Summary of the invention
The utility model is at existing electronic lock and the existing defective of intelligence lock, it is more simple with circuit structure to design a mechanism, the lockset of processing ease can discern whom the person of unblanking is when unblanking, non-permission person is unblanked to carry out audible warning sound so that functions such as warnings.
The technical scheme that the utility model adopted is: intelligent lock capable of recognizing ID of key, comprise key, lock body, lock core and be located at the interior monolithic processor control system of lock body, it is characterized in that being provided with in the key storage chip V4 of storage user identification cipher and the power supply and the clock circuit polyphone interface of storage chip V4 periphery; Be provided with the storage chip V2 and the cpu monitor chip V1 of storage user identity check and correction sign indicating number in the lock body, the RST end of storage chip V2 is in parallel with the RST end of cpu monitor chip V1; Be provided with the solenoid and the magnetic bullet that can move up and down in solenoid in the lock body, cpu monitor chip V1 is connected with solenoid in being located at lock body by power supply and the clock circuit interface of contacting.
Mentality of designing of the present utility model and the concrete constructional device of implementing, the common habits and customs that both kept people to lock a door, unblank with key, key cipher and identity code have been increased again, key cipher has provided the rights and interests that can key unblank, identity code has provided the range of rights and interests of holding the key people: hold owner's key person and can delete or increase the use key, hold and to notify owner after old man or child's key person unblank, make owner relieved, holding normal key person can only lock a door or unblank, and has improved the security of key.The person can not carry out audible warning sound to illegally unblanking, illegally unblank to exceed schedule time or illegally open the door, improper key opens the door and illegally open a window under the situation of setting up defences of locking a door etc., intelligent lock can be by phone with the advisory units concerned and the owner of taking place.
The beneficial effects of the utility model: at first be the crypto chip circuit of having simplified in the key, with independently feed circuit, clock circuit and data-interface simplification were combined separately originally, by the electric pulse power supply, magnetic bullet is reset to gravity and automatically resets, and does not need to add in addition power supply.Cipher key designs simplification, good reliability, volume are urinated in carrying.Be by identification again to the person of unblanking, it is most important that the person that illegally do not unblank is controlled in strictness, by the telecommunication circuit in the lock body and owner or safety guard department circular, increase at home or the sense of security of owner outside the time, the existing anti-theft alarm lock of this multi-functional texture ratio advances many again.
Figure 1 shows that monolithic processor control system control signal flow down to the mechanical action process, sketch 26S Proteasome Structure and Function of each part below in conjunction with Fig. 2, Fig. 3 and Fig. 4.Monolithic processor control system comprises read data and key unlocking supervisory circuit 3, microcomputer monitoring circuit 4, testing circuit 8 and the telecommunication circuit 9 of opening the door of locking a door; The input end of microcomputer monitoring circuit 4 inserts read data and key unlocking supervisory circuit 3 and the testing circuit 8 that opens the door of locking a door, the output terminated communications circuit 9 of microcomputer monitoring circuit 4 and the input end of read data and key unlocking supervisory circuit 3.
Power supply in the Intelligent key 1 and clock circuit polyphone interface are shown in the dotted line among Fig. 2, carry the identification cipher of this key and storage chip V4 and its peripheral diode D3 of other necessary passwords by prior storage, capacitor C 1 and resistance R 4, R5, R6 forms, resistance R 4 is connected on RST and the GND end of chip V4, capacitor C 1 is connected on VCC and the GND end of chip V4, resistance R 5, R6 links to each other with the D0 end with the CLK of chip V4 respectively, the other end also connects the positive pole of diode D3, and the CLK end of chip V4 is connected to form the interface of contacting with lock core by the VCC end of resistance R 5 and diode D3 and V4.It has only one group of contact to contact with the chip V3 of CPU control, insert the power supply anode of storage chip V4 by the back of connecting with diode D3, this power supply is to rely on the conducting formation pulse voltage of V3 control G1 to provide DC voltage through D3 rectification C1 filtering to V4, this pulse voltage directly is connected with the CLK clock end of V4 simultaneously, triggers V4 work.This key cipher chip circuit is simple in structure, element is few, working stability is reliable.
