CN207660394U - Door lock opening control system based on active security protection - Google Patents

Door lock opening control system based on active security protection Download PDF

Info

Publication number
CN207660394U
CN207660394U CN201720555993.8U CN201720555993U CN207660394U CN 207660394 U CN207660394 U CN 207660394U CN 201720555993 U CN201720555993 U CN 201720555993U CN 207660394 U CN207660394 U CN 207660394U
Authority
CN
China
Prior art keywords
unlocking instruction
management module
door lock
unlocking
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201720555993.8U
Other languages
Chinese (zh)
Inventor
崖少云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG ARCHIE HARDWARE CO Ltd
Original Assignee
Cao Hantian
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cao Hantian filed Critical Cao Hantian
Application granted granted Critical
Publication of CN207660394U publication Critical patent/CN207660394U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • E05B45/06Electric alarm locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/06Mechanical actuation by tampering with fastening
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/188Capturing isolated or intermittent images triggered by the occurrence of a predetermined event, e.g. an object reaching a predetermined position
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)

Abstract

Door lock opening control system based on active security protection, including the Moving Target Exploitation device being installed on door lock, central controller, unlocking instruction pick device, photographic device, wireless networked device and locking control mechanism, the detector management module corresponding to the Moving Target Exploitation device is provided in the central controller, corresponding to the unlocking instruction management module of the unlocking instruction pick device, management module is controlled corresponding to the locking of the locking control mechanism, camera management module corresponding to the photographic device and the Wireless Networking management module corresponding to the wireless networked device.In this way, on the basis of rationally investigative range is set from the angle of hardware itself, it will appear in any motive objects in investigative range and normal unlocking action, filter without complicated logical operation but using the period invalid motive objects signal, it not only saves energy consumption but also malfunction can also be greatly reduced, both can guarantee safety or intelligent door lock can be allowed not disturb people's thing as what is frequently alarmed.

Description

Door lock opening control system based on active security protection
Technical field
The present invention relates to door lock fields, more particularly to door lock method for controlling opening and closing and control system based on active security protection.
Background technology
Inherently a kind of security device of door lock, but traditional door lock either mechanical lock, Fingerprint Lock, IC card lock etc., all Belong to a kind of door lock of Passive Management, i.e., cannot initiatively to inside and outside door lock itself and door lock ambient conditions implementing monitoring and Management.On October 10th, 2013, application No. is it is 201310471169.0 entitled " a kind of active security entrance guard control method and Its control system ", it is proposed that a kind of system with active safety protection function, including detection module, warning device and connection inspection Survey the relay of module and warning device;Detection module includes radar and the judgment means that are connected with radar, and is connected with power supply, Radar is used to carry out detecting real-time to the outdoor situations in reconnaissance range, when someone or object are in reconnaissance range, judges to fill It sets and carries out logic judgment immediately, whether judgment means judgment object triggers door bell and button system, if then end loop;Otherwise step is executed Rapid S30;When judging result is NOT gate, electric signal will be sent to relay input terminal;Relay is for receiving the inspection After surveying the electric signal that module is sent, it is attracted and connects circuit and power for the warning device;Warning device is for powering on After alarm.
