CN114333111A - Controllable key access control, handheld key and door lock - Google Patents
Controllable key access control, handheld key and door lock Download PDFInfo
- Publication number
- CN114333111A CN114333111A CN202111623446.6A CN202111623446A CN114333111A CN 114333111 A CN114333111 A CN 114333111A CN 202111623446 A CN202111623446 A CN 202111623446A CN 114333111 A CN114333111 A CN 114333111A
- Authority
- CN
- China
- Prior art keywords
- key
- module
- door
- handheld
- controllable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 claims abstract description 17
- XEEYBQQBJWHFJM-UHFFFAOYSA-N Iron Chemical compound [Fe] XEEYBQQBJWHFJM-UHFFFAOYSA-N 0.000 claims description 6
- 238000013475 authorization Methods 0.000 claims description 6
- 230000003993 interaction Effects 0.000 claims description 4
- 229910052742 iron Inorganic materials 0.000 claims description 3
- 230000004913 activation Effects 0.000 claims description 2
- 230000005764 inhibitory process Effects 0.000 claims 3
- 238000012360 testing method Methods 0.000 description 36
- 238000012937 correction Methods 0.000 description 16
- 230000000052 comparative effect Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 238000013461 design Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 8
- 238000007689 inspection Methods 0.000 description 8
- 238000000034 method Methods 0.000 description 6
- 239000011257 shell material Substances 0.000 description 5
- 229910001220 stainless steel Inorganic materials 0.000 description 5
- 239000010935 stainless steel Substances 0.000 description 5
- 238000002474 experimental method Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 229910000831 Steel Inorganic materials 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 239000000463 material Substances 0.000 description 3
- 238000003801 milling Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 239000010959 steel Substances 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 229940107810 cellcept Drugs 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000001939 inductive effect Effects 0.000 description 2
- HPNSFSBZBAHARI-UHFFFAOYSA-N micophenolic acid Natural products OC1=C(CC=C(C)CCC(O)=O)C(OC)=C(C)C2=C1C(=O)OC2 HPNSFSBZBAHARI-UHFFFAOYSA-N 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002238 attenuated effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000015607 signal release Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention relates to a controllable key access control, a handheld key and a door lock, belonging to the technical field of unattended transformer substations; the handheld key comprises a reading module, a communication module, a logic module, an alarm module, a positioning module, a driving module, a power supply module and a background module; the door lock comprises a lock cylinder shell, an information code label and a lock cylinder matched with the key cylinder, wherein the lock cylinder adopts a dual-structure super B-level magnetic lock, and the information code label adopts an RFID label; the controllable key door control system comprises the controllable key door forbidden handheld key and the controllable key door forbidden door lock; the key can be retrieved after the key is lent using the controllable key access control.
Description
Technical Field
The invention relates to a controllable key access control device, a handheld key and a door lock, and belongs to the technical field of unattended transformer substations.
Background
In an unattended transformer substation, screen cabinet doors such as a protection screen, a control screen, an alternating current distribution screen and a switch cabinet, box doors such as a terminal box, an overhaul power supply box, a temperature control box and a cable box, and access control keys such as a blocking door and a network door are uniformly arranged in a key box, an operator can take the key box for self-return, and the problem that the key is not known to the operator is often caused by the fact that the key is left on the site, is carelessly taken away by the operator, cannot confirm that the key belongs to the key box and cannot return after being taken away.
In addition, the operation and maintenance team is provided with keys for managing all large doors and equipment room doors of the transformer substation. After the key is lent, the approved maintenance or construction personnel can return together on the day of the end of the work. Therefore, the problems that all keys are lent, other units and teams cannot confirm whether the corresponding door lock is opened or not by borrowing the keys, whether the lent keys are used up or not, and where the lent keys are located can be caused.
As shown in table 1, the reason why the key cannot be lent within the 12-month period is counted, four problems that the key is left on the spot, taken away by the operator, cannot be returned after being taken away, and the key is considered to be in use are found, and the reason that the key cannot be confirmed to go accounts for 82% of the reason that the key cannot be lent are summarized.
TABLE 1 statistics of reasons for keys not being lent
|
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | General assembly |
Leaving keys in the field | 2 | 1 | 2 | 1 | 2 | 1 | 2 | 2 | 1 | 2 | 2 | 2 | 20 |
Is taken away by the |
1 | 2 | 1 | 2 | 1 | 2 | 2 | 1 | 2 | 2 | 3 | 2 | 21 |
Can not return after being taken away | 4 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 2 | 1 | 2 | 1 | 19 |
Consider the key in |
3 | 2 | 2 | 2 | 1 | 2 | 1 | 2 | 1 | 2 | 2 | 2 | 22 |
|
1 | 1 | 2 | 2 | 1 | 1 | 2 | 1 | 2 | 2 | 2 | 1 | 18 |
Therefore, from the practical work, the problem that the key is not in a working position when used, namely the problem of difficulty in finding the direction of the key is solved by using the QC concept.
