CN201297071Y - Electronic lock based on double identification of identity and password - Google Patents
Electronic lock based on double identification of identity and password Download PDFInfo
- Publication number
- CN201297071Y CN201297071Y CNU2008201409538U CN200820140953U CN201297071Y CN 201297071 Y CN201297071 Y CN 201297071Y CN U2008201409538 U CNU2008201409538 U CN U2008201409538U CN 200820140953 U CN200820140953 U CN 200820140953U CN 201297071 Y CN201297071 Y CN 201297071Y
- Authority
- CN
- China
- Prior art keywords
- lock body
- key
- lock
- control module
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The utility model relates to an electronic lock which is applied to the fields such as family, hotel, office, warehouse, and the like and based on the double identification of identity and password, which can improve the safety, flexibility, practicability and convenience of the electronic code lock, and adopts the technical proposal that the electronic lock consists of an electronic lock body and an electronic key, wherein both the lock body and the key body comprises a hardware and an embedded program code; the core of the hardware of the lock body is a lock body control module, and a keystroke of a human-computer interface module of the lock body is connected with the lock body control module through a signal separator element, and a display screen is connected with the lock body control module through a buffer driver, and all parts of the lock body are connected with each other through data signals with the lock body control module as the core; the core of the hardware of the key body is a key body control module, and a keystroke of a human-computer interface module of the key body is connected with the key body control module through a separator element; and relevant control program and identity password identification data are inputted into the lock body and the key body. Integrating the identity code and the password, the electronic lock is safe and reliable, and is convenient to use, and is flexible to expand, and is applicable to the modernized management.
Description
Technical field
The utility model relates to a kind of electronic lock based on identity and the dual identification of password that can be used for places such as family, hotel guest-room, office, storehouse, belongs to the electronic lock field.
Background technology
Lockset at present commonly used is divided into mechanical lock and electronic lock, and common cylinder lock has to carry simultaneously many keys in order to manage different places, very inconvenience, in case key loss appears, and stolen easily, and to unblank also be a very big problem; The mechanical code lock complex structure, and the control password is single, and password is revealed and is subjected to have things stolen; Present widely used electronic security(ELSEC) coded lock versatility is bad, and security performance is not enough, and it is dumb that cipher key uses, and lock ﹠ key pairing inconvenience is very inconvenient on to the unified management of control object; And no matter be that mechanical lock or present electronic lock are still waiting to improve on extended capability.
Summary of the invention
The purpose of this utility model is: in order to overcome the deficiency of present lockset, improve safety, the flexibility and practical and convenient of electronic password lock, a kind of electronic lock based on identity and the dual identification of password of special proposition.
The utility model adopts the controlling mechanism of key being carried out identity and the dual recognition mode of password based on lock, with information carrier and the processing unit of intelligent chip as lock ﹠ key, add a plurality of functional control modules, use integrated mask technique and Macintosh operation etc. as technical characterictic.The technical scheme that this technical problem that solves the utility model adopts is: a kind of electronic lock based on identity and the dual identification of password, form by electronic lock body and electron key, it is characterized in that: electronic lock body comprises lock body hardware and implants the program code of lock body that electron key comprises key body hardware and implants the program code of key body; The lock body hardware core is the lock body control module, the button of lock body human-machine interface module connects the lock body control module by signal isolator spare, display screen connects the lock body control module by cache driver spare, with the lock body control module is that the data signal line that core is passed through separately connects, signal isolator spare in the key interface module of lock body connects level processing apparatus and lock body control module, infrared receiver spare is connected on the level processing apparatus by signal amplifier spare, the lock body driver module directly is connected with the lock body control module by isolated amplifier spare, the command signal of lock body control module is converted to the execution action, the optional module of lock body is connected with the lock body control module by control circuit separately is independent, is that the data-signal circuit that core is passed through separately connects with the lock body control module; The key body hardware core is the key body control module, the button of key body human-machine interface module connects the key body control module by isolating device, the light emitting diode that directly connects key body by the key body control module, whether successful in order to prompting operation, status switch is connected to the key body control module by isolating device, and the key body sending module is connected to the key body control module by the key body infrared light-emitting diode; Implant corresponding control program and recognition data at lock body and key body.
