CN111599070A - Composite networking door lock control method - Google Patents

Composite networking door lock control method Download PDF

Info

Publication number
CN111599070A
CN111599070A CN202010352113.3A CN202010352113A CN111599070A CN 111599070 A CN111599070 A CN 111599070A CN 202010352113 A CN202010352113 A CN 202010352113A CN 111599070 A CN111599070 A CN 111599070A
Authority
CN
China
Prior art keywords
entrance guard
information
lock
user
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010352113.3A
Other languages
Chinese (zh)
Inventor
许哲昌
袁童童
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leader Of Iot Technology Hangzhou Co Ltd
Original Assignee
Leader Of Iot Technology Hangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leader Of Iot Technology Hangzhou Co Ltd filed Critical Leader Of Iot Technology Hangzhou Co Ltd
Priority to CN202010352113.3A priority Critical patent/CN111599070A/en
Publication of CN111599070A publication Critical patent/CN111599070A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a composite networking door lock control method, which comprises the following steps: generating user characteristic information; correspondingly generating a group of identification codes for each group of user characteristic information, inputting the biological characteristics of the users into the master controller, and combining the biological characteristics of the users with the identification codes to form access control identification information; then, the ID number in the entrance guard identification information is separated through the identity identification and is compared with the ID number of the entrance guard identification information, and if the ID numbers are matched with the same ID number, the biological characteristics of the user in the entrance guard identification information are stored in an entrance guard lock database; when the entrance guard lock is required to be opened, the user inputs the biological information of the user at the entrance guard lock, and if the identification comparison information is the same, the entrance guard lock is opened. The invention has the advantages of simple principle, high safety and low energy consumption, and is mainly used for controlling the door lock.