The method comprises the following steps of analyzing and evaluating 3 optional project directions from four aspects of feasibility, economy, effectiveness and compatibility, and finally selecting the project directions as shown in the following table:
table 2 solution evaluation analysis table
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the controllable key access control system can retrieve the key after the key is lent.
The invention relates to a controllable key door forbidden handheld key, which comprises a reading module, a communication module, a logic module, an alarm module, a positioning module, a driving module, a power supply module and a background module,
a reading module: an information code tag for identifying the door lock;
a communication module: the system is used for communicating between the handheld key and the background module, and transmitting the opening and closing state information of the entrance guard, the positioning of the handheld key and the task of opening and closing the door;
a logic module: the device is used for receiving the input signal of the reading module, comparing the signal with the set door opening condition and outputting a corresponding control signal according to the comparison result;
an alarm module: comprises a pointing element and a display for human-computer interaction;
a positioning module: the system is used for reading, positioning and sending to the background module;
a driving module: the key comprises a key core and a driving element, wherein the driving element is used for driving the key core to realize door opening and door closing;
a power supply module: the power supply is used for supplying power to the handheld key;
a background module: the system is used for issuing a door opening and closing task, and the scanning positioning module obtains the destination result of the hand-held key and matches the hand-held key with the authorized entrance guard.
Preferably, the hand-held key realizes the door opening and closing by the following steps:
step S1, if the base station has the hand-held key, the hand-held key is issued to the lender after the information that the door should be opened by the hand-held key is set by the background module; if the base station has no handheld key, the scanning and positioning module displays a handheld key list, and selects a proper handheld key to send information for opening the door;
step S2, the hand-held key identifies the information code label of the door lock through the reading module and inputs the identification information into the logic module;
step S3, the logic module receives the input signal of the reading module, calls the set door opening condition for comparison, and outputs a key releasing signal if the set door opening condition is met;
s4, a driving element reads a key to turn to drive a key core to open the door, and the door opening state information of the entrance guard is sent to a background module through a communication module;
and step S5, returning the hand-held key when the lender does not close the door, setting information that the door should be closed by the hand-held key by the base station through the background module, and returning the hand-held key after the door should be closed by the lender under the guidance of the display.
Preferably, the step S5 includes the steps of:
s501, a background module scans a positioning module of the handheld key and loads the handheld key to a map;
step S502, the background module reads historical use information of the lending time period and judges whether all doors are closed; if yes, executing step S507, otherwise executing step S503;
step S503, the background module sets a handheld key and sends the authorization information of the door to be closed to the corresponding handheld key;
step S504, the hand-held key reads the authorization information and matches the information of the door to be closed; if the matching is successful, executing the step S505, otherwise, alarming;
s505, connecting the background module with a handheld key to send an authorized entrance guard number;
s506, a driving element reads the key to turn to drive a key core to close the door, and the communication module sends door access closing state information to the background module to execute the step S502;
and step S507, after the key is used, the background module is connected with the key to detect whether the key responds, if so, the operation is finished, and otherwise, an alarm is given.
Preferably, the driving element is driven by a stepping motor, and when all external elements meet the unlocking condition, the stepping motor M2 is activated to send an activation signal to the stepping motor M2, so that the iron sheet is rotated to release the key core, and the door is opened or closed by the hand-held key.
Preferably, the key core adopts a milled slot key core, and the display adopts a resistive touch screen.
Preferably, the reading module adopts an ANT513 inductively coupled radio frequency device.
The invention relates to a controllable key door forbidden door lock which comprises a lock cylinder shell, an information code label and a lock cylinder matched with the key cylinder.
Preferably, the lock cylinder adopts a dual-structure super B-level magnetic lock, and the information code label adopts an RFID label.
The controllable key door control system comprises the controllable key door forbidden handheld key and the controllable key door forbidden door lock.
Compared with the prior art, the invention has the following beneficial effects:
according to the controllable key door control, the handheld key and the door lock, the information that the handheld key is used for opening the door is set through the base station, the handheld key reads the code in the door lock, the set door opening conditions are called for comparison, if the set door opening conditions are matched, the output signal releases the key to unlock the corresponding door control, the output signal is not matched with the alarm signal and the alarm signal is fed back to the background module to judge whether the door control is carried out, closed-loop control is achieved, factors which are difficult to predict or uncertain can be eliminated, the door control can be reliably and accurately opened, the base station can know the destination result of the handheld key according to the door control information and the geographic position transmitted by the handheld key, and therefore the key can be found back after the handheld key is lent.
