CN206601745U - Coded lock with communication capacity - Google Patents
Coded lock with communication capacity Download PDFInfo
- Publication number
- CN206601745U CN206601745U CN201720707361.9U CN201720707361U CN206601745U CN 206601745 U CN206601745 U CN 206601745U CN 201720707361 U CN201720707361 U CN 201720707361U CN 206601745 U CN206601745 U CN 206601745U
- Authority
- CN
- China
- Prior art keywords
- password
- coded lock
- interface
- communication
- interface data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The utility model is related to the coded lock and communication system of a kind of specific communication capacity.Coded lock includes lock body, communication interface, password generator, interface data maker, password comparator.When receiving the unlocking request of user, password generator produces random cipher, and interface data maker can issue user mobile phone according to the random cipher and coded lock identity information generation interface data, user mobile phone gives server parsing interface data and obtains password issues coded lock again;Coded lock compares the random cipher of oneself generation and receives the password of mobile phone, if identical, unlocks.The problem of password that the utility model solves similar shared bicycle is reused, passed from mouth to mouth, and improve Consumer's Experience.
Description
Technical field
The utility model is related to coded lock, the especially coded lock with communication capacity.
Background technology
At present, the bicycle operation enterprise of the similar class of shared bicycle one, the life given people brings facility.This kind of bicycle leads to
All it is often to be scanned by user using smart mobile phone after the Quick Response Code on bicycle, mobile phone obtains bicycle unlocking cipher, then user
Unlocked manually according to password.Ride and paid again by smart mobile phone after bicycle, wherein, it is the mobile phone payment that sets out that mobile phone, which obtains password,
Condition.However, the Quick Response Code and lock password of this kind of bicycle are fixed, it fact proved, only it is to be understood that a car password, that
The action for obtaining password is scanned without mobile phone, it is possible to reach the free purpose unlocked and cycled.Meanwhile, bicycle lock password
Easily it is cracked.These bike ridings that can cause not spend, private collection bicycle, to bicycle the immoral or even illegal row such as lock privately
To spread unchecked, also result in nobody and be ready to manage bicycle again, cause the life convenient of the people to fall back.
Utility model content
The problem of to solve to mention in background, the utility model provides a kind of coded lock for possessing communication capacity.
A kind of coded lock, including lock body;The coded lock also includes communication interface, password generator, interface data generation
Device, password comparator, the communication interface respectively with the password generator, the interface data maker, password ratio
It is electrically connected with compared between device, the password generator is also respectively between the password comparator and the interface data maker
It is electrically connected with, the lock body is electrically connected with the password comparator;Wherein, the communication interface, for logical with mobile terminal
Letter;The password generator, for producing random cipher when the coded lock is received unlocking request;The interface data life
Grow up to be a useful person, the random cipher and the identity information of the coded lock for being produced according to the password generator generate interface data,
The interface data be the coded lock by the communication interface so that mobile phone is resulted in;Password comparator, is used for
Compare the password obtained at password generator and the password obtained at communication interface, through comparing, when the two passwords are identical
When, lock body will be unlocked, and otherwise lock body keeps blocking;Wherein, the password obtained at communication interface is from described
The password of mobile terminal.
The communication interface supports idle port communication, and by communication information and the mobile terminal interaction data, interaction
Data include the unlocking request, the interface data and the password from mobile terminal.
The communication interface supports idle port communication, and by communication information and the mobile terminal interaction data, interaction
Data include the unlocking request and the password from mobile terminal;The communication interface further comprises a display screen
And a button;The interface data is Quick Response Code, when the button is by under case, the two dimension occurs on the display screen
Code.
When the coded lock receives the unlocking request of user, its password generator can produce random cipher, and interface data is given birth to
User mobile phone can be issued according to the random cipher and coded lock identity information generation interface data by growing up to be a useful person, and user mobile phone is interface number
Obtain password according to server parsing is given and issue coded lock again;Coded lock compares the random cipher of oneself generation and receives mobile phone
Password, if identical, unlock, otherwise do not unlock.
The utility model avoids password by disposable random cipher and is reused, and due to not needing user
It is that what can just complete to unlock and user can not generally identify password under normal circumstances to know password, so as to avoid unlocking close
Code pass from mouth to mouth.To sum up, problem present in background technology is all solved.In addition, the utility model is grasped with for user
It is very convenient to make, and experiences.