The integrated circuit that the lock body control module adopts the integrated processor of mask technique, program storage, data storage and external interface buffering device to form; In the control program implant procedure memory, data such as password, identity code deposit in the data storage; The structural similarity of key body control module and lock body control module is only stored identity code in the data storage of key body, password is imported by the button of key body when unblanking temporarily.The button of lock body and key body adopts Macintosh, by a function key, 8 numerical keys of 1 ~ 8, adds a status switch and forms, and eight numerical keys are realized the input of 15 hexadecimal digits of 1-F; Status switch has Set (setting), Work (work), three states of Off (outage).The optional module of lock body is according to use occasion and customer requirements apolegamy, and the optional module of lock body comprises power management, acousto-optic hint module, standalone modules such as warning, video monitoring, network communication.
Another key of the present utility model is exactly a control program, and its core is the cipher mechanism of its identification and password judgement.Unlocking cipher is made up of the identity code of any digit and the interim password of arbitrarily long figure place.One or several user's of storage identity code and each self-corresponding password in the lock body control module, the corresponding identity code of storage in each user's key body, have only the correct key of use to input corresponding password and can obtain effective unlocking cipher, lock body receives this valid password and just can move to some extent, after obtaining the password of correct identification and mistake, the restriction of programming runin number of times; The control program of lock body and key body comprises reception by the data of human-machine interface module with input simultaneously, the own corresponding information of change; On software, carry out action according to customer requirements; The software design of lock body also comprises functional redundancy programs such as power management, communication, voice suggestion, video monitoring etc.
The beneficial effects of the utility model are: (1) identity code and password combination cryptosecurity, and lock receives only data, and key is not stored password, can guarantee that password is not leaked, so safe and reliable; (2) identity code is stored in the key, and each unlocking cipher input only needs the interim sign indicating number of input, and by the synthetic automatically unlocking cipher of key, easy to use, own bitting is convenient; (3) keys can be managed the lock of all the type, and key is easy to carry, gos out and can lock, and opening the door in doors then needs can open door by the correct password (this locks any one user's password) of button input; (4) stable and reliable operation, control panel is succinct, and volume is little, and (5) can add the module of more hommizations as required easily, and expansion is fit to modern management flexibly.
Description of drawings
Fig. 1 the utility model is based on the hardware configuration schematic diagram of the lock body of the electronic lock of identity and the dual identification of password
The hardware configuration schematic diagram of the key body of the electronic lock of the dual identification of Fig. 2 the utility model
The program flow diagram of the setting up procedure of the lock of the electronic lock of the dual identification of Fig. 3 the utility model
The process of the unblanking schematic diagram of the electronic lock of the dual identification of Fig. 4 the utility model
Among Fig. 1 and Fig. 2: 1. infrared ray receiver spare, 2. signal amplifier spare, 3. level processing apparatus, 4. signal isolator spare, 5. display screen, 6. cache driver spare, 7. lock body human-machine interface module, 8. status switch, 9. button, 10. isolating device, the optional module of 11. lock bodies, 12. video monitoring module, 13. network connection port, 14. the acousto-optic hint module, 15. isolated amplifier spares, 16. executing agencies, 17. lock body driver module, 18. the lock body control module, the key interface module of 19. lock bodies, 20. key body human-machine interface modules, 21. key body control module, 22. the key body infrared light-emitting diode, 23. key body sending modules, the light emitting diode of 24. key bodies.
Among Fig. 4: 25. input passwords, 26. confirm operation, 27. processors read the identity code processing of encoding, 28. identity code and password transmission, 29. clearing password, 30. identity code and password receive, 31. authentications, 32. password authentification, 33. unblank, 34. EOs.