Lock core 2 partly is the keyhole 13 for Intelligent key 1 reeve as shown in Fig. 3 and Fig. 4, when it injects at key 1, data contact 15,22 is connected, and the key unlocking signal is provided, and CPU control V3 makes G1, G2 conducting, V4, L1 are given in the G1 conducting power supply, read key data, and compare with the V2 key data, relatively more consistent, stop power supply, magnetic bullet 7 falls to allowing to unblank; The G2 conducting provides current path to L1, makes solenoid produce the action of a magnetic field in magnetic bullet 7, and magnetic bullet rises and forbids unblanking.
Read data and key unlocking supervisory circuit 3 are by storage chip V2, light emitting diode X1, X2, resistance R 1, R2 and R3 form, insert the VCC pin of storage chip V2 after light emitting diode X1, X2 connect with resistance R 1, R2 respectively, and be connected with the RST pin of storage chip V2 by resistance R 3.
Microcomputer monitoring circuit 4 is by cpu chip V1, storage chip V2, solenoid L1, light emitting diode X1 and X2, resistance R 1, R2 and R3 form, after connecting with resistance R 1, R2 respectively, light emitting diode X1, X2 insert the VCC pin of storage chip V2, be in parallel by resistance R 3 and the RST end of storage chip V2 and the RST end of cpu monitor chip V1, cpu monitor chip V1 is connected with solenoid L1 by feed circuit 5.Wherein storage chip V2 stores the key based identity encrypted message and locks a door and set up defences and the information of withdrawing a garrison of normally unblanking.X1, R1 and X2, R2 are respectively the user and provide and set up defences, withdraw a garrison and discern the key display message, and single-chip microcomputer being set up defences according to locking a door and normally unblanking to withdraw a garrison control communication chip V5 work.
Telecommunication circuit 9 is made up of communication chip V5, and the various information that it is illegally unblanked under the signal and the state of setting up defences of locking a door are set up defences, withdrawn a garrison in transmission under the singlechip CPU chip controls are to owner or Surveillance center.
The electromagnetic coil circuit 6 that the control magnetic bullet moves up and down is made up of solenoid L1 and triode G1, G2,01 pin connection triode G1 by chip V3 is connected to form electric loop by solenoid L1 is connected back and chip V3 with triode G2 02 pin, solenoid is generated an electromagnetic field, magnetic bullet 7 is moved up and down in coil 6, when the loop cuts off the power supply, magnetic field disappears, and magnetic bullet freely falls.
Coil power supply circuit 5 is made up of chip V3 and triode G1.
Foregoing circuit in Fig. 2 in the dotted line for to be located at the shank of key; All being located at lock body is installed in the door by housing, generally having only lock core to expose with Key unblanks, Fig. 3 right-hand part generally is located in the door, be key and lock core connection status, be located at contact 22 on the shank of the key when contact 15 on the lock core contacts, formation electrically contacts the loop, finishes the process that key cipher is read in CPU control.The left side of Fig. 3 is the lock core phantom view, generally be located at outdoors, comprise lock housing or outer toroid 11, lock core 2, keyhole 13, the front end of lock core below is conventional mechanical billiard 14,17, spring 21 and end socket 20, the rear end of lock core below is electromagnetic lock core segment of the present utility model, comprises magnetic bullet 7, solenoid 6 and coil former 10, the coil former 10 outer solenoids 6 that twine, magnetic bullet 7 is located in the tube chamber of coil former 10.