Brief description of the drawings
Fig. 1 is the utility model coded lock schematic diagram.
Fig. 2 is the operating diagram of the utility model coded lock.
Embodiment
As shown in Figure 1, the utility model coded lock 1 can be described as changing on the basis of existing electronic lock, induction lock etc.
Enter.Coded lock 1 mainly adds communication interface 11, password generator 12, interface data maker on the basis of existing lock body 15
13rd, password comparator 14.Wherein, communication interface 11 respectively with password generator 12, interface data maker 13, password comparator
It is electrically connected between 14;Password generator 12 also electrically connects between password comparator 14 and interface data maker 13 respectively
Connect;Lock body 15 is electrically connected with password comparator 14.
Communication interface 11, for the mobile communication with user so that user mobile phone can be controlled close by communication interface 11
Code lock 1 is unlocked.In the utility model, communication interface 11 provides two kinds of embodiments.Embodiment 1, communication interface 11 is supported to eat dishes without rice or wine to lead to
Letter, such as wireless LAN communication WLAN, the communication NFC that marches into the arena, as long as user mobile phone is close to it, (similar mobile phone card-brushing pays work(
Can), it just can realize that communication data is interacted between user mobile phone, so as to reach unlocking coded lock purpose.Embodiment 2, leads to
Letter interface 11 further comprises a display screen and a button on the basis of embodiment 1;When the user depresses the button, display screen
On will appear from a Quick Response Code;User scans Quick Response Code by mobile phone, so as to reach unlocking coded lock purpose.
Password generator 12, for producing random cipher.In the embodiment that the utility model is provided, password generator 12 can
With using known random number generator or PRNG etc., i.e. generated using random number generator or pseudo random number
The random number or pseudo random number of device generation are used as password.
Interface data maker 13, for the password and the identity information (example of coded lock 1 produced according to password generator 12
Such as, the numbering of coded lock 1, the date of production and/or colouring information etc.) generation interface data.Interface data can pass through the boundary that communicates
Outwards transmit or be displayed on communication interface 11 in face 11.In the embodiment that the utility model is provided, interface data maker 13
The interface data of generation can be a communication information, and the communication information is outwardly transmitted by communication interface 11;Interface data
The interface data that maker 13 is generated can also be a Quick Response Code, be displayed on communication interface 11.
Password comparator 14, the password obtained for comparing at password generator 12 and is obtained at communication interface 11
Password, through comparing, when the two passwords are identical, lock body 15 will be unlocked, and otherwise lock body 15 keeps blocking.
As shown in Fig. 2 during the work of the utility model coded lock 1, the mobile phone 2 and fortune of user is also needed in its working environment
The server 3 of battalion business is participated in.Detailed process is as follows, and the utility model provides two embodiments.
Embodiment one
In this embodiment, 11 need of the communication interface of coded lock 1 possess idle port communication ability.Specific work process step
It is as follows.
(1) unlocking request
User is with mobile phone 2 close to the communication interface 11 of coded lock 1, and now, mobile phone 2 will send one to communication interface 11 please
Seek the message of unlocking.In this embodiment, it is desirable to which mobile phone 2 need to support idle port communication.
(2) random cipher is generated
Coded lock 1 is received after user's request, and password generator 12 produces a random cipher.Such benefit is, often
The password produced after secondary user request is random, it is not easy to which being cracked it also avoid known password and be reused.
(3) interface data maker 13 and password comparator 14 obtain the password of the generation of password generator 12.
(4) interface data is generated
Password and the identity information generation interface of coded lock 1 that interface data maker 13 is produced according to password generator 12
Data are to communication interface 11.In the present embodiment, interface data is a communication information.Communication information is transmitted in eating dishes without rice or wine,
And the particular content that generally people can not be in Direct Recognition communication information, unless passed through special technological means.So, so that it may
To avoid password from being passed from mouth to mouth.
(5) communication information (interface data) is sent to mobile phone 2 by communication interface 11.
(6) mobile phone 2 issues the communication information received (interface data) server 3 of operator.In general, mobile phone 2
The identity information (for example, phone number or wechat number etc.) of itself can be issued server 3, such operator in the lump simultaneously
It is known that and collects bicycle usage charges to whom.The transmission means of interface data uses prior art.
