Invention content
It is insufficient according to prior art, it inventors herein proposes a kind of new thinking and scheme and realizes based on active security protection
Door lock method for controlling opening and closing and control system are allowed to not only simple but also intelligence are handy, and specific design is as follows:
1. abandoning the complex logics operation method such as the time of the prior art, threshold value, we focus on concern on the door
Lock operation behavior itself, i.e., whether someone implements unlocking to door lock, destroys or do not close in time the action behavior of door leaf itself, and
Whether there are motive objects close to door lock or rests on door leaf side or their move mode, track and the length of residence time
How then and not emphasis considers, is managing in logic, is mainly taking it with the presence or absence of this logic parameter of motive objects;For connecing
Nearly door lock but do not implement the action of abnormal start-up door lock motive objects can by routine monitoring and record the motive objects information but
The unnecessary burden of the management means and then increase door lock administrator that need not centainly use alarm etc. excessively fierce.
2. it is not the very big channel of the stream of people in view of door lock is mainly used for indoor or gate, from the angle of hardware itself
Investigative range is rationally arranged in degree(Such as 0.2 to 2 meters)On the basis of, will appear in any movement in investigative range people or
Object is recorded without complicated logic judgment and operation but directly preservation without excessively paying close attention to its running orbit mode
And can be further and for future reference by feedback signal upload network, for abnormal unlocking, damage lock or the behavior for being not turned off door leaf
Be uploaded to alarm when appearance, send out prompt message etc..People to any movement or object in this way are realized close to door lock and begin to reality
Security protection measure is applied, time dead angle is not stayed and manages the complex logic judgement for simply eliminating the prior art and algorithm such as threshold value
Setting and time setting, control accuracy is high.
3. the mode that the normal management order for destroying door lock is got in is various, wherein mainly unlock including violence,
Seize household's unlocking and skilled unlocking on both sides by the arms(Unlocking master-hand is not by key but technical method is used to unlock), for this to these types
Unlocking mode, which gives management and control not only, can improve the recourse property of dual lock mode, monitoring property but also also comply with modern intelligence life
Demand living.
4. the action unlocked for operation gives the monitoring of various dimensions for example to sound, image, the pickup of fingerprint and note
Record, and this content can also realize real-time Transmission and record, can thus further increase to using door lock to get in people
The recourse property of member.
According to above-mentioned technological thought, the present invention proposes a kind of door lock method for controlling opening and closing based on active security protection, the door
Lock includes central controller, Moving Target Exploitation device, unlocking instruction pick device, photographic device, wireless networked device and locking
Control mechanism, the Moving Target Exploitation device is for emission detection signal and can receive the spy locked the object in the external space and reflected
It surveys signal and the central controller, the unlocking will be sent to the feedback signal corresponding to the reflected probe signal that is received
Instruction pick device is used to pick up unlocking instruction and send unlocking signal corresponding with unlocking instruction to the central controller,
The photographic device is imaged for outer scene on the door and sends the photo absorbed or image to the central controller,
The wireless networked device realizes information exchange for allowing between the central controller and external network, the locking control machine
Structure under the control of the central controller for that can allow the door lock that can unlock;It is characterized in that using side control as follows
Method:
Step 1, startup power supply allows the door lock to enter detecting state;
Step 2, on the basis of step 1, the detection model of Moving Target Exploitation device as described in having enter into determining motive objects
It encloses but motive objects has been moved off the investigative range of the Moving Target Exploitation device and packet is not carried out in the first time period of setting
Any trigger action for triggering the unlocking instruction pick device is included, detecting state is maintained;
Step 3, on the basis of step 1, the detection model of Moving Target Exploitation device as described in having enter into determining motive objects
It encloses but motive objects does not leave the investigative range of the Moving Target Exploitation device and implement normal in the first time period of setting
Unlocking action, then start the photographic device and image;If the central controller verification belongs to authorization unlocking and refers at this time
After enabling then open-and-close control mechanism, the locking control mechanism open, detecting state is returned to;
Step 4, on the basis of step 1, the detection model of Moving Target Exploitation device as described in having enter into determining motive objects
It encloses but motive objects does not leave the investigative range of the Moving Target Exploitation device but and are not carried out in the first time period of setting
Include any trigger action of the triggering unlocking instruction pick device, then the second time period of the setting after first time period
It is interior to start the photographic device;
Step 5, on the basis of step 4, if motive objects and be not carried out including described in triggering in the second time period
Any trigger action of unlocking instruction pick device and the investigative range for leaving the Moving Target Exploitation device then return to detecting
State;
Step 6, on the basis of step 4, if motive objects do not leave the mobile target in the second time period
The investigative range of detector simultaneously implements normal unlocking action, then the photographic device camera shooting;The central controller is such as at this time
Fruit verification belongs to authorization unlocking instruction and then opens the locking control mechanism, after the locking control mechanism is opened, back to detecing
Survey state;
Step 7, on the basis of step 4, if motive objects do not leave the mobile target in the second time period
The investigative range of detector but and be not carried out include the triggering unlocking instruction pick device any trigger action, this second
The photographic device starts to image after period;
Step 8, on the basis of step 7, if just implement normal unlocking action after the second time period, and should
Unlocking action is later than the time of the started camera shooting of photographic device described in step 7, then is again started up the photographic device and images;
The central controller opens the locking control mechanism, the locking control if verification belongs to authorization unlocking instruction at this time
After mechanism is opened, detecting state is returned to;
Step 9, on the basis of step 7, if motive objects do not leave the mobile target after the second time period
The investigative range of detector but always and be not carried out include the triggering unlocking instruction pick device any trigger action, then exist
After the photographic device camera shooting, detecting state is returned to.