According to the description of the 0025th section of the ZL201310471169.0 patent specifications it is recognised that its control core is profit The mode being combined with logical algorithm with detector is realized to attempting driving door bell and button system close to the doorbell of left front especially left front The running orbit of people give sorted logic and judge to decide whether to start warning function, wherein give main point of the patent The logic of class be exactly using people or object close to door lock apart from size, rest on time length outdoors as the basic point of logic judgment, Such as the distance of the motive objects and control system defined in power 1, the first preset time period, second pre- for judging setting If the key logics such as period, alarm threshold value judge a little.But really there is the behavior for destroying the people being intended to often to have What is prepared is either protean, only can not include various possibilities with limited several decision logic elements, such as steal Take the people of unlocking instruction to unlock, by the way of shielding radar signal close to door lock, using more swindle aspects close to left front Or start doorbell or directly use violence unlocking etc.;Secondly, the control system of logical operation is set, and the precision of control logic is difficult To be arranged and debug, such as the optimal design-aside of its alarm threshold value there is not confirmability, because the alarm threshold value of the patent is Judge radar emission signal intensity and decide whether to start a reference value of actuation of an alarm in turn, is i.e. alarm threshold value itself is one Determine the radar signal numerical value of intensity size, and the size of radar appearance is not only far and near with the distance between motive objects and door lock Outer shape in relation to and with motive objects itself(Reflecting surface size), and it is related with exterior material characteristic(Whether absorb Radar signal), an a reference value(Threshold value)It is the actual environment requirement that far can not meet various scenes(I.e. in laboratory environment Although feasible but just will appear offset in the various environment of practical application, metope used by least each varying environment fills Exterior material is different, and the power for reflecting signal will be different), and in patent only the signal strength using caused by distance as sentencing Disconnected benchmark, it is obviously very inaccurate from the point of view of Radar Technology itself, the alarm threshold value selection of patent substantially can not be achieved or With practicability, influenced by too many environmental factor.Thirdly, the distance apart from the door bell and button system of left front and stopping outdoors Stay length of time etc. can not become judge that involved party is the basic standard of good person or bad person, this put legally it is good not It is logical.For this purpose, this active safety protection method and its control system, the validity of security protection is obviously insufficient even to be difficult to apply, into One step is improved this active safety-protection system and is obviously necessary.Secondly, frequent alarm is not only also an impediment to normally live And keep the power consumption of left front very big, for using gate inhibition be mounted on door leaf and using dry cell power supply for example For door lock, almost non-serviceable scheme.
Invention content
It is insufficient according to prior art, it inventors herein proposes a kind of new thinking and scheme and realizes based on active security protection Door lock method for controlling opening and closing and control system are allowed to not only simple but also intelligence are handy, and specific design is as follows:
1. abandoning the complex logics operation method such as the time of the prior art, threshold value, we focus on concern on the door Lock operation behavior itself, i.e., whether someone implements unlocking to door lock, destroys or do not close in time the action behavior of door leaf itself, and Whether there are motive objects close to door lock or rests on door leaf side or their move mode, track and the length of residence time How then and not emphasis considers, is managing in logic, is mainly taking it with the presence or absence of this logic parameter of motive objects;For connecing Nearly door lock but do not implement the action of abnormal start-up door lock motive objects can by routine monitoring and record the motive objects information but The unnecessary burden of the management means and then increase door lock administrator that need not centainly use alarm etc. excessively fierce.
2. it is not the very big channel of the stream of people in view of door lock is mainly used for indoor or gate, from the angle of hardware itself Investigative range is rationally arranged in degree(Such as 0.2 to 2 meters)On the basis of, will appear in any movement in investigative range people or Object is recorded without complicated logic judgment and operation but directly preservation without excessively paying close attention to its running orbit mode And can be further and for future reference by feedback signal upload network, for abnormal unlocking, damage lock or the behavior for being not turned off door leaf Be uploaded to alarm when appearance, send out prompt message etc..People to any movement or object in this way are realized close to door lock and begin to reality Security protection measure is applied, time dead angle is not stayed and manages the complex logic judgement for simply eliminating the prior art and algorithm such as threshold value Setting and time setting, control accuracy is high.
3. the mode that the normal management order for destroying door lock is got in is various, wherein mainly unlock including violence, Seize household's unlocking and skilled unlocking on both sides by the arms(Unlocking master-hand is not by key but technical method is used to unlock), for this to these types Unlocking mode, which gives management and control not only, can improve the recourse property of dual lock mode, monitoring property but also also comply with modern intelligence life Demand living.
4. the action unlocked for operation gives the monitoring of various dimensions for example to sound, image, the pickup of fingerprint and note Record, and this content can also realize real-time Transmission and record, can thus further increase to using door lock to get in people The recourse property of member.