Drawings
FIG. 1 is a schematic block diagram of a controllable key gate of the present invention;
FIG. 2 is a graph illustrating the resonant characteristics of an inductively coupled RF device according to the present invention;
FIG. 3 is a diagram of the RFID tag shape according to the present invention;
FIG. 4 is a diagram of the dimensions of an RFID tag according to the present invention;
FIG. 5 is a diagram of the shape and size of a lock cylinder according to the present invention;
FIG. 6 is a key core shape and size diagram in accordance with the present invention;
FIG. 7 is a wiring diagram of a display screen according to the present invention;
FIG. 8 is a block diagram of a hand-held key process according to the present invention;
FIG. 9 is a block diagram of a background module process according to the present invention;
FIG. 10 is a background module setting information screen according to the present invention;
FIG. 11 is a background query key trajectory screen in accordance with the present invention;
fig. 12 is a block diagram of a controllable key gate control system according to the present invention.
In the figure: 1. a reading module; 2. a communication module; 3. a logic module; 4. an alarm module; 401. an indicating element; 402. a display; 5. a positioning module; 6. a drive module; 601. a key core; 602. a drive element; 7. a power supply module; 8. a background module; 801. a reservoir; 9. a lock cylinder housing; 10. a lock cylinder; 11. and (4) information code labels.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
As shown in fig. 1 and 12, the controllable key door of the present invention disables the handheld key, which includes a reading module 1, a communication module 2, a logic module 3, an alarm module 4, a positioning module 5, a driving module 6, a power module 7, and a background module 8,
the reading module 1: an information code tag 11 for identifying a door lock;
the communication module 2: the system is used for communicating between the hand-held key and the background module 8, and transmitting the opening and closing state information of the entrance guard, the positioning of the hand-held key and the task of opening and closing the door;
the logic module 3: the device is used for receiving the input signal of the reading module 1, comparing the signal with the set door opening condition and outputting a corresponding control signal according to the comparison result;
and the alarm module 4: comprises a pointing element 401 and a display 402 for human-computer interaction;
the positioning module 5: used for reading, positioning and sending to the background module 8;
the driving module 6: comprises a key core 601 and a driving element 602, wherein the driving element 602 is used for driving the key core 601 to open and close the door;
the power supply module 7: the power supply is used for supplying power to the handheld key;
the background module 8: and the scanning and positioning module 5 is used for issuing a door opening and closing task, obtaining the destination result of the hand-held key and matching the hand-held key with the authorized entrance guard.
Specifically, the hand-held key realizes opening and closing the door through the following steps:
step S1, if the base station has the hand-held key, the hand-held key is issued to the lender after the information that the door should be opened by the hand-held key is set by the background module 8; if the base station has no handheld key, the scanning and positioning module 5 displays a handheld key list, and selects a proper handheld key to send information for opening the door;
step S2, the hand-held key identifies the information code label 11 of the door lock through the reading module 1 and inputs the identification information into the logic module 3;
step S3, the logic module 3 receives the input signal of the reading module 1, calls the set door opening condition for comparison, and outputs a key releasing signal if the set door opening condition is met;
step S4, the driving element 602 reads the key to turn to drive the key core 601 to open the door, and sends the door opening state information of the entrance guard to the background module 8 through the communication module 2;
and step S5, returning the hand-held key when the borrower does not close the door, setting the information that the door should be closed by the hand-held key by the base station through the background module 8, and returning the hand-held key after the door should be closed by the borrower is guided to return through the display 402.
Further, the step S5 includes the following steps:
s501, a background module 8 scans a positioning module 5 of the handheld key and loads the handheld key to a map;
step S502, the background module 8 reads historical use information of the lending time period and judges whether all doors are closed; if yes, executing step S507, otherwise executing step S503;
step S503, the background module 8 sets a handheld key and sends the authorization information of the door to be closed to the corresponding handheld key;
step S504, the hand-held key reads the authorization information and matches the information of the door to be closed; if the matching is successful, executing the step S505, otherwise, alarming;
step S505, the background module 8 is connected with a handheld key to send an authorized entrance guard number;
step S506, the driving element 602 reads the key to turn to drive the key core 601 to close the door, and the communication module 2 sends the door access closing state information to the background module 8 to execute step S502;
and step S507, after the key is used, the background module 8 is connected with the key to detect whether the key responds, if so, the operation is finished, and otherwise, an alarm is given.
The driving element 602 is driven by a stepping motor, and when all external elements meet an unlocking condition, the stepping motor M2 sends an action signal to the stepping motor M2 to act, so that the iron sheet is rotated to release the key core, and the door is opened or closed by the hand-held key.
The key core 601 adopts a milled slot key core, and the display 402 adopts a resistive touch screen.
The reading module 1 adopts an ANT513 inductively coupled radio frequency device.
The controllable key door forbidden door lock comprises a lock cylinder shell 9, an information code label 11 and a lock cylinder 10 matched with the key cylinder 601.
Further, the lock core 10 adopts a dual-structure super B-level magnetic lock, and the information code tag 11 adopts an RFID tag.