Accordingly, the present invention is it is also proposed that a kind of door lock control system based on active security protection, including is installed on door lock
Moving Target Exploitation device, central controller, unlocking instruction pick device, photographic device, wireless networked device and locking control machine
Structure, be provided in the central controller detector management module corresponding to the Moving Target Exploitation device, correspond to it is described
The unlocking instruction management module of unlocking instruction pick device, corresponding to the locking control mechanism locking control management module,
Camera management module corresponding to the photographic device and the Wireless Networking management module corresponding to the wireless networked device;Its
It is characterized in that:
The Moving Target Exploitation device is for emission detection signal and can receive the spy locked the object in the external space and reflected
It surveys signal and manages mould by the detector is sent to the feedback signal corresponding to the reflected probe signal that is received;
The unlocking instruction pick device for pick up external unlocking instruction and by with opening corresponding to the unlocking instruction
Lock signal sends the unlocking instruction management module to;The unlocking instruction management module is for verifying unlocking instruction and verifying
The locking control mechanism is opened in control after belonging to authorization unlocking instruction;
The photographic device is for absorbing the photo or dynamic image of scene outdoors and picture or image by the intake
Send the camera management module to;The camera management module is used to detect motive objects simultaneously when the Moving Target Exploitation device
And the motive objects do not leave in the first time period of setting and are not carried out including triggering the unlocking instruction pick device yet
Any trigger action when start the photographic device, and do not left in the second time period of setting in the motive objects
The photographic device camera shooting is controlled when any trigger action including triggering the unlocking instruction pick device is not carried out;It is described to take the photograph
As management module is additionally operable to when receiving unlocking instruction or when external network sends out to the door lock instruction of inquiry environment, is opened
The dynamic photographic device camera shooting;
The wireless networked device is mutual for realizing the real time information between the central controller and external network signal
It changes;
The locking control mechanism be used for receive authorization unlocking instruction or external network send out unlocking to the door lock
When instruction, is acted under the control that the locking controls management module and the door lock can be unlocked.
Wherein, the Moving Target Exploitation device be one kind can automatically receive and dispatch detectable signal such as infrared ray or microwave from
And the mobile target in front of the detector can be detected.By the Moving Target Exploitation device it can be found that appointing close to door lock
What mobile target such as people or mobile object(Referred to herein, generally, as motive objects).The detection range one of the Moving Target Exploitation device
As setting from lock 0.2 to 2 meters between, specific range can be debugged according to the usage type of door lock.Secondly transmitting signal
It can be continuous, can also be intermittence, to reduce the energy consumption of door lock, the present invention is using intermittent detection mode, when interval
Between can greatly save energy consumption using interval detection techniques between 10 milliseconds to 200 milliseconds.In addition detectable signal is strong
Degree can also be gradual, i.e., in standby mode(It can also be referred to as sense mode)Lower signal strength is minimum, and interval time is most
It is long, when tentatively detection finds motive objects, then properly increases signal strength or development examination frequency and moved to improve whether there is
The judgment accuracy of animal.
Wherein, the central controller is the control centre of door lock, it include various functions module mentioned in this article and
Arithmetic center and memory can not only receive the signal that various sensors are transmitted, and can receive external network
The various instructions provided, moreover it is possible to which various heat transfer agents are uploaded into external network and its terminal device such as computer, mobile phone in real time
Or in APP.The central controller can be integrated controller, can also be to disperse corresponding to each controlled functional component
It is arranged but the general name of the controller of mutual communicative, in this way when one of functional component is controlled work, other function parts
Part may be at dormant state.
Wherein, the unlocking instruction pick device is a kind of device that can pick up unlocking instruction, such as can pick up and refer to
The fingerprint detection head of line signal, the sensor that IC card signal can be picked up, the voice operated sensor that sound instruction signal can be picked up,
Can pick up the face recognition device of types of facial makeup in Beijing operas signal, can pick up key unlocking signal sensing device or and can pick up destruction
Property unlock caused by vibration signal door lock vibration inductive device etc., the related unlocking instruction of unlocking instruction pick device pickup
Signal gives sending the central controller to after signal arranges.In general different signal characteristics is directed to need on door lock
Corresponding, different sensors or detector are set to monitor, pick up different signals respectively.Herein it should be noted that, institute
It is only one of a kind of mode unlocked to state unlocking instruction pick device pickup unlocking instruction, can also pass through external network in fact
In APP to the central controller send the direct opening door lock of unlocking instruction, so for example when there is nonlocal kith and kin to come to visit, just
It can directly be opened the door by remote operation without going home to open the door in person.
Wherein, the normal unlocking instruction is the enabled instruction action implemented to realize normally unlocking, such as in institute
In the case of unlocking instruction pick device is stated with start button or proximity sensor, the start button or close sensing are triggered
The action of device.The structure type of the unlocking instruction pick device is different, and the mode started can be different.For this purpose, just normally opened
Lock instruction refers to the unlocking instruction that authorized person such as kinsfolk unlocks by normal mode, including directly normal unlocking or network
Teleinstruction is normally unlocked.The normal unlocking instruction that wherein authorized person unlocks by normal mode is since input error differs surely
It is enough to be received and be judged as false command to need to verify repeatedly, such as in the occasion of fingerprint recognition, since finger is placed
It excessively deviates not recognized and is read as work(.For this purpose, be able to verify that by belong to authorization unlocking instruction, otherwise belong to unauthorized unlocking
Instruction.Include again a kind of abduction unlocking instruction in the wherein described authorization unlocking instruction, will be described hereinafter.