According to above-mentioned technological thought, the present invention proposes a kind of door lock method for controlling opening and closing based on active security protection, the door Lock includes central controller, Moving Target Exploitation device, unlocking instruction pick device, photographic device, wireless networked device and locking Control mechanism, the Moving Target Exploitation device is for emission detection signal and can receive the spy locked the object in the external space and reflected It surveys signal and the central controller, the unlocking will be sent to the feedback signal corresponding to the reflected probe signal that is received Instruction pick device is used to pick up unlocking instruction and send unlocking signal corresponding with unlocking instruction to the central controller, The photographic device is imaged for outer scene on the door and sends the photo absorbed or image to the central controller, The wireless networked device realizes information exchange for allowing between the central controller and external network, the locking control machine Structure under the control of the central controller for that can allow the door lock that can unlock;It is characterized in that using side control as follows Method:
Step 1, startup power supply allows the door lock to enter detecting state;
Step 2, on the basis of step 1, the detection model of Moving Target Exploitation device as described in having enter into determining motive objects It encloses but motive objects has been moved off the investigative range of the Moving Target Exploitation device and packet is not carried out in the first time period of setting Any trigger action for triggering the unlocking instruction pick device is included, detecting state is maintained;
Step 3, on the basis of step 1, the detection model of Moving Target Exploitation device as described in having enter into determining motive objects It encloses but motive objects does not leave the investigative range of the Moving Target Exploitation device and implement normal in the first time period of setting Unlocking action, then start the photographic device and image;If the central controller verification belongs to authorization unlocking and refers at this time After enabling then open-and-close control mechanism, the locking control mechanism open, detecting state is returned to;
Step 4, on the basis of step 1, the detection model of Moving Target Exploitation device as described in having enter into determining motive objects It encloses but motive objects does not leave the investigative range of the Moving Target Exploitation device but and are not carried out in the first time period of setting Include any trigger action of the triggering unlocking instruction pick device, then the second time period of the setting after first time period It is interior to start the photographic device;
Step 5, on the basis of step 4, if motive objects and be not carried out including described in triggering in the second time period Any trigger action of unlocking instruction pick device and the investigative range for leaving the Moving Target Exploitation device then return to detecting State;
Step 6, on the basis of step 4, if motive objects do not leave the mobile target in the second time period The investigative range of detector simultaneously implements normal unlocking action, then the photographic device camera shooting;The central controller is such as at this time Fruit verification belongs to authorization unlocking instruction and then opens the locking control mechanism, after the locking control mechanism is opened, back to detecing Survey state;
Step 7, on the basis of step 4, if motive objects do not leave the mobile target in the second time period The investigative range of detector but and be not carried out include the triggering unlocking instruction pick device any trigger action, this second The photographic device starts to image after period;
Step 8, on the basis of step 7, if just implement normal unlocking action after the second time period, and should Unlocking action is later than the time of the started camera shooting of photographic device described in step 7, then is again started up the photographic device and images; The central controller opens the locking control mechanism, the locking control if verification belongs to authorization unlocking instruction at this time After mechanism is opened, detecting state is returned to;
Step 9, on the basis of step 7, if motive objects do not leave the mobile target after the second time period The investigative range of detector but always and be not carried out include the triggering unlocking instruction pick device any trigger action, then exist After the photographic device camera shooting, detecting state is returned to.