The controllable key door control system comprises the controllable key door forbidden handheld key and the controllable key door forbidden door lock.
According to the actual working requirement, the performance of the developed product is analyzed, and two preliminary schemes are provided. The first set of scheme is as follows: controllable many keys entrance guard's device, the second set of scheme: controllable one key entrance guard's device.
Table 3 two preliminary protocol descriptions
Table 4 scheme evaluation analysis selection table
1. Selection of the material of the lock cylinder 10
TABLE 5 comparative selection of core housing 9 Material protocols
2. Selection of the configuration of the lock cylinder 10
TABLE 6 comparative selection of Lock core design
3. Selection of information code label 11
Table 7 comparative selection table of information code labeling scheme
The working frequency of the RFID tag is as follows, wherein 125kH and 13.56MHz are passive, and 433MHz and 866-5.8 GHz are active.
The passive tag has a permanent service life, supports long-time data transmission and permanent data storage, and meets the requirements of a transformer substation lock, so that the following two schemes are provided for selecting the RFID code tag.
Table 8 comparative selection table of schemes of RFID code tags
4. Selection of a read Module 1
For the reading module 1 of the RFID information tag, the following two solutions are provided.
Table 9 comparative selection of reading module 1 protocol
After the inductively coupled radio frequency device is selected as the identification device, it is desirable to select an inductively coupled radio frequency device with high reading accuracy. According to the characteristics of the inductive coupling type radio frequency element, the reading precision is influenced by three factors of the cross section shape, the size and the shell material of the radio frequency element antenna. And selecting the model in the radio frequency element provided by the manufacturer by using an orthogonal decomposition method.
The resonance characteristic graph of the inductively coupled rf element is shown in fig. 2, and it can be seen from the resonance characteristic graph that the maximum value I0 of the current appears at the resonance point ω 0, i.e. at the corresponding frequency 125kHz, the current is attenuated as long as the current deviates from the resonance angular frequency, and the degree of attenuation depends on the quality factor Q of the circuit. Namely: the large Q circuit has good selectivity; the selectivity of the Q-small circuit is poor. The orthogonal table L4(23) is selected, and an inductively coupled RF device with a high quality factor is selected.
TABLE 10 INDUCTIVE COUPLING TYPE RADIO-FREQUENCY ELEMENT PARAMETER POLE TABLE
TABLE 11 orthogonal test chart of parameters L4(23) of inductively coupled device
From the extreme difference R, the influence on the quality factor Q is, in order from large to small, the shape, size, and housing material. Experiment No. 4 was the largest, corresponding to A2B2C 1. Analyzing the I, II bit level difference, the quality factor Qmax of A2B2C1 was consistent with test No. 4. Therefore, we choose the square with the size of 30X 30mm2And the housing is an ANT513 inductively coupled radio frequency device of the PA.
5. Selection of communication module 2 parts
TABLE 12 comparative selection of communication element schemes
Today, with ever-increasing sophistication of LTE networks, the cellcept X12 LTE modem provides fast, smooth, reliable voice and data capabilities for today's most intelligent devices. The intelligent embedded type cellglong X12 LTE modem is automatically connected with the most effective network, supports almost always-on connection state and rich user experience, has the baseband chip transmission speed reaching Cat.12/13, and can ensure the stability and reliability of products. The cellcept X12 LTE modem of the gaotong company is selected as the communication module of the device.
6. Selection of logic module 3
The logic module 3 is used as an application processor, and the application processor is a core part of the access control device and is a key component for controlling the realization of each function of the access control device. According to the design, the application processor receives the input signal of the identification element, compares the signal with the set door opening condition, and outputs different control signals according to the comparison result.
TABLE 12 comparison selection of application processor scenarios
Aiming at the selection of the single chip microcomputer, the following three schemes are provided.
TABLE 13 comparison selection of SCM schemes
An ARM11 kernel is carried in the Samsung S3C6410, and the storage space is as follows: the memory 128MB, flash memory 2GMB, determines to configure the 2G SD card in order to increase storage space.
7. Selection of the drive element 602
For the selection of the drive element 602, the following two solutions are provided.
TABLE 14 comparative selection of drive element schemes
For the selection of the motor, the following two schemes are provided.
Table 15 comparative selection table of implementation motor schemes
For the selection of the stepping motor, the following two schemes are provided.
TABLE 16 comparison selection Table for stepping motor solutions
8. Indicating selection of alarm element
TABLE 17 comparative selection Table indicating alarm element scheme
9. Selection of battery modules 7
As a handheld device, only battery power can be used, and the battery scheme is broken down as follows.