Fig. 4-a and 4-b agree respectively or the structural representation of the two states of forbidding unblanking.Lock core 2 upper ends are connected with concentric outer toroid 11, lock core 2 belows communicate with magnetic bullet tube chamber 16, establish keyhole 13 in the middle of the lock core 2, be provided with magnetic bullet through hole 18 between outer toroid 11 and the magnetic bullet tube chamber 16, lock core 2 is a spring groove mouth 12 with outer toroid 11 lower ends.Establish electromagnetic induction coil L1 on the chamber wall of tube chamber 16, magnetic bullet 7 moves up and down along the tube chamber and the magnetic bullet through hole 16 of coil former 10.The magnetic field that produces when solenoid L1 energising moves up magnetic bullet 7, and stretch out magnetic bullet through hole 18, withstand on the below of lock core 2, stop lock core 2 to move, magnetic field diminishes when solenoid L1 dead electricity, slide to pellet shot from a slingshot tube chamber 16 bottoms under magnetic bullet 7 gravitates, key 1 rotating band movable lock core in keyhole 13 is done clockwise or anticlockwise mobile arbitrarily.If without electromagnetic lock partly, or electric weight is when not enough, and the mechanical billiard of lock core still does as usual, and it only is uses the same with the standard machinery spring lock of effect of mechanical cylinder lock.
Below in conjunction with accompanying drawing 1～4 summary various duties of the present utility model.
Under door opening state, single-chip microcomputer has detected key and has inserted lock core, with to read key cipher the same, read the key based identity sign indicating number earlier, owner's key flashes to point out whether key is discerned by X1 in this way, in regulation is flashed number of times, lock a door, promptly with other keys lock a door (X1 does not dodge) the same.Send V2 to preserve the information of locking a door of K1, D1 and K2, D2 prompting, and control V5 and send out the information of setting up defences of locking a door to family security protection center, the X2 demonstration is locked a door and is set up defences.Stipulate to flash in the number of times not lock a door as insert the back at owner's key, be that X2 flashes the identification of demonstration permission key, at this moment insert another key, before will deleting, stores by single-chip microcomputer all key ciphers, and store new key cipher to V2, guarantee the key that has at least 2 to discern, can unblank, simultaneously, the person's that stipulated to hold the key range of rights and interests prevents from will to discern key and the adverse consequences brought.
Under the state of locking a door, single-chip microcomputer detects has key to insert lock core, and control V3, G1 give the crypto chip discontinuous power supply, and power supply interrupted formed a time clock, provides clock signal to crypto chip.Crypto chip will be stored password and send V3 by data contact under the clock effect, send single-chip microcomputer to read behind the V3 filter shape.After single-chip microcomputer reads key based identity and password, deposited password with V2 and compared, relatively more consistent, stop to the crypto chip power supply, the electronics pellet shot from a slingshot allows to unblank because of gravity fall.Single-chip microcomputer will normally unblank to withdraw a garrison and the person's of unblanking identification signal sends to family security protection center by the V5 communication module, if old man or child unblank, family security protection center signals to owner according to setting; Password is more inconsistent, and Single-chip Controlling G2 work makes feed circuit pass through L1, G2 and forms path, and coil L1 produces magnetic field, and magnetic bullet rises under the action of a magnetic field, forbids unblanking.The single-chip microcomputer illegally information of unblanking is dealt into family security protection center, and relevant department and owner are told in the family security protection center illegally information of unblanking.
Under the state of locking a door, single-chip microcomputer detects under the non-key unlocking situation and door is opened (opening the door by force), and single-chip microcomputer sends and illegally opens the door information to family security protection center, and owner and relevant department are told in the family security protection center illegally information of opening the door.
Electronics pellet shot from a slingshot coil L1 is installed in by the lock core mechanical billiard, and is simple in structure with the common power supply of key cipher chip and be connected in series use, also reduced power consumption.Reset (the allowing to unblank) of electronics pellet shot from a slingshot adopts gravity fall to automatically reset, and do not need automatically controlled reset circuit.Like this, even under intelligence lock dead electricity or single-chip microcomputer situation out of control, still can unblank, guaranteed the reliability of unblanking.
Intelligence lock family security protection center provides to lock a door sets up defences and normally unblanks the information of withdrawing a garrison, and family security protection center is according to setting up defences and withdraw a garrison information, and decision allows or do not allow to window.If under the state of setting up defences, the information of windowing is received in the security protection center by family, and relevant department and owner are told in the family security protection center illegally information of windowing.