Accordingly, the present invention is it is also proposed that a kind of door lock control system based on active security protection, including is installed on door lock Moving Target Exploitation device, central controller, unlocking instruction pick device, photographic device, wireless networked device and locking control machine Structure, be provided in the central controller detector management module corresponding to the Moving Target Exploitation device, correspond to it is described The unlocking instruction management module of unlocking instruction pick device, corresponding to the locking control mechanism locking control management module, Camera management module corresponding to the photographic device and the Wireless Networking management module corresponding to the wireless networked device;Its It is characterized in that:
The Moving Target Exploitation device is for emission detection signal and can receive the spy locked the object in the external space and reflected It surveys signal and manages mould by the detector is sent to the feedback signal corresponding to the reflected probe signal that is received;
The unlocking instruction pick device for pick up external unlocking instruction and by with opening corresponding to the unlocking instruction Lock signal sends the unlocking instruction management module to;The unlocking instruction management module is for verifying unlocking instruction and verifying The locking control mechanism is opened in control after belonging to authorization unlocking instruction;
The photographic device is for absorbing the photo or dynamic image of scene outdoors and picture or image by the intake Send the camera management module to;The camera management module is used to detect motive objects simultaneously when the Moving Target Exploitation device And the motive objects do not leave in the first time period of setting and are not carried out including triggering the unlocking instruction pick device yet Any trigger action when start the photographic device, and do not left in the second time period of setting in the motive objects The photographic device camera shooting is controlled when any trigger action including triggering the unlocking instruction pick device is not carried out;It is described to take the photograph As management module is additionally operable to when receiving unlocking instruction or when external network sends out to the door lock instruction of inquiry environment, is opened The dynamic photographic device camera shooting;
The wireless networked device is mutual for realizing the real time information between the central controller and external network signal It changes;
The locking control mechanism be used for receive authorization unlocking instruction or external network send out unlocking to the door lock When instruction, is acted under the control that the locking controls management module and the door lock can be unlocked.
Wherein, the Moving Target Exploitation device be one kind can automatically receive and dispatch detectable signal such as infrared ray or microwave from And the mobile target in front of the detector can be detected.By the Moving Target Exploitation device it can be found that appointing close to door lock What mobile target such as people or mobile object(Referred to herein, generally, as motive objects).The detection range one of the Moving Target Exploitation device As setting from lock 0.2 to 2 meters between, specific range can be debugged according to the usage type of door lock.Secondly transmitting signal It can be continuous, can also be intermittence, to reduce the energy consumption of door lock, the present invention is using intermittent detection mode, when interval Between can greatly save energy consumption using interval detection techniques between 10 milliseconds to 200 milliseconds.In addition detectable signal is strong Degree can also be gradual, i.e., in standby mode(It can also be referred to as sense mode)Lower signal strength is minimum, and interval time is most It is long, when tentatively detection finds motive objects, then properly increases signal strength or development examination frequency and moved to improve whether there is The judgment accuracy of animal.
Wherein, the central controller is the control centre of door lock, it include various functions module mentioned in this article and Arithmetic center and memory can not only receive the signal that various sensors are transmitted, and can receive external network The various instructions provided, moreover it is possible to which various heat transfer agents are uploaded into external network and its terminal device such as computer, mobile phone in real time Or in APP.The central controller can be integrated controller, can also be to disperse corresponding to each controlled functional component It is arranged but the general name of the controller of mutual communicative, in this way when one of functional component is controlled work, other function parts Part may be at dormant state.
Wherein, the unlocking instruction pick device is a kind of device that can pick up unlocking instruction, such as can pick up and refer to The fingerprint detection head of line signal, the sensor that IC card signal can be picked up, the voice operated sensor that sound instruction signal can be picked up, Can pick up the face recognition device of types of facial makeup in Beijing operas signal, can pick up key unlocking signal sensing device or and can pick up destruction Property unlock caused by vibration signal door lock vibration inductive device etc., the related unlocking instruction of unlocking instruction pick device pickup Signal gives sending the central controller to after signal arranges.In general different signal characteristics is directed to need on door lock Corresponding, different sensors or detector are set to monitor, pick up different signals respectively.Herein it should be noted that, institute It is only one of a kind of mode unlocked to state unlocking instruction pick device pickup unlocking instruction, can also pass through external network in fact In APP to the central controller send the direct opening door lock of unlocking instruction, so for example when there is nonlocal kith and kin to come to visit, just It can directly be opened the door by remote operation without going home to open the door in person.