Description

Composite networking door lock control method
Technical Field
The invention relates to the technical field of intelligent door locks, in particular to a composite networking door lock control method.
Background
With the rapid development of the IOT industry, products of the Internet of things are gradually popularized, particularly, intelligent door locks are developed, the existing intelligent door locks replace traditional keys to open doors through fingerprint identification, card swiping identification and face identification, even the existing intelligent door locks can be connected with the Internet of things to carry out remote control on the intelligent locks, but when the existing intelligent locks connected with the Internet of things carry out information transmission, information is not encrypted, the existing intelligent locks are easy to be attacked by hackers to steal information of the intelligent locks, and the safety is low.
Disclosure of Invention
The invention aims to solve the technical problem of providing a composite networking door lock control method, so that the intelligent door lock has the advantages of simple principle, high safety and low energy consumption.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a composite networking lock control method, comprising:
the main controller is used for managing and controlling the general door lock;
the entrance guard lock is used for identifying entrance and exit information and unlocking and locking a door;
the antenna expansion module is used for connecting the access control lock and the master controller and transmitting information between the access control lock and the master controller, and the method comprises the following steps:
the method comprises the following steps: installing identity marks in all the entrance guard locks, wherein the ID numbers in all the identity marks are different, then inputting the user information and the doorplate number of the door corresponding to each group of entrance guard locks and the ID number of the identity mark in the entrance guard lock into the master controller, and correspondingly generating user characteristic information;
step two: correspondingly generating a group of identification codes for each group of user characteristic information, encrypting the identification codes by an encryption module in the access control lock, then wirelessly transmitting the encrypted identification codes to an antenna expansion module, transmitting the encrypted identification codes to a main controller by the antenna expansion module, and decrypting and pre-storing the encrypted identification codes by the main controller;
step three: inputting the biological characteristics of the user into the master controller, combining the biological characteristics of the user with the identification code generated by the corresponding user characteristic information to form entrance guard identification information, encrypting the entrance guard identification information and storing the encrypted entrance guard identification information in big data;
step four: the main controller sends the encrypted entrance guard identification information to the antenna expansion module through the CAN bus, the antenna expansion module sends the entrance guard identification information in a wireless signal mode, the entrance guard lock decrypts the encrypted entrance guard identification information, then the ID number in the entrance guard identification information is separated through the identity and compared with the ID number of the entrance guard lock, and if the ID numbers are matched with the same, the biological characteristics of a user in the entrance guard identification information are stored in an entrance guard lock database;
step five: when the entrance guard lock needs to be opened, the user inputs own biological information at the entrance guard lock, the entrance guard lock calls the biological characteristics of the user in the database and carries out identification and comparison with the input biological information, if the identification and comparison information is the same, the entrance guard lock is opened, if the identification and comparison information is different, the biological information is sent to the alarm system and the antenna expansion module, the biological information is uploaded to the main controller through the antenna expansion module, the main controller carries out blacklist data matching on the biological information, and the display device is informed to highlight the biological information.
The user information comprises at least two of user name, user gender, user age, user contact information, user identity number and user photo.
The house number is formed by combining a building number, a floor number and a door room number corresponding to the house door.
Every group the antenna expansion module corresponds and is connected with several groups of adjacent entrance guard locks, and through low consumption 2.4G network connection, specific connection mode is in wiFi connection, bluetooth connection, zigBee connection between antenna expansion module and the entrance guard lock.
The main controller is provided with a CAN bus interface, each group of the antenna extension modules is provided with a high-speed CAN bus interface, and the CAN bus interface of the main controller is connected with the high-speed CAN bus interface of the antenna extension module to transmit data.
The encryption algorithm of the access control lock and the master controller is a HASH encryption algorithm.
The user biological characteristics and biological information comprise one or more of fingerprint information, face information, access card information and password digital information.
The alarm system comprises a security system and/or a public security system.
The invention has the beneficial effects that:
1. the method has simple working principle and high safety, and can effectively prevent the leakage of user information and the password of the access lock;
2. the method comprises the entrance guard lock, the main controller and the antenna expansion module, wherein the main controller is in wired connection with the antenna expansion module through a CAN + bus, and the antenna expansion module is in wireless real-time communication with the entrance guard lock through a unique low-power-consumption 2.4g protocol of a palm door physical association, so that the power consumption of the entrance guard lock CAN be effectively reduced, and the cruising ability of a battery in the entrance guard lock CAN be effectively improved
3. The alarm system can alarm abnormal information input, illegal invasion and the like, is convenient for monitoring personnel to remove in time, and has a fire-fighting linkage function.
Drawings
FIG. 1 is a schematic diagram of the first to fourth steps of the present invention;
FIG. 2 is a schematic structural diagram of step five of the present invention.
Detailed Description
The following further describes embodiments of the present invention with reference to the drawings. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example one
Referring to fig. 1-2, a method for controlling a composite networking door lock includes:
the main controller is used for managing and controlling the general door lock;
the entrance guard lock is used for identifying entrance and exit information and unlocking and locking a door;
the antenna expansion module is used for connecting the access control lock and the master controller and transmitting information between the access control lock and the master controller, and the method comprises the following steps:
the method comprises the following steps: installing identity marks in all the entrance guard locks, wherein the ID numbers in all the identity marks are different, then inputting the user information and the doorplate number of the door corresponding to each group of entrance guard locks and the ID number of the identity mark in the entrance guard lock into the master controller, and correspondingly generating user characteristic information;