TABLE 18 comparative selection List for Power Module solutions
10. Selection of key cylinder 601
In order to reduce the deformation of the key core 601 caused by the interaction with the lock core 10, the key core 601 should be made of stainless steel; the two-section type combined stainless steel and magnet is selected in cooperation with the opening of an ultrasonic B-level magnetic lock cylinder. Meanwhile, in order to combine the key core 601 with the radio frequency head, the shape of the key core 601 is selected to be a coaxial cylinder, and the key core is decomposed according to the following scheme:
TABLE 19 comparative selection of key core scenarios
The linear milling groove has less loss to the magnet than the nonlinear milling groove, and finally, a cylindrical magnet stainless steel coaxial two-section key core with the linear milling groove is selected.
11. Selection of background module 8
For the selection of the background module 8, three schemes are proposed as follows:
TABLE 20 comparative selection of background protocols
12. Selection of display 402
For the selection of the display 402, two schemes are proposed as follows:
TABLE 21 comparative selection List for display 402 schema
Implementing one step: 125kRFID label
1. Designing RFID tag shapes
According to the requirement of the RFID tag to be matched with the lock cylinder 10 for use, the shape and the size unit of the RFID tag are designed as follows: mm is shown in fig. 3 and 4.
2. Carrying out the test experiment
And performing read-write comparison test on 50 RFID labels.
TABLE 22RFID test results
|
1 | 2 | 3 | 4 | … | 97 | 98 | 99 | 100 | Rate of |
1 | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | … | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | 100% |
2 | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | … | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | 100% |
3 | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | … | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | 100% |
… | … | … | … | … | … | … | … | … | … | 100% |
50 | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | … | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | 100% |
3. Effect inspection
The reading and writing accuracy rate of the RFID label is 100%, and the monthly standard reaches 99%.
The second implementation: stainless steel lock core 10
1. Design lock core 10 structure diagram
The shape and size of the lock cylinder 10 are designed according to the requirements of the structure of the lock cylinder 10, and the size unit is shown in fig. 5: mm.
2. Fabrication and testing
The design paper was handed to the Fujian workshop of the partner manufacturer for processing and fabrication, and the finished product was subjected to an external force test, the results of which are shown in the following table.
Meter 23 case external force impact resistance test
Impact quantity (kg) | 1 | 2 | 3 | 4 | … | 37 | 38 | 39 | 40 | 40 | 40 | 40 | 40 |
Test results | By passing | By passing | By passing | By passing | … | By passing | By passing | By passing | Failed through | Failed through | Failed through | Failed through | Failed through |
3. Effect inspection
The external force impact resistance of the lock cylinder shell is 39kg, and the target 30kg is achieved.
And (3) implementation: ultrasonic B magnetic lock core
1. Making and testing experiments
And processing and manufacturing the strong magnetic steel magnet according to a design drawing, and assembling the strong magnetic steel magnet with the lock cylinder shell 9 to complete a finished lock cylinder 10.
The magnetic force test was performed on the inner section of the finished product, and the results are shown in the following table.
Meter 24 lock core inner section magnetic force test
|
1 | 2 | 3 | 4 | … | 22 | 23 | 24 | 25 | 25 | 25 | 25 | 25 |
Test results | By passing | By passing | By passing | By passing | … | By passing | By passing | By passing | Failed through | Failed through | Failed through | Failed through | Failed through |
1. Effect inspection
The magnetic force of the inner section of the lock core magnetic force is 24N, and the target 20N is achieved.
And (4) implementation: key core 601
2. Design key core 601 structure diagram
The key core 601 is designed in shape and size according to the requirements of the key core 601 structure, and the size unit is as shown in fig. 6: mm.
3. Production and test experiments
The stainless steel and the strong magnetic steel magnet are processed and manufactured according to the design drawing, and the finished product is subjected to external force resistance and magnetic force test, and the results are shown in the following table.
Watch 25 key core external force impact resistance test
Impact quantity (kg) | 1 | 2 | 3 | 4 | … | 33 | 34 | 35 | 36 | 36 | 36 | 36 | 36 |
Test results | By passing | By passing | By passing | By passing | … | By passing | By passing | By passing | Failed through | Failed through | Failed through | Failed through | Failed through |
Watch 26 key core head magnetic force test
|
1 | 2 | 3 | 4 | … | 9 | 10 | 11 | 12 | 12 | 12 | 12 | 12 |
Test results | By passing | By passing | By passing | By passing | … | By passing | By passing | By passing | Failed through | Failed through | Failed through | Failed through | Failed through |
4. Effect inspection
The key core resists the impact of external force by 35kg and has the magnetic force of 12N, and the impact resistance reaches 30kg and the magnetic force reaches 10N.
And fifthly, implementation: resistive touch display screen 402
1. Testing resistive touch display screen 402
The display screen 402 is mounted on a test board for input/output testing, and the wiring is as shown in FIG. 7:
meter 27 resistance type touch display screen test meter
|
1 | 2 | 3 | 4 | … | 97 | 98 | 99 | 100 | Average |
Comparison of | 1 | 1 | 1 | 1 | … | 1 | 1 | 1 | 1 | 1 |
Description of the drawings: 1 is input and output consistent; 0 is different in input and output.