The specific embodiment
In Fig. 1: lock body control module 18 is integrated circuits that adopt the integrated processor of mask technique, program storage, data storage and external interface buffering device to form, in the control program implant procedure memory, data such as password, identity code deposit in the data storage, the storage of realization program, identity code and password; The identification of identity and password; The reading that button is provided with, demonstration control, user's inquiry; The function control of the optional module 11 of lock body driver module 17 and lock body etc.; Button 9 in the lock body human-machine interface module 7 (button is made up of a function key, 8 numerical keys of 1-8, a status switch) is connected to lock body control module 18 by isolating device 10; Display screen 5 is connected to lock body control module 18 by cache driver 6; Status switch 8 is connected to lock body control module 18 by isolating device 10 in addition; Signal isolator spare 4 in the key interface module 19 of lock body links together level processing apparatus 3 and lock body control module 18, and infrared receiver spare 1 is connected to level processing apparatus 3 by signal amplifier 2; Lock body driver module 17 directly is connected with lock body control module 18 by amplifying isolating device 15, and isolated amplifier spare 15 outputs are with executing agency's 16 connections, the command signal of lock body control module 18 is converted to execution moves.The optional module 11 of lock body is according to the module of user's request apolegamy, comprises power management, network communication, sound and light alarm, function such as video monitoring, voice suggestion, according to use occasion and customer requirements apolegamy, they are connected with lock body control module 18 by control circuit separately is independent.Can link subzone network and building system and realize unified monitoring.Power management is mainly finished the powerup issue of system, and unexpected open the door and the runin number of times surpasses the functions such as onsite alarming of carrying out for 3 times appears in sound and light alarm, and voice suggestion mainly is user-friendly etc.
Among Fig. 2: key body control module 21 is identical with lock body control module 18 structures, but only stores identity code in the data storage of key body; Button 9 in the human-machine interface module 20 of key body (button is made up of a function key, 8 numerical keys of 1-8, a status switch) is connected to key body control module 21 by isolating device 10; And directly connect the Light-Emitting Diode 24 of key body by key body control module 21, whether success of prompting operation simultaneously; Status switch 8 is connected to lock body control module 18 by isolating device 10; Key body sending module 23 is connected to key body control module 21 by level processing apparatus 3, and level processing apparatus 3 outputs connect infrared light-emitting diode 22.Key body control module 21 reads user's data information in the key body human-machine interface module 20, judges customer requirements, carries out the modification of data and the transmission of data, in the time of sending data data is outputed to key body sending module 23 and sends.
The setting of key: need identity code be set on the key, after loading onto button cell on the key and powering on, status switch 8 placed the position is set, key body control module 21 such as begins at the original identity code of button 9 inputs to be read (Default Value unified and notify user) on manual, after the original identity code of input regulation, the individual palpation function key, if key body light emitting diode 24 flicker 3 following tables continuously is correct, the individual palpation function key just can be stored after keying in oneself identity code, status key is placed " Off " or " Work ".Same key can only be provided with an identity code.
Illustrated to be locked in the routine processes flow process of carrying out the setting operation process in Fig. 3, comprised the identification of beginning, password judges that the judgement of user class is to each user's contents such as operation.Its setting up procedure is as follows:
To what lock was provided with domestic consumer and advanced level user's (having and have only a senior general family when dispatching from the factory) arranged, domestic consumer can only check three information of user name, identity code, password of oneself, modification and deletion action; Advanced level user can check all users' address name, can carry out deletion action to pairing all information of this name, can check, revise identity code and the password of oneself, can not check and revise other user's status sign indicating number and password.
After advanced level user powers on, status switch 8 placed the position is set, begin to show the cursor of beating on the display screen 5, input advanced level user identity code, the function key in the individual palpation button 9 is confirmed, by then inputing the password of respective identity sign indicating number, function key in the individual palpation button 9 is confirmed, by after can input user name and search, find user name after, longly delete this user by function key; If what find is advanced level user itself, then can be according to inputing user name---function key in the individual palpation button 9 confirms, and---display screen 5 shows identity code, and------function key in the individual palpation button 9 confirms that the step of---display screen 5 display passwords---input new password checks and revise, but can not delete this user to import new identity code; If directly key in a new user name, the function key in the individual palpation button 9 is just stored an empty key that user name is arranged for twice to (newly-built user), and newly user's identity code and password are set by the user, and the family is unavailable using instead when setting.