In the technical solution including step 2, include " and be not carried out including triggering the unlocking instruction pick device
Any trigger action " technical characteristic, this feature define two aspects, are that the object being triggered includes but not limited on one side
The unlocking instruction pick device can also be doorbell, special start key, voice operated sensor etc., be " to touch on the other hand
Hair " had both included the starting operation for directly triggering such as pressing keys, also including triggering indirectly for example by position sensor with non-
Contact induction is with the presence or absence of starting operation, by voice operated sensor with non contact angle measurement enabling voice activation and its instruction
Deng.
The locking control mechanism, can be it is a kind of can directly drive undertake locking functions lock tongue part action it is automatically controlled
Device can also be the actuator of the handle clutch in door lock, when the locking control mechanism drives the clutch operating
When door handle and the lock tongue can be allowed to form linkage and then unlocked by means of the external drives part such as door handle driving lock tongue.
The external network refers not only to internet, also refers to the fixed terminal being connect with internet or mobile terminal and operation
APP controllers etc..
The first time period, second time period are the preset periods, first time period are arranged, and in setting
First time period just starts the photographic device later, can filter out and accidentally swarm into the mobile target spy belonging to for the overwhelming majority
The motive objects surveyed in device investigative range greatly reduce the photographic device such as the neighbours passed by or the child to play
The frequency of startup.Second time period is set, primarily to reserving the enough startup time to the photographic device(General camera shooting
The startup time of device could implement camera shooting between 1 second to 5 seconds, after startup), people is strayed into also for filtering external again
Member.And the length of the first time period is set, also related with the detection range set by the Moving Target Exploitation device, detection
The setting length of the remote then described first time period of distance can be grown.Generally the first time period is arranged for we in practice
Between 3 seconds to 10 seconds, and the second time period is set between 1 second to 5 seconds.
The detecting state is primarily referred to as in addition to the Moving Target Exploitation device and its driving Moving Target Exploitation device
The central control module of work is in running order outer, other energy-consuming parts is allowed as possible in a dormant state, to save as possible
Energy consumption, but be not equal to and say that other all electrical parts do not work, such as power supply indicator can be constantly in luminance,
And whether have the proximity sensor of starting operation, voice operated sensor can always work, can also start in button if incuding
It is lower just to work.Thus in the detecting state central controller controls preferably control the unlocking instruction pick device,
Photographic device, wireless networked device in a dormant state, to save energy consumption as possible, can also improve the service life of product.
According to above-mentioned technical proposal, be compared with the prior art, it can be found that its it is beneficial have technical effect that, from hardware
The angle of itself is rationally arranged on the basis of investigative range, will appear in any motive objects in investigative range and normal unlocking
Action filters without complicated logical operation but using the period invalid motive objects signal, not only saving energy consumption and
And malfunction can also be greatly reduced, both can guarantee safety or intelligent door lock can be allowed not disturb people's thing as what is frequently alarmed.
If further technical solution be also possible that the central controller verification belong to unauthorized unlocking instruction and
It still cannot be verified in verification delay time, then will not start the locking control mechanism, it is described after verification delay
Door lock enters detecting state.
Further technical solution is also possible that be terminated in central controller verification delay, the central controller
Normal unlocking instruction management module enter dormant state after, again be delayed the third period after could wake up the normal unlocking
Instruct management module.The third period is set, is to filter out human interference trigger action.The third period, one
As be 3 minutes or so.
Further technical solution is also possible that the unlocking instruction, which is divided into normal unlocking instruction and abnormal unlocking, to be referred to
Enable, the exception unlocking instruction include kidnap unlocking instruction or and destructive unlocking instruction;When the central controller receives
When abnormal unlocking instruction, not only starts the photographic device and image, and synchronized to outside by the wireless networked device
Transmission of network alarm signal.Accordingly, the door lock control system further invented, the unlocking instruction management module include normal
Unlocking instruction management module and abnormal unlocking instruction management module, the exception unlocking instruction management module include kidnapping to unlock to refer to
Enable management module or and destructive unlocking instruction management module;The exception unlocking instruction management module be used for receive it is different
After normally opened lock information, not only starts the photographic device and image and the photograph is transmitted by the wireless networked device external network
Piece, and alarm signal is transmitted by the wireless networked device external network.
The exception unlocking instruction is relative to the normal unlocking instruction and the definition that provides, including kidnaps unlocking instruction
Or and destructive unlocking instruction.