(7) server 3 is received after the communication information (interface data) that mobile phone 2 is sent using the communication module 21 of oneself,
Using the parsing module 22 of oneself password is parsed from the communication information (interface data) received.
(8) password that the parsing module 22 of server 3 is parsed gives communication module 21.
(9) password is transferred to mobile phone 2 by server 3 by communication module 21.Transmission means uses prior art.
(10) password received at server 3 is transmitted the communication interface of (idle port communication) to coded lock 1 by mobile phone 2 again
11。
(11) password comparator 14 of coded lock 1 obtains the password in step (10).
(12) password comparator 14, compare two passwords, i.e. the password and step (3) described in comparison step (11) are described
Password.Through comparing, if two passwords are identical, lock body 15 will be unlocked, and otherwise lock body 15 keeps blocking.
So far, coded lock is opened, and user can be with use bicycle.
In addition, the security in order to further protect data transfer, can in above-mentioned steps (6) transport interface data,
Using encrypted transmission.So, server 3 will just have decryption capabilities accordingly.Encryption and decryption mode uses prior art.
In addition, the security in order to further protect data transfer, can be used when above-mentioned steps (9) transmit password
Encrypted transmission.So, mobile phone 2 will just have decryption capabilities accordingly.Encryption and decryption mode uses prior art.
In addition, the mobile phone in above-mentioned work process can also use other mobile terminals, such as Intelligent bracelet, flat board, intelligence
Energy wrist-watch etc..
It should be noted that the duration of the above-mentioned course of work is very of short duration, it is close to password in user mobile phone 2
Completed in this of short duration moment of communication interface 11 of lock 1.It is very convenient for user.
After bicycle is using finishing, user clicks on " returning the car " in mobile phone, and is again adjacent to mobile phone communication circle of coded lock 1
Face 11, then lock body 15 can be locked automatically, while the password of coded lock 1 can be emptied.When thering is user to use bicycle again next time, then
Repeat the above steps, then can use new password unlocking.
Embodiment two
Embodiment one requires higher for the power reservoir capacity of coded lock, in order to reduce electric power storage requirement, can use embodiment
Two.The main distinction of embodiment two and embodiment one is that communication interface 11 further comprises a display screen and a button.When
So, display screen and button can also be arranged on elsewhere.Accordingly, the separate step conversion in embodiment one is as follows, remaining
Step keeps constant:
(1) user asks
User presses the button of communication interface 11, represents to initiate request of unlocking.
(2) random cipher is generated
The password generator 12 of button actions trigger password lock 1 produces a random cipher.
(4) interface data is generated
Password and the identity information generation interface of coded lock 1 that interface data maker 13 is produced according to password generator 12
Data are to communication interface 11.In the present embodiment, interface data is a Quick Response Code.Usual people can not be in Direct Recognition Quick Response Code
The particular content implied, unless passed through special technological means.In this manner it is possible to avoid password from being passed from mouth to mouth.
(5) Quick Response Code (interface data) is shown on communication interface 11, and user scans Quick Response Code with mobile phone.
(6) mobile phone 2 issues 2 D code information (interface data) server 3 of operator.Mobile phone 2 can be simultaneously itself
Identity information (for example, phone number or wechat number etc.) issue server 3 in the lump.
(7) server 3 receives the 2 D code information (interface data) that mobile phone 2 is sent using the communication module 21 of oneself
Afterwards, password is parsed from the 2 D code information (interface data) received using the parsing module 22 of oneself.
To sum up, the utility model avoids the reuse of password by disposable random cipher, and by
In not needing user to know, password is that what can just complete to unlock and user can not generally identify password under normal circumstances, from
And avoid passing from mouth to mouth for unlocking cipher.In addition, the utility model is very convenient with being operated for user, experience.
Obviously, those skilled in the art can carry out various changes and modification without departing from this practicality to the utility model
New spirit and scope.So, if these modifications and variations of the present utility model belong to the utility model claim and
Within the scope of its equivalent technologies, then the utility model is also intended to comprising including these changes and modification.