Domestic consumer places status switch 8 position is set, begin to show the cursor of beating on the display screen 5, if new user, directly input after the user name function key in the individual palpation button 9 and confirm that if existing identity code and password will be imported the user identity sign indicating number, the function key 9 in the individual palpation button 9 is confirmed, by then inputing the password of respective identity sign indicating number, function key in the individual palpation button 9 is confirmed, just shows this user name then, and length is deleted this user by function key; Function key in the individual palpation button 9 is confirmed, display screen 5 shows that (newly-built user is empty to identity code, rarely seen cursor flashes)------step of the function key in the individual palpation button 9 is confirmed---showing 5 display password identity code (newly-built user is for empty, and rarely seen cursor flashes) frequently---input new passwords (do not change omission and change the step) is checked and is revised according to the new identity code of input (do not change omit change step).
Fig. 4 schematic representation the process of once unblanking carry out step.Open the lock with the key operation as shown in Figure 4, the user inputs password 25, confirm operation 26 then, the processor of key reads identity code and is processed into unlocking cipher 27, send 29 by identity code and password transmission 28 unlocking cipher after with identity code and Cipher Processing, meanwhile the module of accepting of lock accepts to handle decoding and buffer memory 30 with signal, to authentication 31, search, whether see this user, if no user then this time finishes, there is this user to carry out password authentification 32,, also counts if the password mistake then finishes 34 if password correctly then drives unlocking mechanism and unblanks 33, if this user bad password occurs continuous at short notice three times, then in one hour, stop this user's unlocking authority.Key is removed password at every turn automatically after unlocking action.
In use, realize the operation of a user to this lock, must guarantee that the identity code of this user's key is identical with the identity code of this lock respective user, promptly this user have identical identity code in all locking.For same user, different locks can adopt different password setting.
Lock operation, the same with the ordinary electronic lock, the action of locking a door is finished automatically by lock body, promptly closes and realize latching operation, according to the mode difference that use occasion is opened, is the example explanation here to lock a door, and can open the door by handle in doors; Closing behind the door with the user as if any, directly just realizing the counter-locking a door action by function key by any numerical key in the inoperation button 9.Lock the password that all needs key to input this key correspondence outside the back door and just can open, needing to import any one user cipher within doors could open the door by handle.
According to circumstances can select different communication modes.If for the high place of security requirement, can select to adopt the mode of wire transmission password to prevent that password from passing through infrared leakage.Can adopt infrared rays to carry out the wireless transmission password for general occasion, use very conveniently, and certain orientation be arranged, be difficult for taking place password leakage.
Claims (4)
1, a kind of electronic lock based on identity and the dual identification of password, form by electronic lock body and electron key, it is characterized in that: electronic lock body comprises lock body hardware and implants the program code of lock body that electron key comprises key body hardware and implants the program code of key body; The main core of lock body hardware is lock body control module (18), the optional module of lock body (11), lock body driver module (17); Button (9) in the lock body human-machine interface module (7) is connected to lock body control module (18) by isolating device (10), status switch (8) is connected to lock body control module (18) by isolating device (10), signal isolator spare (4) in the key interface module (19) of lock body links together level processing apparatus (3) and lock body control module (18), infrared receiver spare (1) is connected on the level processing apparatus (3) by signal amplifier spare (2), lock body driver module (17) is connected by the same executing agency of isolated amplifier spare (15) output (16), and the optional module of lock body (11) is connected with lock body control module (18) by control circuit separately is independent; The main core of key body hardware components is key body control module (21), button (9) in the key body human-machine interface module (20) connects on the key body control module (21) by isolating device (10), the light emitting diode (24) that directly connects key body by key body control module (21), status switch (8) is connected to key body control module (21) by isolating device (10), key body sending module (23) is connected to key body control module (21) by key body infrared light-emitting diode (22), and key body infrared light-emitting diode (22) passes to signal the infrared receiver spare (1) of lock body; In lock body and key body, implant corresponding control programs and recognition data.
2, electronic lock according to claim 1 is characterized in that: lock body control module (18) is the integrated circuit that employing mask technique integrated processor, program storage, data storage and external interface buffering device are formed; In the control program implant procedure memory, password, identity code data deposit in the data storage; The structural similarity of key body control module (21) and lock body control module (18) is deposited one group of identity code and corresponding password at least, but is only deposited an identity code in the data storage in any one key body in the data storage in lock body.