The unlocking instruction of kidnapping is that a kind of crisis that has been preset in the central controller in advance is referred to using management
It enables(Such as in the door lock using fingerprint management, it is normal unlocking fingerprint that can input right index finger fingerprint, can be previously entered the right side
Middle finger fingerprint is that crisis uses fingerprint;Key number, one " today is very tired " that a string of crises use for example are set in advance again
Etc. special language etc.);The crisis instruction that generally preset crisis control uses in the central controller in advance, this
Kind of crisis instruction only has that setting person oneself or relatives know and others is unclear, and when crisis occurs, the people being held as a hostage can
It is in addition opened the door using crisis unlocking instruction preset in advance with unlocking without using normal unlocking instruction(It can certainly be arranged
For the function that cannot be opened the door)Although can open the door according to the instruction of hijacker, when the unlocking instruction pick device receives
Corresponding hijacked signal is sent to be arranged in the central controller abnormal unlocking instruction after to this abduction unlocking instruction
Management module, the exception unlocking instruction management module receive after this signal it is synchronous, in real time external network send out by
The caution signal unlocked is kidnapped, consequently facilitating property management unit, police or household try rescue or urgent inquiry, but this alarm signal
Breath appears in remote location, and bad person does not know that the central controller has been alarmed.When sending out various warnings, it can also pass through
External network looks into the camera shooting data of misfeasor.It can be convenient for the central controller using the abduction unlocking instruction thus
It identifies and transmits the behavior of being held as a hostage but be not necessarily required to that special sensor or pick device is arranged to pick up, such as fingerprint pickup
Head can pick up normal unlocking instruction, can also pick up abduction unlocking instruction.
The destructiveness unlocking instruction refers to that the violence of the direct mechanical structure for destroying door lock is unlocked.In extreme circumstances
Bad person is generally registered one's residence using the violence mode for directly destroying door lock, such as is directly broken door lock, directly bored unlocking using impact drill
Head etc., these destructions action all can cause door lock by violent vibrations.Door lock Vibration induction can be set in door lock thus
Device picks up this unconventional door lock vibration signal and this vibration signal is transmitted directly in the central controller
The abnormal unlocking instruction management module of middle setting;The exception unlocking instruction management module synchronizes after receiving this signal, is real
When external network send out the caution signal of destructive unlocking, consequently facilitating property management unit, police or household try rescue or
Urgent inquiry, certain administrative staff also can judge that door lock is existing by means of this destructive unlocking signal and camera shooting Information integration
Whether what happens field belongs to abnormal.
Wherein, the alarm signal refers to the personnel such as energy especially prompting door lock administrative staff, property management personnel or police
Special suggestion signal, picture or short message, alarm call, blinker etc..
Further technical solution, which is also possible that, to be received outside such as the central controller by the wireless networked device
Portion inquire outdoor environment instruction when, start the photographic device and image and by the wireless networked device external network
Transmission absorbed picture or image, inquiry finish or are finished in inquiry and allow the central controller to open by external command
After the locking control mechanism, detecting state is returned to.
After further technical solution is also possible that the photographic device camera shooting, photo or Dynamic Graph that it is absorbed
As being stored directly in the memory of the central controller or/and being transmitted by the wireless networked device external network.
Further technical solution is also possible that the door leaf for further including to connect with the central controller is closed induction dress
It sets, the door leaf is closed sensing device and is used to perceive whether door leaf to be closed signal in place;When the central controller is logical
When crossing the door leaf and being closed sensing device and receive the not closed signal in place of door leaf and do not solved within the reasonable time, start institute
It states the included buzzer of door lock and sends out prompt tone Huo and the external network transmission not closed alarm signal in place of door leaf.It is corresponding
, the door lock control system further invented is additionally provided with door leaf in the central controller and is closed management module, further include with
The door leaf of the central controller connection is closed sensing device, and the door leaf is closed whether sensing device can perceive door leaf
It is closed signal in place;The door leaf is closed management module and is used to receive door leaf patent by door leaf closure sensing device
When closing signal in place and not solved within the reasonable time, door leaf patent is transmitted by the wireless networked device external network
Close alarm signal in place.Wherein, the door leaf is closed sensing device, is a kind of closed in door leaf or in the state of being left unlocked or unlatched
When can incude door lock and whether locked the sensing device of closure.It is then generally not necessarily to make this sense when door leaf is opened completely
It should act.According to the program, the information that the door leaf is closed whether door leaf is closed by sensing device is transmitted directly in described
The door leaf being arranged in the controller of centre is closed management module;If door leaf closed but door lock and unlocked closure and more than reasonable
The time of such as 10 seconds or more time or door leaf are in state of being left unlocked or unlatched and more than the time of such as 10 seconds or more reasonable time, institute
It states after door leaf closure management module receives this signal and synchronizes, sends external network in real time.Administrative staff can be by
In the inspection with high safety of this signal, if it is abnormal to there is locking.
Further technical solution is also possible that further include the display device being connect with the central controller, works as triggering
When the Show Button, start the photographic device and the display device, the photographic device camera shooting is simultaneously passed to the display device
Send absorbed photo or image.Door lock control system that is corresponding, further inventing further includes and the camera management module
The display device of connection, the display device can when triggering the Show Button by the camera management module to the display
Device transmits the photo of scene outdoors or dynamic image that the photographic device is absorbed.Described in wherein described the Show Button and startup
The start button of unlocking instruction pick device can be the same button, can also be separated two buttons.In the display
In the case of button and the start button for starting the unlocking instruction pick device are the same button, so that it may with described in startup
When the Show Button, unlocking action is synchronous with camera shooting, Display Realization.
Further technical solution is also possible that further include the sound pick up equipment being connect with the central controller and playback dress
It sets, when triggering intercommunication button, starts the sound pick up equipment and playback set realizes intercommunication call.In this way can by sound control with regard
Frequency control, which merges, to be carried out.The wherein described intercommunication button can be combined into one with described the Show Button.
Further technical solution is also possible that further include the detection indicator light being connect with central controller signal, works as institute
When stating Moving Target Exploitation device and having detected motive objects target, the light of the detection indicator light lights to use the detection
The light of indicator light refers to the Moving Target Exploitation device and has detected motive objects target.