Claims (3)
1. a kind of coded lock, including lock body, it is characterised in that:
The coded lock also includes communication interface, password generator, interface data maker, password comparator, communication circle
Face is electrically connected between the password generator, the interface data maker, the password comparator respectively, the password
Maker also respectively between the password comparator and the interface data maker be electrically connected with, the lock body with it is described close
Code comparator is electrically connected with;Wherein,
The communication interface, is used for and communication of mobile terminal;
The password generator, for producing random cipher when the coded lock is received unlocking request;
The interface data maker, for the random cipher and the identity of the coded lock produced according to the password generator
Information generate interface data, the interface data be the coded lock by the communication interface so that mobile phone is resulted in
's;
Password comparator, the password obtained for comparing at password generator and the password obtained at communication interface, through than
Compared with when the two passwords are identical, lock body will be unlocked, and otherwise lock body keeps blocking;Wherein, it is described to be obtained at communication interface
The password obtained is the password from the mobile terminal.
2. coded lock according to claim 1, it is characterised in that the communication interface supports idle port communication, and by logical
Believe message and the mobile terminal interaction data, interactive data include the unlocking request, the interface data and it is described come
From the password of mobile terminal.
3. coded lock according to claim 1, it is characterised in that the communication interface supports idle port communication, and by logical
Believe message and the mobile terminal interaction data, interactive data include the unlocking request and described from the close of mobile terminal
Code;The communication interface further comprises a display screen and a button;The interface data is Quick Response Code, when the button
During by under case, occurs the Quick Response Code on the display screen.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720707361.9U CN206601745U (en) | 2017-06-16 | 2017-06-16 | Coded lock with communication capacity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720707361.9U CN206601745U (en) | 2017-06-16 | 2017-06-16 | Coded lock with communication capacity |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206601745U true CN206601745U (en) | 2017-10-31 |
Family
ID=60144136
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720707361.9U Expired - Fee Related CN206601745U (en) | 2017-06-16 | 2017-06-16 | Coded lock with communication capacity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206601745U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107393061A (en) * | 2017-06-16 | 2017-11-24 | 汪钰涵 | Coded lock and communication system with communication capacity |
CN111739197A (en) * | 2020-04-24 | 2020-10-02 | 珠海汇金科技股份有限公司 | Lock unlocking method and system |
-
2017
- 2017-06-16 CN CN201720707361.9U patent/CN206601745U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107393061A (en) * | 2017-06-16 | 2017-11-24 | 汪钰涵 | Coded lock and communication system with communication capacity |
CN111739197A (en) * | 2020-04-24 | 2020-10-02 | 珠海汇金科技股份有限公司 | Lock unlocking method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107393061A (en) | Coded lock and communication system with communication capacity | |
CN104952135B (en) | A kind of intelligent terminal Light-control door lock system and application method | |
CN204833402U (en) | Two -dimensional code developments trick lock | |
US10148135B2 (en) | System, apparatus and method for authenticating a device using a wireless charger | |
CN109102607A (en) | Method for unlocking coded lock, system, equipment, coded lock and server | |
US8365268B2 (en) | Wireless communication system, wireless host, and wireless device | |
CN102936980A (en) | Method and device for controlling electronic lock | |
CN1142307A (en) | Secure radio personal communications system and method | |
CN104050742A (en) | Intelligent door and control method and system thereof | |
CN102970674A (en) | Method and system for achieving temporary dynamic authorization by utilizing near field communication (NFC) | |
CN206601745U (en) | Coded lock with communication capacity | |
CN107508619A (en) | Portable power source based on Bluetooth technology rents self-help serving system | |
CN107481361A (en) | A kind of electronics lock management method | |
CN103485604A (en) | One-time password electronic lock | |
CN102121335A (en) | Bluetooth electronic lock system based on random number unlocking | |
CN104021470B (en) | Wireless communication-based mobile payment system and mobile payment method | |
CN109472908A (en) | A kind of intelligence lock administration system and method | |
CN109872440A (en) | Mobile face identification intelligent lock control system and method | |
CN108198285A (en) | One kind is based on bluetooth closely automatic safe method for unlocking and system | |
CN105610792A (en) | Near-field communication mobile check-in system | |
CN103903044A (en) | Challenge response type dynamic password IC card with information and energy transmitted through radio frequency | |
CN207135115U (en) | A kind of wireless throwing screen emitter and system based on true random number key | |
CN202282043U (en) | Password locker system for dispersing and handover | |
CN104540238A (en) | Wireless communication method and device and intelligent card | |
CN207909222U (en) | Smart bluetooth is locked and smart bluetooth lock system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171031 Termination date: 20180616 |
|
CF01 | Termination of patent right due to non-payment of annual fee |