2. Effect inspection
The input and output contrast accuracy of the resistance-type touch display screen is 100%, and the target is achieved.
And sixthly, implementation: modem with a plurality of modems
1. Purchasing modem
Cellglong X12 LTE modem was used.
2. Functional testing
The modem is connected to the test board, 20 bit codes are sent to the modem each time, 100 times are sent, and the loss code rate test is carried out on the modem.
Table 28 modem test table
|
1 | 2 | 3 | 4 | … | 97 | 98 | 99 | 100 | Average |
Code loss rate | 0 | 0 | 0 | 0 | … | 0 | 0 | 0 | 0 | 0 |
3. Effect inspection
The modem loss code rate is 0 and the goal is achieved.
The implementation seven comprises the following steps: three stars S3C6410
Aiming at the design and debugging of a single chip microcomputer control system, a PDCA method is used for analyzing a process decision program
1. Writing program
A framework flowchart of the software is written, as shown in fig. 8, and the programming is performed.
2. Debugging test
The control logic accuracy is tested 100 times by using a testing instrument, a group of waveforms are input by using a digital signal generator, the functions of each output point are tested, and the test results are recorded and compared.
TABLE 29 test results
|
1 | 2 | … | 99 | 100 | Rate of |
1 | Accurate and accurate | Accurate and accurate | … | Accurate and accurate | Accurate and accurate | 100% |
2 | Accurate and accurate | Accurate and accurate | … | Accurate and accurate | Accurate and accurate | 100% |
3 | Accurate and accurate | Accurate and accurate | … | Accurate and accurate | Accurate and accurate | 100% |
… | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | 100% | |
11 | Accurate and accurate | Accurate and accurate | Accurate and accurate | Accurate and accurate | 100% | |
12 | Accurate and accurate | Accurate and accurate | … | Accurate and accurate | Accurate and accurate | 100% |
3. Effect inspection
The accuracy of the logic module 3 is 100% in cooperation with program logic control, and the target is achieved.
Eight implementation steps are as follows: assembling and debugging
1. Module assembly
The hand-held key portion is assembled.
2. Background program compiling
A framework flowchart of the background module 8 software is written, as shown in fig. 9, and programming is performed.
3. Functional testing
The base station performs a transceiving test on the hand-held key part, the background module 8 sets an information screen as shown in fig. 10, and the background module 8 inquires a key track screen as shown in fig. 11.
Watch 30 key function test meter
|
1 | 2 | 3 | 4 | … | 97 | 98 | 99 | 100 | Accuracy rate |
Signalling | Correction of | Correction of | Correction of | Correction of | … | Correction of | Correction of | Correction of | Correction of | 100% |
|
1 | 2 | 3 | 4 | … | 97 | 98 | 99 | 100 | Accuracy rate |
Collection of letters | Correction of | Correction of | Correction of | Correction of | … | Correction of | Correction of | Correction of | Correction of | 100% |
4. Effect inspection
The accuracy of the base station command executed by the key is 100%, and the target is realized.
For verification purposes, the lock cylinder 10 is replaced at 16 substations, the controllability one-key device is subjected to application tests by using opportunities of power failure maintenance and capital construction acceptance, and statistical results are shown in the following table.
Meter 31 controllability one-spoon device application test
Description of the drawings: if the key is found, the difference between the distance between the search result and the actual position is 0.
From the table, the self-developed controllable one-key entrance guard device can reliably realize the basic entrance guard functions and can be correctly opened and closed. The hand-held key realizes that the distance difference between the destination search result and the actual result of the key is 0 by combining three modes of opening and closing entrance guard information, positioning information and acousto-optic alarm. Can effectively look for handheld key go to, prevent that the entrance guard from not locking, prevent that handheld key from losing, prevent that personnel from not allowing to get into the hyperbaric chamber, prevent that personnel from mistake income live equipment interval, guarantee the safety of personnel and equipment in this respect. Can go to through the handheld key of location, borrow the position planning, look for the optimum position of borrowing, through the handheld key task of basic station download, improve the comprehensive availability factor of handheld key to guarantee the operation, overhaul and the timely orderly the going on of capital construction work, guarantee that the power supply is reliable.