According to said program, the abnormal conditions of appearance are just especially uploaded to including alarm, send out carrying for alarm type
Show information etc..That is, main points are placed on the state management and control to door lock itself, for being not belonging to any behavior example of abnormal start-up door lock
As close to door lock behavior, close to door lock for a long time without departing from behavior, triggering doorbell behavior either normally-open door lock row
For etc., then only take common surveillance and control measure(Record preserves information), alarming and managing pattern might not be used.In this way to appointing
What motive objects, if close to door lock can direct monitoring, do not stay time dead angle, will not continually bother administrator, and
The setting of the complex logic algorithm such as threshold value of the prior art and the setting of time are eliminated, control accuracy is high.Wherein, from movement
Object occurs starting to this secondary control process to terminate(Unlocking gets in and closes the door or passerby has been moved off), the central controller
Always it is in the implementation Process whole-process control that job control state is the process, unlocking, shutdown or the damage lock that occur to motive objects
Monitoring.
Wherein, the photographic device is usually to be mounted on video camera on door lock outer panel, and the display device can both pacify
On the backboard for filling door lock, indoor other places can also be mounted on.It, can be in the display device after the photographic device starts
On intuitively check scene dynamics image conditions outdoors, can also pass through APP remote reviewings scene dynamics situation outdoors.
Wherein, described the Show Button is a kind of hand push button being arranged in door lock backboard or indoor other places, when manual
Outdoor scene dynamics situation outdoors can be viewed when pressing described the Show Button by photographic device.
Under normal circumstances, the camera management module, photographic device and display device may be in sleep state, but
Need the when of being inquired by external network such as APP, when motive objects occur, when there is unlocking signal(Including normal unlocking instruction,
When there is alarm in abduction unlocking instruction), start the Show Button when, or door lock by mechanicalness tap or strenuous vibration percussion
When signal, just start the photographic device and display device, to can not only record the personal information using door lock, Er Qiebian
Whether belong to legal authorization personnel also by the specifically used personnel of long-range mode such as APP inquiry door locks in door lock administrator
It is bad person.Wherein, when motive objects appear in investigative range, it is not essential however to which camera management module described in synchronous averaging is taken the photograph
As device and display device, it can delay completely several seconds and restart the camera management mould after waiting detections determination to understand motive objects
In general block, photographic device and display device need certain time from detection motive objects are started to completely specified degree,
Setting deferred action not only simplifies control management logic, and more can guarantee the accuracy of judgement.
Further technical solution is also possible that after the central controller receives low voltage signal, synchronously to
External network transmits low-voltage alarm signal.Accordingly, the intelligent security control system further invented, which is characterized in that institute
It states and is additionally provided with low-voltage management module in central controller, the low-voltage management module in the central controller for connecing
After receiving low voltage signal, synchronously external network transmits low-voltage alarm signal, is supplied to prompt user to replace at once
Battery.
According to above-mentioned technical proposal and its intentional technique effect, present invention could apply to intelligent door lock products.
Specific implementation mode
1 attached drawing 3 is arrived below in conjunction with the accompanying drawings, the intelligent door lock system and its control method of application technical solution of the present invention are made
Further illustrate.
As shown in Fig. 1 to Fig. 3, a kind of door lock control system based on active security protection, including door lock, be installed on door lock
Power supply, Moving Target Exploitation device, central controller, unlocking instruction pick device, door lock vibration inductive device, door leaf are closed induction
Device, photographic device and display device, the Show Button, sound pick up equipment and playback set, door bell device, wireless networked device, lock
Close control mechanism etc..In addition, being provided with the detector pipe corresponding to the Moving Target Exploitation device in the central controller
Manage module, corresponding to the unlocking instruction management module of the unlocking instruction pick device(Normal unlocking instruction management module, exception
Unlocking instruction management module), corresponding to locking control mechanism locking control management module, correspond to the wireless networked device
Wireless Networking management module, low-voltage management module, corresponding to the photographic device and display device camera management module,
The door leaf that sensing device is closed corresponding to the door leaf is closed management module, corresponding to the sound of the sound pick up equipment and playback set
The submodules such as sound management module;The wherein described abnormal unlocking instruction management module includes kidnapping unlocking instruction management module, breaking again
Bad property unlocking instruction management module.Can also in the central controller the integration environment control module such as curtain, door and window, family
The control module of fulgurite reason, can pass through the central controller integrated control indoor environment of door lock in this way.Due to the present invention
Used control structure, control logic are simple, and control process is also very simple accordingly thus, is compared with the prior art significantly
Speed, precision and the reliability of the control operation of raising.Wherein:
The Moving Target Exploitation device is for emission detection signal and can receive the spy locked the object in the external space and reflected
It surveys signal and the central controller will be sent to the feedback signal corresponding to the reflected probe signal that is received.The movement
Target detector can automatically receiving and transmitting signal such as infrared ray or microwave so as to detecting the movement in front of the detector
Target.By the Moving Target Exploitation device it can be found that constantly close to any mobile the target such as people or motive objects of door lock
Body.The detection range of the Moving Target Exploitation device be generally located on from lock 0.2 to 2 meters between such as 0.2 meter, 0.3 meter, 0.5
Rice etc., specific range can be debugged according to the usage type of door lock, detection range too far not only energy consumption it is big but also
It is also a kind of detector of short distance not have any practical significance, the Moving Target Exploitation device.Secondly transmitting signal can be
Continuously, can also be intermittence, in order to reduce the energy consumption of door lock, the present invention is existed using intermittent detection mode, interval time
Between 10 milliseconds to 200 millimeters;In addition, the intensity of detectable signal can also be gradual, i.e. signal strength in stand-by mode
It is minimum, interval time longest, when preliminary detection finds motive objects, then properly increase signal strength or development examination frequency to
The judgment accuracy with the presence or absence of motive objects is improved, does not need to need to first determine whether motive objects as prior art at this time
Activity pattern decides whether to alarm again.