step two: correspondingly generating a group of identification codes for each group of user characteristic information, encrypting the identification codes by an encryption module in the access control lock, then wirelessly transmitting the encrypted identification codes to an antenna expansion module, transmitting the encrypted identification codes to a main controller by the antenna expansion module, and decrypting and pre-storing the encrypted identification codes by the main controller;
step three: inputting the biological characteristics of the user into the master controller, combining the biological characteristics of the user with the identification code generated by the corresponding user characteristic information to form entrance guard identification information, encrypting the entrance guard identification information and storing the encrypted entrance guard identification information in big data;
step four: the main controller sends the encrypted entrance guard identification information to the antenna expansion module through the CAN bus, the antenna expansion module sends the entrance guard identification information in a wireless signal mode, the entrance guard lock decrypts the encrypted entrance guard identification information, then the ID number in the entrance guard identification information is separated through the identity and compared with the ID number of the entrance guard lock, and if the ID numbers are matched with the same, the biological characteristics of a user in the entrance guard identification information are stored in an entrance guard lock database;
step five: when the entrance guard lock needs to be opened, the user inputs own biological information at the entrance guard lock, the entrance guard lock calls the biological characteristics of the user in the database and carries out identification and comparison with the input biological information, if the identification and comparison information is the same, the entrance guard lock is opened, if the identification and comparison information is different, the biological information is sent to the alarm system and the antenna expansion module, the biological information is uploaded to the main controller through the antenna expansion module, the main controller carries out blacklist data matching on the biological information, and the display device is informed to highlight the biological information.
Example two
In the method, the user information comprises at least two of user name, user gender, user age, user contact information, user identity number and user photo.
The house number is composed of building number, floor number and door number.
Every group antenna expansion module corresponds and is connected with several groups of adjacent entrance guard locks, through low consumption 2.4G network connection between antenna expansion module and the entrance guard lock, and concrete connection mode is in wiFi connection, bluetooth connection, zigBee connection.
The main controller is provided with a CAN bus interface, each group of antenna extension modules is provided with a high-speed CAN bus interface, and the CAN bus interface of the main controller is connected with the high-speed CAN bus interface of the antenna extension modules to transmit data.
The encryption algorithm of the access lock and the master controller is a HASH encryption algorithm.
The user biological characteristics and biological information comprise one or more of fingerprint information, face information, access card information and password digital information.
The alarm system comprises a security system and/or a public security system.
EXAMPLE III
The method of the invention also comprises a method for controlling the door lock of the entrance guard
The method comprises the following steps: installing identity marks in entrance guard locks where a building and a gate are located, wherein ID numbers in all the identity marks are different, then inputting building number information of a door corresponding to each group of entrance guard locks and the ID numbers of the identity marks in the entrance guard locks into a main controller, and correspondingly generating entrance guard door information;
step two: correspondingly generating a group of identification codes for each group of entrance guard door information, encrypting the identification codes by an encryption module in the entrance guard lock, then wirelessly transmitting the encrypted identification codes to an antenna expansion module, transmitting the encrypted identification codes to a master controller by the antenna expansion module, and decrypting and pre-storing the encrypted identification codes by the master controller;
step three: entering entrance guard information into the master controller, combining the entrance guard information with an identification code generated by corresponding entrance guard room information to form entrance guard identification information, encrypting the entrance guard identification information and storing the encrypted entrance guard identification information into big data;
step four: the main controller sends the encrypted entrance guard identification information to the antenna expansion module through the CAN bus, the antenna expansion module sends the entrance guard identification information in a wireless signal mode, the entrance guard lock decrypts the encrypted entrance guard identification information, then the ID number in the entrance guard identification information is separated through the identity and compared with the ID number of the entrance guard lock, and if the ID numbers are matched with the same number, entrance guard information in the entrance guard identification information is stored in an entrance guard lock database;
step five: when the entrance guard lock is opened to needs, the entrance guard is through at entrance guard lock input biological information, entrance guard's information in the entrance guard lock transfer database and with the biological information of input discernment contrast, if discernment contrast information is the same, then open the entrance guard lock, if discernment contrast information is inequality, then send this biological information alarm system and antenna expansion module, reach the master controller on uploading this biological information through antenna expansion module, the master controller carries out blacklist data matching to this biological information, and inform display device salient this biological information.
Example four
The invention has the beneficial effects that:
1. the method has simple working principle and high safety, and can effectively prevent the leakage of user information and the password of the access lock;
2. the method comprises the entrance guard lock, the main controller and the antenna expansion module, wherein the main controller is in wired connection with the antenna expansion module through a CAN + bus, and the antenna expansion module is in wireless real-time communication with the entrance guard lock through a unique low-power-consumption 2.4g protocol of a palm door physical association, so that the power consumption of the entrance guard lock CAN be effectively reduced, and the cruising ability of a battery in the entrance guard lock CAN be effectively improved
3. The alarm system can alarm abnormal information input, illegal invasion and the like, is convenient for monitoring personnel to remove in time, and has a fire-fighting linkage function.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the described embodiments. It will be apparent to those skilled in the art that various changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, and the scope of protection is still within the scope of the invention.