Claims (9)
1. A controllable handheld key for disabling a key door is characterized by comprising a reading module (1), a communication module (2), a logic module (3), an alarm module (4), a positioning module (5), a driving module (6), a power supply module (7) and a background module (8),
reading module (1): an information code tag (11) for identifying a door lock;
communication module (2): the system is used for communicating between the hand-held key and the background module (8), and transmitting the opening and closing state information of the entrance guard, the positioning of the hand-held key and the task of opening and closing the door;
logic module (3): the device is used for receiving the input signal of the reading module (1), comparing the signal with the set door opening condition and outputting a corresponding control signal according to the comparison result;
alarm module (4): comprises a pointing element (401) and a display (402) for human-computer interaction;
positioning module (5): the device is used for reading and positioning and sending the reading and positioning to a background module (8);
drive module (6): the door opening and closing device comprises a key core (601) and a driving element (602), wherein the driving element (602) is used for driving the key core (601) to open and close the door;
power module (7): the power supply is used for supplying power to the handheld key;
background module (8): the door opening and closing system is used for issuing a door opening and closing task, and the scanning positioning module (5) obtains the destination result of the hand-held key and matches the hand-held key with the authorized entrance guard.
2. The controllable key door disable handheld key of claim 1, wherein said handheld key enables opening and closing of a door by:
step S1, if the base station has the hand-held key, the information that the hand-held key should open the door is set through the background module (8), and then the hand-held key is issued to the lender; if the base station has no handheld key, the scanning positioning module (5) displays a handheld key list, and selects a proper handheld key to send information for opening the door;
step S2, the hand-held key identifies the information code label (11) of the door lock through the reading module (1), and inputs the identification information into the logic module (3);
step S3, the logic module (3) receives the input signal of the reading module (1), calls the set door opening condition for comparison, and outputs a key releasing signal if the set door opening condition is met;
step S4, a driving element (602) reads a key to turn to drive a key core (601) to open the door, and the door opening state information of the door is sent to a background module (8) through a communication module (2);
and S5, returning the hand-held key when the lender does not close the door, setting the information that the door should be closed by the hand-held key by the base station through the background module (8), and returning the hand-held key after the lender is guided to return the door access control which should be closed by the display (402).
3. The controllable key door disabling handheld key of claim 2 wherein said step S5 includes the steps of:
s501, a background module (8) scans a positioning module (5) of the handheld key and loads the handheld key to a map;
step S502, the background module (8) reads historical use information of the lending time period and judges whether all doors are closed; if yes, executing step S507, otherwise executing step S503;
s503, the background module (8) sets a handheld key and sends the authorization information of the door to be closed to the corresponding handheld key;
step S504, the hand-held key reads the authorization information and matches the information of the door to be closed; if the matching is successful, executing the step S505, otherwise, alarming;
s505, the background module (8) is connected with a handheld key to send an authorized entrance guard number;
s506, a driving element (602) reads a key to turn to drive a key core (601) to close the door, and executes the step S502 after sending the door access closing state information to a background module (8) through a communication module (2);
and step S507, after the key is used, the background module (8) is connected with the key to detect whether the key responds, if so, the operation is finished, and if not, an alarm is given.
4. The controllable key door disable handheld key of claim 1, wherein the driving member (602) is driven by a stepping motor, and when all external members satisfy the unlocking condition, the stepping motor M2 is activated to send an activation signal to the stepping motor M2 to rotate the iron sheet to release the key core, so as to open or close the door with the handheld key.
5. The controllable key door disabling handheld key of claim 1, wherein the key core (601) employs a milled slot key core and the display (402) employs a resistive touch screen.
6. Controllable key door disable handheld key according to claim 1, characterized in that the reading module (1) employs ANT513 inductively coupled radio frequency.
7. A controllable key door disablement door lock, characterized by a lock cylinder housing (9), an information code tag (11) and a lock cylinder (10) matching the key cylinder (601) of any of claims 1-6.
8. The controllable key door disable door lock according to claim 7, wherein the lock cylinder (10) is a double structure super B-class magnetic lock, and the information code tag (11) is an RFID tag.