The central controller is the control centre of door lock, it includes in various functions module mentioned in this article and operation
The heart also includes memory information and various detection sensor information data for storing instruction, can not only receive, operation, tune
The signal that various sensors are transmitted is spent, and the various instructions that external network provides can be received, moreover it is possible to by various sensings
Information is uploaded in real time in the terminal device such as computer, mobile phone or APP of external network.
The unlocking instruction pick device for pick up external unlocking instruction and by with opening corresponding to the unlocking instruction
Lock signal sends the unlocking instruction management module to;The unlocking instruction management module is for verifying unlocking instruction and verifying
The locking control mechanism is opened in control after belonging to authorization unlocking instruction;The unlocking instruction pick device, which is one kind, to be picked up
The device of unlocking instruction is taken, such as the fingerprint detection head of fingerprint signal, the sensor that IC card signal can be picked up, energy can be picked up
Enough the face recognition device of pickup types of facial makeup in Beijing operas signal, can pick up key unlocking signal sensing device or and can pick up destructiveness
The door lock vibration inductive device etc. of vibration signal caused by unlocking, can be by triggering described the Show Button come described in normal start
Unlocking instruction pick device, allowing unlocking instruction pick device revival to power on the related unlocking instruction signal of pickup, to give signal whole
Send the central controller after reason to.In general be directed to different signal characteristic needs be arranged on door lock it is corresponding, no
With sensor or detector monitor, pick up different signals respectively, can also pick up difference by the same sensor
Unlocking instruction can for example use fingerprint pick-up head or digital keys to pick up normal unlocking instruction and kidnap unlocking instruction.
If the motive objects close to door lock implement unlocking instruction close to door lock, picked up by the unlocking instruction pick device
External unlocking instruction simultaneously will be also passed to the central controller, the center with the unlocking signal corresponding to the unlocking instruction
Controller works on and implements to control accordingly;For the unlocking instruction of input, divides into normal unlocking instruction and exception is opened
Lock instructs and accordingly makes two kinds of judgements;After the central controller receives normal unlocking instruction and verification belongs to mandate
The locking control mechanism is then opened when unlocking instruction, else if verification be then not turned on when belonging to unauthorized unlocking instruction it is described
Locking control mechanism;When the central controller receives abnormal unlocking instruction(Exception information)After can record, to preserve this different
Yet synchronously external network transmits alarm signal to normal information.It is described exception unlocking instruction mainly include kidnap unlocking instruction,
Destructive unlocking instruction etc..
The unlocking instruction of kidnapping is that a kind of crisis that has been preset in the central controller in advance is referred to using management
It enables(Such as in the door lock using fingerprint management, it is normal unlocking fingerprint that can input right index finger fingerprint, can be previously entered the right side
Middle finger fingerprint is that crisis uses fingerprint);Generally preset crisis controls the danger used in the central controller in advance
Machine instructs, and this crisis instruction only has that setting person oneself or relatives know and others is unclear, when crisis occurs, is robbed
The people held can not use normal unlocking instruction and unlock but in addition be opened the door using crisis unlocking instruction preset in advance, although energy
It is enough to open the door according to the instruction of hijacker, but will be right after the unlocking instruction pick device receives this abduction unlocking instruction
The hijacked signal answered(Exception information)Send the abnormal unlocking instruction management module being arranged in the central controller to, it is described different
Normal unlocking instruction management module not only records the preservation abnormal unlocking signal information after receiving this abnormal signal and leads to
Cross that synchronous, external network sends out the caution signal for unlocking of being held as a hostage in real time, consequently facilitating property management unit, police or household set
Method is saved or urgent inquiry, but this warning message appears in remote location, and bad person has not known the central controller
Alert.When sending out various warning messages, the camera shooting data of misfeasor can also be looked by external network.Thus
The behavior of being held as a hostage can be identified and transmit using the abduction unlocking instruction convenient for the central controller but is not necessarily required to set
Special sensor or pick device are set to pick up, such as fingerprint pick-up head can pick up normal unlocking instruction, can also pick up misfortune
Hold unlocking instruction.
The destructiveness unlocking instruction refers to the violence unlocking action of the direct mechanical structure for destroying door lock.In extreme feelings
Bad person can use the violence mode for directly destroying door or door lock register one's residence under condition, such as directly break door lock, direct using impact drill
Unlocking head etc. is bored, these destructions action all can cause door lock by violent vibrations.Door lock shake can be set in door lock thus
Dynamic sensing device picks up this unconventional door lock vibration signal(Exception information)And this vibration signal is transmitted directly to
The abnormal unlocking instruction management module being arranged in the central controller;The exception unlocking instruction management module receives this
Not only record preserves the abnormal unlocking signal information and by synchronization, external network is sent out in real time after kind of abnormal signal
The caution signal that destructiveness is unlocked, consequently facilitating property management unit, police or household try rescue or urgent inquiry, certain administrator
Whether member also can judge what happens door lock is live by means of this destructive unlocking signal and camera shooting Information integration
Belong to abnormal.The sound management module can also be driven to realize pickup and playback intercommunication function.Certainly there are motive objects simultaneously
And after long-range APP obtains this information alert, the central controller transmission camera shooting, recording can also be instructed by long-range APP
In information to APP.