3, electronic lock according to claim 1 is characterized in that: button (9) adopts Macintosh, by 8 numerical keys of a function key, 1-8, adds a status switch and forms, and 8 numerical keys are realized the input of 15 hexadecimal digits of 1-F.
4. electronic password lock according to claim 1, it is characterized in that: the optional module of lock body (11) is according to use occasion and customer requirements apolegamy, and the optional module of lock body (11) comprises the standalone module of power management, acousto-optic hint module (14), network connection port (13), video monitoring module (12).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2008201409538U CN201297071Y (en) | 2008-10-21 | 2008-10-21 | Electronic lock based on double identification of identity and password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2008201409538U CN201297071Y (en) | 2008-10-21 | 2008-10-21 | Electronic lock based on double identification of identity and password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN201297071Y true CN201297071Y (en) | 2009-08-26 |
Family
ID=41043049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNU2008201409538U Expired - Fee Related CN201297071Y (en) | 2008-10-21 | 2008-10-21 | Electronic lock based on double identification of identity and password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN201297071Y (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101736940B (en) * | 2010-01-25 | 2012-03-14 | 方荣光 | Key of optical coded lock |
CN103498598A (en) * | 2013-09-04 | 2014-01-08 | 苏州荣越网络技术有限公司 | Electronic lock system |
CN101886513B (en) * | 2009-05-11 | 2014-12-17 | 重庆桓浩科技发展有限公司 | Intelligent security door system |
CN107178258A (en) * | 2017-06-26 | 2017-09-19 | 西北民族大学 | The electronic lock of view-based access control model password principle |
-
2008
- 2008-10-21 CN CNU2008201409538U patent/CN201297071Y/en not_active Expired - Fee Related
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101886513B (en) * | 2009-05-11 | 2014-12-17 | 重庆桓浩科技发展有限公司 | Intelligent security door system |
CN101736940B (en) * | 2010-01-25 | 2012-03-14 | 方荣光 | Key of optical coded lock |
CN103498598A (en) * | 2013-09-04 | 2014-01-08 | 苏州荣越网络技术有限公司 | Electronic lock system |
CN107178258A (en) * | 2017-06-26 | 2017-09-19 | 西北民族大学 | The electronic lock of view-based access control model password principle |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104464038A (en) | Theft-proof wireless infrared remote control electronic coded lock | |
CN203490747U (en) | Multidirectional intelligent access control system | |
CN103186933A (en) | Operation method of electronic lock | |
CN201297071Y (en) | Electronic lock based on double identification of identity and password | |
CN207568353U (en) | There are many smart locks of unlocking mode for a kind of band | |
CN102610009A (en) | Multi-user management access control system | |
CN202453982U (en) | Network control system based on internet-of-things technology of fingerprint security burglarproof door | |
CN105421934A (en) | Network intelligent fingerprint safe case | |
CN205845134U (en) | A kind of smart lock | |
CN105608779A (en) | Electronic code lock system | |
CN1744641B (en) | Mobile communication terminal based locking method and system | |
CN103590670B (en) | The electronic apparatus of the control system of electronic lock, light-operated electronic lock and control electronic lock | |
CN202164889U (en) | Electronic coded lock | |
CN103617661B (en) | Wireless unlocking system and method for unlocking thereof | |
CN101994432A (en) | Code lock system and using method thereof | |
CN201311670Y (en) | Telecommunication control electronic lock | |
CN201451836U (en) | Key management box | |
CN202976286U (en) | IC (Integrated Circuit) fingerprint lock | |
CN105649469B (en) | A kind of intelligent safe Double-puzzle control system | |
CN106157411A (en) | A kind of electronic password lock | |
CN203849792U (en) | Optically-controlled password lock for mobile phone | |
CN203366413U (en) | Intelligent lock | |
CN203684830U (en) | Dual-system remote control alarm anti-theft lock | |
CN204423471U (en) | A kind of monolithic processor controlled electronic password lock | |
CN104835235A (en) | Anti-theft wireless infrared remotely-controllable electronic code lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090826 Termination date: 20121021 |