Claims (8)

1. A composite networking door lock control method is characterized by comprising the following steps:
the main controller is used for managing and controlling the general door lock;
the entrance guard lock is used for identifying entrance and exit information and unlocking and locking a door;
the antenna expansion module is used for connecting the access control lock and the master controller and transmitting information between the access control lock and the master controller, and is characterized by comprising the following steps:
the method comprises the following steps: installing identity marks in all the entrance guard locks, wherein the ID numbers in all the identity marks are different, then inputting the user information and the doorplate number of the door corresponding to each group of entrance guard locks and the ID number of the identity mark in the entrance guard lock into the master controller, and correspondingly generating user characteristic information;
step two: correspondingly generating a group of identification codes for each group of user characteristic information, encrypting the identification codes by an encryption module in the access control lock, then wirelessly transmitting the encrypted identification codes to an antenna expansion module, transmitting the encrypted identification codes to a main controller by the antenna expansion module, and decrypting and pre-storing the encrypted identification codes by the main controller;
step three: inputting the biological characteristics of the user into the master controller, combining the biological characteristics of the user with the identification code generated by the corresponding user characteristic information to form entrance guard identification information, encrypting the entrance guard identification information and storing the encrypted entrance guard identification information in big data;
step four: the main controller sends the encrypted entrance guard identification information to the antenna expansion module through the CAN bus, the antenna expansion module sends the entrance guard identification information in a wireless signal mode, the entrance guard lock decrypts the encrypted entrance guard identification information, then the ID number in the entrance guard identification information is separated through the identity and compared with the ID number of the entrance guard lock, and if the ID numbers are matched with the same, the biological characteristics of a user in the entrance guard identification information are stored in an entrance guard lock database;
step five: when the entrance guard lock needs to be opened, the user inputs own biological information at the entrance guard lock, the entrance guard lock calls the biological characteristics of the user in the database and carries out identification and comparison with the input biological information, if the identification and comparison information is the same, the entrance guard lock is opened, if the identification and comparison information is different, the biological information is sent to the alarm system and the antenna expansion module, the biological information is uploaded to the main controller through the antenna expansion module, the main controller carries out blacklist data matching on the biological information, and the display device is informed to highlight the biological information.
2. The composite networking lock control method according to claim 1, wherein: the user information comprises at least two of user name, user gender, user age, user contact information, user identity number and user photo.
3. The composite networking lock control method according to claim 1, wherein: the house number is formed by combining a building number, a floor number and a door room number corresponding to the house door.
4. The composite networking lock control method according to claim 1, wherein: every group the antenna expansion module corresponds and is connected with several groups of adjacent entrance guard locks, and through low consumption 2.4G network connection, specific connection mode is in wiFi connection, bluetooth connection, zigBee connection between antenna expansion module and the entrance guard lock.
5. The composite networking lock control method according to claim 1, wherein: the main controller is provided with a CAN bus interface, each group of the antenna extension modules is provided with a high-speed CAN bus interface, and the CAN bus interface of the main controller is connected with the high-speed CAN bus interface of the antenna extension module to transmit data.
6. The composite networking lock control method according to claim 1, wherein: the encryption algorithm of the access control lock and the master controller is a HASH encryption algorithm.
7. The composite networking lock control method according to claim 1, wherein: the user biological characteristics and biological information comprise one or more of fingerprint information, face information, access card information and password digital information.
8. The composite networking lock control method according to claim 1, wherein: the alarm system comprises a security system and/or a public security system.
CN202010352113.3A 2020-04-28 2020-04-28 Composite networking door lock control method Pending CN111599070A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010352113.3A CN111599070A (en) 2020-04-28 2020-04-28 Composite networking door lock control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010352113.3A CN111599070A (en) 2020-04-28 2020-04-28 Composite networking door lock control method

Publications (1)

Publication Number Publication Date
CN111599070A true CN111599070A (en) 2020-08-28

Family

ID=72187709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010352113.3A Pending CN111599070A (en) 2020-04-28 2020-04-28 Composite networking door lock control method

Country Status (1)

Country Link
CN (1) CN111599070A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100060414A1 (en) * 2006-07-07 2010-03-11 Doo Man Im Electric door lock device
CN101833802A (en) * 2010-04-02 2010-09-15 杭州英杰电子有限公司 Large real-time wireless networking door control system powered by dry battery
CN201622628U (en) * 2010-03-10 2010-11-03 初昊阳 Biological identification-compatible access control equipment
CN203276380U (en) * 2013-04-23 2013-11-06 江苏富士通通信技术有限公司 Distributed door access authentication system based on palm veins
CN105631987A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Bluetooth access control unlocking method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100060414A1 (en) * 2006-07-07 2010-03-11 Doo Man Im Electric door lock device
CN201622628U (en) * 2010-03-10 2010-11-03 初昊阳 Biological identification-compatible access control equipment
CN101833802A (en) * 2010-04-02 2010-09-15 杭州英杰电子有限公司 Large real-time wireless networking door control system powered by dry battery
CN203276380U (en) * 2013-04-23 2013-11-06 江苏富士通通信技术有限公司 Distributed door access authentication system based on palm veins
CN105631987A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Bluetooth access control unlocking method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
邓春红: "《网络安全原理与实务》", 30 June 2014, 北京理工大学出版社 *

Similar Documents

Publication Publication Date Title
EP2348490B1 (en) Access control system
CN104050742A (en) Intelligent door and control method and system thereof
CN104167029B (en) A kind of intelligent lock and its operating method
KR101470747B1 (en) Method and apparatus for implementing doorlock system using mobile terminal
CN109905235A (en) A kind of smart lock unlocking method, smart lock, terminal, server and system
CN104282061B (en) Unlocking method for safety intelligent lock system
CN104052817A (en) Intelligent door and intelligent door control method and system
CN104282058B (en) The method for unlocking of the safety intelligent lock system of band video monitoring based on bluetooth
CN104299300B (en) The unblanking and close locking method of safety intelligent lock system based on NFC
CN101333892B (en) Safety processing method of RFID system for door lock
US10984620B2 (en) Access control device, access control system and access control method using the same
CN105261100A (en) Entrance guard unlocking method and system
CN107989514A (en) There is the safety box of dynamic password
CN109035515A (en) The control method and door-locking system of smart lock
CN109300201A (en) A kind of intelligent and safe lock and its encryption system and encryption method
CN103996233A (en) Fingerprint machine cabinet lock based on bluetooth and control method
WO2016036070A1 (en) Reverse trace-preventing wireless recognition secure entry method and secure entry system using same
CN109166216A (en) A kind of control method and device of smart bluetooth door lock
CN106875532B (en) A kind of intelligent door lock and control equipment and system and remotely control method for unlocking
CN210864848U (en) Bluetooth intelligent lock device and system of electronic box
CN111599070A (en) Composite networking door lock control method
JP4117520B2 (en) Electronic lock control system
CN214202481U (en) Dynamic coded lock circuit
CN109979053A (en) A kind of offline model Internet of Things lock device and cipher key transmission methods based on MULTIPLE DYNAMIC key
CN112037383B (en) Intelligent door lock and authority judgment method and application system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200828