The door lock vibration inductive device, for perceiving door lock by mechanicalness percussion or the knocking and biography of strenuous vibration
Abnormal unlocking instruction management module set in the central controller is given, is received by the door lock vibration inductive device
After the knocking arrived, the central controller, which not only records, preserves the abnormal signal information and synchronously external network
The alarm signal that transmission door lock is tapped.
The door leaf is closed sensing device, be it is a kind of door leaf closed or in be left unlocked or unlatched state when can incude door lock
The sensing device for closure of whether having locked.It is then generally not necessarily to make this induction action when door leaf is opened completely.According to this
Scheme, if door leaf closed but door lock and it is unlocked closure and more than such as 10 seconds or more reasonable time time or door
For fan in state of being left unlocked or unlatched and more than the time of such as 10 seconds or more reasonable time, the door leaf is closed sensing device by this signal
It is transmitted directly to the door leaf being arranged in the central controller and is closed management module;The door leaf is closed management module and receives
It synchronized after this signal, send external network in real time.Administrative staff can be by means of the inspection with high safety of this signal
It is no to there is locking exception.
The photographic device and display device, wherein the photographic device is usually to be mounted on door lock outer panel to image
Machine, the display device can both be installed on the backboard of door lock, and indoor other places can also be mounted on.The photographic device
After startup, outdoor scene dynamic image situation can be intuitively checked on said display means, can also pass through APP remote reviewings room
Outer scene dynamic image situation.The photographic device is for absorbing the photo or dynamic image of scene outdoors and the figure that will be absorbed
Piece or picture signal send the camera management module to;The camera management module is used to visit when the Moving Target Exploitation device
It measures motive objects and the motive objects does not leave in the first time period of setting and are not carried out including triggering the unlocking yet
Start the photographic device when any trigger action for instructing pick device, and the motive objects setting second time period
Not leaving when that any trigger action including triggering the unlocking instruction pick device is also not carried out inside controls the camera shooting and fills
Set camera shooting;The camera management module is additionally operable to when receiving unlocking instruction or external network sends out inquiry ring to the door lock
When the instruction in border, start the photographic device camera shooting.
Described the Show Button is a kind of hand push button being arranged in door lock backboard or indoor other places, works as Manual press
When described the Show Button, outdoor ambient conditions can be viewed by display device.
Under normal circumstances, the photographic device and display device may be at sleep state, but need to pass through extranets
When network such as APP inquiries, when motive objects occur, when there is unlocking signal(Go out including normal unlocking instruction, abnormal unlocking instruction
When existing alarm), start the Show Button when, or door lock by mechanicalness tap or strenuous vibration knocking when, just startup
The photographic device and display device to can not only record the personal information using door lock, but also are convenient for door lock administrator
Whether the specifically used personnel that door lock is inquired by long-range mode such as APP belong to legal authorization personnel or bad person.
The wireless networked device, it is mutual for realizing the real time information between the central controller and external network signal
It changes;After the central controller receives motive objects signal or unlocking signal, further by the wireless networked device by this
A little signal synchronous drivings are passed to the command signal of external network or external network by the wireless networked device described
Central controller, allow the central controller to provide relevant information for example whether in the presence of motive objects outdoors, camera shooting, pickup information to
External network.
The locking control mechanism be used for receive authorization unlocking instruction or external network send out unlocking to the door lock
When instruction, is acted under the control that the locking controls management module and the door lock can be unlocked.
The door bell device, for driving the doorbell management module being arranged in the central controller in triggering, into
And can synchronously external network or and the playback set transmit voice signal.In this way by the door bell device be come
Visit person provides the function of the visiting request of prompt, and the information Perception transmitted by the doorbell management module outdoors visiting
Person especially can also inquire visitor by external networks.Such as administrator is after learning the signal that someone comes to visit, it can be with
Order-driven camera shooting is sent out to the central controller with remote mode by external network or voice inter-speaking system is checked, interrogated
Visitor.The door bell device and described the Show Button can be combined into one in the present invention.
Secondly, low-voltage management module is set in the central controller, when the central controller receives low electricity
Press signal(Exception information)Afterwards, synchronously external network transmits low-voltage alarm signal, to prompt user to replace at once
Supplying cell.Secondly as the content of information collection and storage is relatively more, for the storage being stored in the central controller
Information in device is also stored in the information in external network, the pattern periodically removed can be taken, generally, for normal
Information storage one day to one month just enough, also enough for abnormality information storage 1 year.
Using above system, the control method for door lock based on active security protection being arranged as shown in Figure 3 is as follows:
Step 1, startup power supply allows the door lock to enter detecting state;At this point, the unlocking instruction pick device, camera shooting dress
Set, wireless networked device and locking control mechanism are in standby in other words all in dormant state, to reduce electric energy
Loss;Power supply indicator is also set up on the door lock, is used to indicate electric energy size.
Step 2, on the basis of step 1, as motive objects enter the investigative range of the Moving Target Exploitation device but are setting
Motive objects have been moved off the investigative range of the Moving Target Exploitation device and are not carried out in fixed first time period such as 3 to 6 seconds
Any trigger action including triggering the unlocking instruction pick device, door bell device etc., the door lock maintain detecting state;
In this step 2, after motive objects enter in the investigative range of the Moving Target Exploitation device and determine, it is arranged on the door lock
The detection indicator light being connect with the central controller signal light, to it is described detection indicator light light reference described in
Moving Target Exploitation device has detected motive objects target.
Step 3, on the basis of step 1, as motive objects enter the investigative range of the Moving Target Exploitation device but are setting
Motive objects do not leave the investigative range of the Moving Target Exploitation device and implement normal unlock and move in fixed first time period
Make, then starts the photographic device and image;If the unlocking instruction management module verification of the central controller belongs at this time
Then open-and-close control mechanism returns to detecting state after the locking control mechanism unlatching for authorization unlocking instruction;It is described at this time
Camera shooting can be stored in the memory of the central controller by central controller, can also upload to the storage of external network
In device or in APP, due to belonging to normal unlocking action, the central controller is not necessarily to send out alarm signal to outside thus;According to
The step then starts the camera shooting dress as long as any time point in the first time period implements normal unlocking action
It sets and images;Certainly, as long as any time point in the first time period implements any abnormal unlocking action, also start
The photographic device simultaneously images, and the central controller also can external network transmission alarm signal;
Step 4, on the basis of step 1, in the first time period of setting motive objects do not leave as described in mobile mesh
It marks the investigative range of detector but and any triggering including triggering the unlocking instruction pick device, door bell device etc. is not carried out
Action, then the second time period of the setting after first time period start the photographic device in such as 1 to 3 seconds, described in startup
Photographic device implements camera shooting for next step and provides preparation;
Step 5, on the basis of step 4, if motive objects and be not carried out including described in triggering in the second time period
Any trigger action of unlocking instruction pick device, door bell device etc. and the investigative range for leaving the Moving Target Exploitation device,
Then the door lock returns to detecting state;
Step 6, on the basis of step 4, if motive objects do not leave the mobile target in the second time period
The investigative range of detector simultaneously implements normal unlocking action, then the photographic device camera shooting;The central controller at this time
Unlocking instruction management module opens the locking control mechanism, the locking control machine if verification belongs to authorization unlocking instruction
After structure is opened, the door lock returns to detecting state;
Step 7, on the basis of step 4, if motive objects do not leave the mobile target in the second time period
It the investigative range of detector but and is not carried out dynamic including any triggering for triggering the unlocking instruction pick device, door bell device etc.
Make, the photographic device starts to image after the second time period;I.e. for the motive objects for resting on the lock external space, although stopping
But if the time have arrived at second time period do not implement trigger gate lock action then only image but without externally transmission report
Alert signal.
Step 8, on the basis of step 7, if just implement normal unlocking action after the second time period, and should
Unlocking action is later than the time of the started camera shooting of photographic device described in step 7, then is again started up the photographic device and images;
The unlocking instruction management module of the central controller opens the locking control if verification belongs to authorization unlocking instruction at this time
Mechanism processed after the locking control mechanism is opened, returns to detecting state;
Step 9, on the basis of step 7, if motive objects do not leave the mobile target after the second time period
It the investigative range of detector but always and is not carried out and is touched including triggering any of the unlocking instruction pick device, door bell device etc.
Start to make, then after the photographic device images, the door lock returns to detecting state.I.e. for resting on the lock external space
Motive objects, although but if the residence time already exceed second time period do not implement trigger gate lock action then only imaged
But without externally transmission alarm signal.
In above-mentioned steps, refer to if the unlocking instruction management module verification of the central controller belongs to unauthorized unlocking
It enables and still cannot be verified in verification delay time, then will not start the locking control mechanism, verification delay terminates
Afterwards, the door lock enters detecting state.Further, terminate in central controller verification delay, the normal unlocking refers to
After enabling management module enter dormant state, again be delayed such as 3 minutes or so third period time after could wake up described in
Normal unlocking instruction management module.
In above-mentioned steps, the unlocking instruction is further divided into normal unlocking instruction and abnormal unlocking instruction, institute
State abnormal unlocking instruction include kidnap unlocking instruction or and destructive unlocking instruction;When the central controller receives exception
When unlocking instruction, not only start the photographic device and image, and external network is synchronized by the wireless networked device
Transmit alarm signal.
In above-mentioned steps, further, such as central controller is received for example by the wireless networked device
When APP external inquiry outdoor environments instruct, starts the photographic device and image and by the wireless networked device to outside
The picture or image that transmission of network is absorbed, inquiry finish or are finished in inquiry and allow the central controller by external command
After opening the locking control mechanism, detecting state is returned to.
In above-mentioned steps, further, after the photographic device camera shooting, the photo or dynamic image that it is absorbed are straight
It connects and is stored in the memory of the central controller or/and is transmitted by the wireless networked device external network.
In above-mentioned steps, further, received when the central controller is closed sensing device by the door leaf
The not closed signal in place of door leaf and when not solved within the reasonable time, starts the included buzzer of the door lock and sends out prompt tone
Huo and external network transmit the not closed alarm signal in place of door leaf.
In above-mentioned steps, further, when triggering the Show Button, start the photographic device and display dress
It sets, the photographic device camera shooting simultaneously transmits absorbed photo or image to the display device.
In above-mentioned steps, further, when triggering intercommunication button, starts the sound pick up equipment and playback set is realized
Intercommunication is conversed.
Further include the detection indicator light being connect with central controller signal, when the shifting further in above-mentioned steps
When moving-target detector has detected motive objects target, the light of the detection indicator light lights to be indicated with the detection
The light of lamp refers to the Moving Target Exploitation device and has detected motive objects target.