9. A controllable key gate inhibition device, comprising the controllable key gate inhibition handheld key of any one of claims 1 to 6, and further comprising the controllable key gate inhibition door lock of claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111623446.6A CN114333111B (en) | 2021-12-28 | 2021-12-28 | Controllable key access control, handheld key and door lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111623446.6A CN114333111B (en) | 2021-12-28 | 2021-12-28 | Controllable key access control, handheld key and door lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114333111A true CN114333111A (en) | 2022-04-12 |
CN114333111B CN114333111B (en) | 2024-08-23 |
Family
ID=81015702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111623446.6A Active CN114333111B (en) | 2021-12-28 | 2021-12-28 | Controllable key access control, handheld key and door lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114333111B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118116111A (en) * | 2024-03-04 | 2024-05-31 | 浙江钟铮锁业有限公司 | Technology for realizing linkage locking of lockset |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933086A (en) * | 1991-09-19 | 1999-08-03 | Schlage Lock Company | Remotely-operated self-contained electronic lock security system assembly |
CN202689700U (en) * | 2012-05-31 | 2013-01-23 | 烟台久环电子科技有限公司 | Remote intelligent key of cabinet |
CN203640415U (en) * | 2013-11-21 | 2014-06-11 | 成都威尔泰电力电子科技有限公司 | Electromagnetic intelligent identification key for magnetic control lock |
CN206071276U (en) * | 2016-09-07 | 2017-04-05 | 山东鲁能奥特科技有限公司 | A kind of Lock control system for transformer station |
CN107103669A (en) * | 2017-04-19 | 2017-08-29 | 宁波瑞奥物联技术股份有限公司 | A kind of Intelligent key and its control system |
CN207853565U (en) * | 2018-01-09 | 2018-09-11 | 国网江苏省电力有限公司检修分公司 | Bimodulus unlocks monitoring device and the anti-error management system of substation |
CN108879441A (en) * | 2018-06-21 | 2018-11-23 | 安徽柒海智能控制技术有限公司 | Substation inspection and grid switching operation system and its control method |
CN210353866U (en) * | 2019-05-27 | 2020-04-21 | 国网湖北省电力有限公司襄阳供电公司 | Intelligent misoperation-preventive locking key cabinet |
-
2021
- 2021-12-28 CN CN202111623446.6A patent/CN114333111B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5933086A (en) * | 1991-09-19 | 1999-08-03 | Schlage Lock Company | Remotely-operated self-contained electronic lock security system assembly |
CN202689700U (en) * | 2012-05-31 | 2013-01-23 | 烟台久环电子科技有限公司 | Remote intelligent key of cabinet |
CN203640415U (en) * | 2013-11-21 | 2014-06-11 | 成都威尔泰电力电子科技有限公司 | Electromagnetic intelligent identification key for magnetic control lock |
CN206071276U (en) * | 2016-09-07 | 2017-04-05 | 山东鲁能奥特科技有限公司 | A kind of Lock control system for transformer station |
CN107103669A (en) * | 2017-04-19 | 2017-08-29 | 宁波瑞奥物联技术股份有限公司 | A kind of Intelligent key and its control system |
CN207853565U (en) * | 2018-01-09 | 2018-09-11 | 国网江苏省电力有限公司检修分公司 | Bimodulus unlocks monitoring device and the anti-error management system of substation |
CN108879441A (en) * | 2018-06-21 | 2018-11-23 | 安徽柒海智能控制技术有限公司 | Substation inspection and grid switching operation system and its control method |
CN210353866U (en) * | 2019-05-27 | 2020-04-21 | 国网湖北省电力有限公司襄阳供电公司 | Intelligent misoperation-preventive locking key cabinet |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118116111A (en) * | 2024-03-04 | 2024-05-31 | 浙江钟铮锁业有限公司 | Technology for realizing linkage locking of lockset |
CN118116111B (en) * | 2024-03-04 | 2024-09-20 | 浙江钟铮锁业有限公司 | Technology for realizing linkage locking of lockset |
Also Published As
Publication number | Publication date |
---|---|
CN114333111B (en) | 2024-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8628010B2 (en) | Automatic remote acquisition system for determining the configuration of an installation | |
CN102568061B (en) | Method, system and device for achieving entrance guard control | |
CN104268973B (en) | Distribution station intelligent computer lock management system | |
CN103609136A (en) | Method for in-situ upgrading RFID readers | |
CN104732631A (en) | Intelligent fingerprint password anti-theft lock system | |
CN114333111A (en) | Controllable key access control, handheld key and door lock | |
CN205788363U (en) | A kind of multiple authentication Gate-ban Monitoring System of Home House | |
CN103366431A (en) | Management system and method for lockset of distribution network equipment | |
CN103793816A (en) | NFC equipment payment method and NFC equipment | |
CN102184474B (en) | RFID (Radio Frequency Identification Devices)-based control device and method for automatically accessing medical record | |
Ren et al. | Building materials management system based on RFID technology | |
Wang et al. | An office intelligent access control system based on RFID | |
CN202872777U (en) | Automobile gating system based on NFC technology | |
CN202976270U (en) | Novel substation lock control system | |
CN105868806B (en) | The secondary offering method and its system of electronic tag | |
CN102880821B (en) | Automatic safety protection and energy saving system and method for computer | |
CN205644603U (en) | Electronic tags formula safety tool detection device based on radio frequency technology | |
CN104794812A (en) | Card swiping system and managing method thereof | |
JP6508860B1 (en) | Add-on controller and control system | |
CN102041945B (en) | Method for improving safety and monitoring efficiency of financial warehouse | |
CN202758387U (en) | Engineering prototype tracking management system | |
CN112991591A (en) | Cabinet body lock, prevent multi-functional bracelet of mistake and multi-functional system of preventing mistake | |
CN204680096U (en) | A kind of card-punching system | |
CN204480361U (en) | Based on the electronics error prevention key of intelligent platform | |
CN104951910A (en) | Network-version intelligent electronic seal management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |