field radiated by the external power supply module, and the passive intelligent lock obtains a working power supply.
In the polling process, the connection relation between the terminal and the passive intelligent lock is shown in fig. 3, and the intelligent module is used for sending polling requests to the passive intelligent lock, so that the electronic lock execution module in the passive intelligent lock is switched to an unlocking state.
Further, as a preferred embodiment, after the patrol personnel finishes patrolling each production device, the patrol personnel also uses the terminal to receive and store the password returned by the corresponding passive intelligent lock, stores the password in the terminal and updates the password sequence stored in the terminal. When the inspection personnel transfer to the next production equipment for inspection, if the inspection record and the password sequence acquisition request sent by the passive intelligent lock corresponding to the next production equipment are detected, the stored inspection record and the stored password sequence are sent to the passive intelligent lock, so that the passive intelligent lock can complete the verification process of the legality of the inspection request according to the provided inspection record and the provided password sequence, and then the passive intelligent lock is switched to an unlocking state, so that the inspection personnel can inspect and maintain the production equipment.
Further as a preferred embodiment, the terminal is further configured to request the passive smart lock to obtain an unlocking record, and store and/or display the unlocking record.
The inspection personnel can operate the terminal and send an unlocking record acquisition request to the passive intelligent lock. And the passive intelligent lock responds to the unlocking record acquisition request and sends the stored unlocking record to the terminal. After the terminal acquires the unlocking record, the unlocking record can be displayed on the set display screen for inspection personnel to check.
Example 3
The inspection system in this embodiment is composed of the passive intelligent lock described in embodiment 1 and the terminal described in embodiment 2, and can realize functions that the passive intelligent lock and the terminal individually realize and functions that they combine to realize, and can obtain the same technical effects as those of the passive intelligent lock and the terminal.
Example 4
The inspection method in the embodiment comprises the following steps:
s1, a passive intelligent lock acquires a patrol request sent by a terminal, acquires corresponding patrol records and password sequences according to a source request of the patrol request, and verifies the validity of the patrol request according to the acquired patrol records and password sequences; generating an unlocking instruction for the condition that the routing inspection request is verified to be legal;
s2, the passive intelligent lock is kept in a locking state at ordinary times, and is switched to an unlocking state when responding to the unlocking instruction.
The steps S1 and S2 are performed using the inspection system in embodiment 3. The steps S1 and S2 may be used as a method for using the inspection system in embodiment 3, and may achieve the technical effect achieved by the passive smart lock in embodiment 1.
It should be noted that, unless otherwise specified, when a feature is referred to as being "fixed" or "connected" to another feature, it may be directly fixed or connected to the other feature or indirectly fixed or connected to the other feature. Furthermore, the descriptions of upper, lower, left, right, etc. used in the present disclosure are only relative to the mutual positional relationship of the constituent parts of the present disclosure in the drawings. As used in this disclosure, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. In addition, unless defined otherwise, all technical and scientific terms used in this example have the same meaning as commonly understood by one of ordinary skill in the art. The terminology used in the description of the embodiments herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this embodiment, the term "and/or" includes any combination of one or more of the associated listed items.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element of the same type from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of the present disclosure. The use of any and all examples, or exemplary language ("e.g.," such as "or the like") provided with this embodiment is intended merely to better illuminate embodiments of the invention and does not pose a limitation on the scope of the invention unless otherwise claimed.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer readable medium configured with the computer program, where the medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, operations of processes described in this embodiment can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described in this embodiment (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory medium or device, whether removable or integrated onto a computing platform, such as a hard disk, optical read and/or write media, RAM, ROM, etc., so that it may be read by a programmable computer, which when read by the computer may be used to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described in this embodiment includes these and other different types of non-transitory computer-readable media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
A computer program can be applied to input data to perform the functions described in the present embodiment to convert the input data to generate output data that is stored to a non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and any modifications, equivalent substitutions, improvements, etc. within the spirit and principle of the present invention should be included in the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means. The invention is capable of other modifications and variations in its technical solution and/or its implementation, within the scope of protection of the invention.

Claims (10)

1. A passive intelligent lock is characterized by comprising a power receiving module, a communication module, a control module and an electronic lock execution module;
the power receiving module is used for receiving external energy so as to supply power to the communication module, the control module and the electronic lock execution module;
the communication module is used for providing a channel for external communication for the control module;
the control module is used for acquiring an inspection request through the communication module, further acquiring corresponding inspection records and password sequences aiming at a source request of the inspection request, and verifying the legality of the inspection request according to the acquired inspection records and password sequences; generating an unlocking instruction for the condition that the routing inspection request is verified to be legal;
the electronic lock execution module is used for keeping a locking state at ordinary times and switching to an unlocking state when responding to the unlocking instruction.
2. The passive intelligent lock according to claim 1, wherein the control module is configured to, when verifying the validity of the patrol request according to the obtained patrol record and password sequence, specifically execute the following steps:
analyzing all the ID information contained in the routing inspection record;
verifying the matching of each ID information and the corresponding password in the password sequence one by one;
and when all the ID information is detected to correspond to the matched passwords, judging that the routing inspection request is legal.
3. The passive intelligent lock according to claim 2, wherein the control module is configured to perform the following steps when verifying one by one the matching between each piece of ID information and the corresponding password in the password sequence:
generating corresponding verification codes according to the ID information by using an encryption algorithm solidified in the control module;
comparing the identity of each verification code with the corresponding password in the password sequence one by one;
and when detecting that the passwords in the password sequence correspond to the same verification code, judging that the password is matched with the ID information for generating the verification code.
4. A passive smart lock according to claim 2 or 3, wherein the control module is further configured to perform the following steps after determining that the patrol request is legitimate:
calling ID information solidified in the control module;
generating a password according to the called ID information by using an encryption algorithm solidified in the control module;
returning the generated password to the source of the patrol request.
5. A passive intelligent lock according to any one of claims 1 to 3, wherein the control module is further configured to generate an unlocking record after detecting that the electronic lock execution module is switched to the unlocking state, and store the unlocking record in the storage module.
6. A terminal for polling a passive intelligent lock according to any one of claims 1-5, which is provided with an external power supply module and an intelligent module;
the external power supply module is used for being coupled with a power receiving module in the passive intelligent lock so as to provide power for the power receiving module;
the intelligent module is used for sending an inspection request, an inspection record and a password sequence to the passive intelligent lock, so that the electronic lock execution module in the passive intelligent lock is switched to an unlocking state.
7. The terminal of claim 6, wherein the smart module is further configured to obtain a password returned by the passive smart lock, and add the obtained password to a password sequence stored by the smart module.
8. The terminal of claim 6, further configured to request the passive smart lock for an unlock record, and to store and/or display the unlock record.
9. An inspection system based on a passive intelligent lock, characterized by comprising the passive intelligent lock according to any one of claims 1 to 5 and a terminal according to any one of claims 6 to 8.
10. An inspection method based on a passive smart lock, characterized in that the following steps are performed using the inspection system according to claim 9:
the passive intelligent lock acquires a patrol request sent by a terminal, further acquires corresponding patrol records and password sequences aiming at a source request of the patrol request, and verifies the validity of the patrol request according to the acquired patrol records and password sequences; generating an unlocking instruction for the condition that the routing inspection request is verified to be legal;
the passive intelligent lock is kept in a locking state at ordinary times, and is switched to an unlocking state when responding to the unlocking instruction.
CN201910830276.5A 2019-09-04 2019-09-04 Passive intelligent lock, terminal, inspection system and inspection method Active CN110648418B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910830276.5A CN110648418B (en) 2019-09-04 2019-09-04 Passive intelligent lock, terminal, inspection system and inspection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910830276.5A CN110648418B (en) 2019-09-04 2019-09-04 Passive intelligent lock, terminal, inspection system and inspection method

Publications (2)

Publication Number Publication Date
CN110648418A true CN110648418A (en) 2020-01-03
CN110648418B CN110648418B (en) 2021-09-07

Family

ID=68991544

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910830276.5A Active CN110648418B (en) 2019-09-04 2019-09-04 Passive intelligent lock, terminal, inspection system and inspection method

Country Status (1)

Country Link
CN (1) CN110648418B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8718063D0 (en) * 1987-07-30 1987-09-03 Britonics Ltd Electronic access systems
US6611232B1 (en) * 1999-03-18 2003-08-26 Robert L. Stanley Lock box locator
CN103578169A (en) * 2013-11-19 2014-02-12 南京品佳科技开发有限公司 Intelligent informationized passive electronic lockset
CN104318652A (en) * 2014-10-24 2015-01-28 国家电网公司 Intelligent door lock management method of hydropower station
CN105243699A (en) * 2014-07-11 2016-01-13 普易科技股份有限公司 Method and system for automatically collecting inspection records
CN105678857A (en) * 2016-03-23 2016-06-15 珠海智信电力科技有限公司 Smart inspection system and smart inspection method
CN205318487U (en) * 2015-12-23 2016-06-15 安徽圆鼎通讯技术有限公司 Management system patrols and examines based on passive electronic lock
CN106127905A (en) * 2016-07-05 2016-11-16 杭州摇光科技有限公司 A kind of electrical lock apparatus, system and method for unlocking thereof
CN106204832A (en) * 2016-07-04 2016-12-07 东莞市猫头鹰智能科技有限公司 Passive intelligent electronic lock and control system of unblanking thereof
CN106683242A (en) * 2016-12-02 2017-05-17 歌尔科技有限公司 Intelligent lock system, intelligent lock and intelligent wearable equipment
CN206236178U (en) * 2016-12-01 2017-06-09 武汉大思想信息股份有限公司 Industrial and mining enterprises' intelligent patrol detection management system
CN107301703A (en) * 2017-06-23 2017-10-27 钱本宁 Dynamic puzzle-lock system and unlocking method
CN107610267A (en) * 2017-09-01 2018-01-19 上海航天能源股份有限公司 Website method for inspecting
CN107657677A (en) * 2017-09-14 2018-02-02 国网山东省电力公司汶上县供电公司 Substation inspection monitoring method, device and electronic equipment
CN108270850A (en) * 2017-12-29 2018-07-10 山东大学 It is a kind of based on the air patrolling and checking management system of Android hand-held sets and its application
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock
CN109784138A (en) * 2018-11-15 2019-05-21 国网河南省电力公司郑州供电公司 Unmanned substation's image data inspection method

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8718063D0 (en) * 1987-07-30 1987-09-03 Britonics Ltd Electronic access systems
US6611232B1 (en) * 1999-03-18 2003-08-26 Robert L. Stanley Lock box locator
CN103578169A (en) * 2013-11-19 2014-02-12 南京品佳科技开发有限公司 Intelligent informationized passive electronic lockset
CN105243699A (en) * 2014-07-11 2016-01-13 普易科技股份有限公司 Method and system for automatically collecting inspection records
CN104318652A (en) * 2014-10-24 2015-01-28 国家电网公司 Intelligent door lock management method of hydropower station
CN205318487U (en) * 2015-12-23 2016-06-15 安徽圆鼎通讯技术有限公司 Management system patrols and examines based on passive electronic lock
CN105678857A (en) * 2016-03-23 2016-06-15 珠海智信电力科技有限公司 Smart inspection system and smart inspection method
CN106204832A (en) * 2016-07-04 2016-12-07 东莞市猫头鹰智能科技有限公司 Passive intelligent electronic lock and control system of unblanking thereof
CN106127905A (en) * 2016-07-05 2016-11-16 杭州摇光科技有限公司 A kind of electrical lock apparatus, system and method for unlocking thereof
CN206236178U (en) * 2016-12-01 2017-06-09 武汉大思想信息股份有限公司 Industrial and mining enterprises' intelligent patrol detection management system
CN106683242A (en) * 2016-12-02 2017-05-17 歌尔科技有限公司 Intelligent lock system, intelligent lock and intelligent wearable equipment
CN107301703A (en) * 2017-06-23 2017-10-27 钱本宁 Dynamic puzzle-lock system and unlocking method
CN107610267A (en) * 2017-09-01 2018-01-19 上海航天能源股份有限公司 Website method for inspecting
CN107657677A (en) * 2017-09-14 2018-02-02 国网山东省电力公司汶上县供电公司 Substation inspection monitoring method, device and electronic equipment
CN108270850A (en) * 2017-12-29 2018-07-10 山东大学 It is a kind of based on the air patrolling and checking management system of Android hand-held sets and its application
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock
CN109784138A (en) * 2018-11-15 2019-05-21 国网河南省电力公司郑州供电公司 Unmanned substation's image data inspection method

Also Published As

Publication number Publication date
CN110648418B (en) 2021-09-07

Similar Documents

Publication Publication Date Title
CN105283852B (en) A kind of method and system of fuzzy tracking data
DE102017106293B4 (en) For performing a customer service task that includes the functionality of a process, configurable robot and system for controlling such a robot
DE112007001635T5 (en) Authentication of components in computer systems
US20070034691A1 (en) Using promiscuous and non-promiscuous data to verify card and reader identity
CN109074682A (en) System and method for remotely accessing permission and verifying
CN106778109A (en) A kind of certification authority evaluation method and device based on intelligent contract
CN106934274A (en) A kind of weak passwurd detection method, apparatus and system
CN104657636B (en) Generate method and corresponding structure including at least one virtual machine OVM structure
CN110011848A (en) A kind of mobile O&M auditing system
CN106710032A (en) Entrance guard opening method and device
CN108387796A (en) A kind of electric vehicle electrically-charging equipment cloud detection service system and implementation method
CN111292438A (en) Unmanned aerial vehicle inspection method with information security
CN106372496A (en) Method and system for improving payment terminal application security
CN109255259A (en) A kind of high safety encryption and decryption operational capability extended method and system
US11503019B2 (en) Multiuser measurement system and method for operating a multiuser measurement system
US10862825B1 (en) Token-based device access restrictions based on system uptime
CN107492175A (en) Visible ray safety door latch, system and method for unlocking
CN110648418B (en) Passive intelligent lock, terminal, inspection system and inspection method
CN109103985A (en) The method and apparatus for controlling the execution of operation order
CN110619695B (en) NFC intelligent lock, NFC terminal, inspection system and inspection method
US10788809B2 (en) Method for the enabling of machine functions on a spinning-mill machine
CN108460870B (en) Intelligent unlocking method and system
CN1885227A (en) Portable electronic apparatus and data output method therefor
DE112014004611T5 (en) Control system and authentication device
CN108713199B (en) Authority management method and system, mobile terminal, shared charging equipment and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 510670 Room 401, building C1, 182 Kexue Avenue, Huangpu District, Guangzhou City, Guangdong Province

Patentee after: Guangdong Weide Information Technology Co., Ltd

Address before: 510670 Room 401, building C1, 182 Kexue Avenue, Huangpu District, Guangzhou City, Guangdong Province

Patentee before: Guangdong Weide Information Technology Co., Ltd