Wherein, the normal unlocking instruction is the enabled instruction action implemented to realize normally unlocking, such as in institute In the case of unlocking instruction pick device is stated with start button or proximity sensor, the start button or close sensing are triggered The action of device.The structure type of the unlocking instruction pick device is different, and the mode started can be different.For this purpose, just normally opened Lock instruction refers to the unlocking instruction that authorized person such as kinsfolk unlocks by normal mode, including directly normal unlocking or network Teleinstruction is normally unlocked.The normal unlocking instruction that wherein authorized person unlocks by normal mode is since input error differs surely It is enough to be received and be judged as false command to need to verify repeatedly, such as in the occasion of fingerprint recognition, since finger is placed It excessively deviates not recognized and is read as work(.For this purpose, be able to verify that by belong to authorization unlocking instruction, otherwise belong to unauthorized unlocking Instruction.Include again a kind of abduction unlocking instruction in the wherein described authorization unlocking instruction, will be described hereinafter.
In the technical solution including step 2, include " and be not carried out including triggering the unlocking instruction pick device Any trigger action " technical characteristic, this feature define two aspects, are that the object being triggered includes but not limited on one side The unlocking instruction pick device can also be doorbell, special start key, voice operated sensor etc., be " to touch on the other hand Hair " had both included the starting operation for directly triggering such as pressing keys, also including triggering indirectly for example by position sensor with non- Contact induction is with the presence or absence of starting operation, by voice operated sensor with non contact angle measurement enabling voice activation and its instruction Deng.
The locking control mechanism, can be it is a kind of can directly drive undertake locking functions lock tongue part action it is automatically controlled Device can also be the actuator of the handle clutch in door lock, when the locking control mechanism drives the clutch operating When door handle and the lock tongue can be allowed to form linkage and then unlocked by means of the external drives part such as door handle driving lock tongue.
The external network refers not only to internet, also refers to the fixed terminal being connect with internet or mobile terminal and operation APP controllers etc..
The first time period, second time period are the preset periods, first time period are arranged, and in setting First time period just starts the photographic device later, can filter out and accidentally swarm into the mobile target spy belonging to for the overwhelming majority The motive objects surveyed in device investigative range greatly reduce the photographic device such as the neighbours passed by or the child to play The frequency of startup.Second time period is set, primarily to reserving the enough startup time to the photographic device(General camera shooting The startup time of device could implement camera shooting between 1 second to 5 seconds, after startup), people is strayed into also for filtering external again Member.And the length of the first time period is set, also related with the detection range set by the Moving Target Exploitation device, detection The setting length of the remote then described first time period of distance can be grown.Generally the first time period is arranged for we in practice Between 3 seconds to 10 seconds, and the second time period is set between 1 second to 5 seconds.
The detecting state is primarily referred to as in addition to the Moving Target Exploitation device and its driving Moving Target Exploitation device The central control module of work is in running order outer, other energy-consuming parts is allowed as possible in a dormant state, to save as possible Energy consumption, but be not equal to and say that other all electrical parts do not work, such as power supply indicator can be constantly in luminance, And whether have the proximity sensor of starting operation, voice operated sensor can always work, can also start in button if incuding It is lower just to work.Thus in the detecting state central controller controls preferably control the unlocking instruction pick device, Photographic device, wireless networked device in a dormant state, to save energy consumption as possible, can also improve the service life of product.
According to above-mentioned technical proposal, be compared with the prior art, it can be found that its it is beneficial have technical effect that, from hardware The angle of itself is rationally arranged on the basis of investigative range, will appear in any motive objects in investigative range and normal unlocking Action filters without complicated logical operation but using the period invalid motive objects signal, not only saving energy consumption and And malfunction can also be greatly reduced, both can guarantee safety or intelligent door lock can be allowed not disturb people's thing as what is frequently alarmed.
If further technical solution be also possible that the central controller verification belong to unauthorized unlocking instruction and It still cannot be verified in verification delay time, then will not start the locking control mechanism, it is described after verification delay Door lock enters detecting state.
Further technical solution is also possible that be terminated in central controller verification delay, the central controller Normal unlocking instruction management module enter dormant state after, again be delayed the third period after could wake up the normal unlocking Instruct management module.The third period is set, is to filter out human interference trigger action.The third period, one As be 3 minutes or so.
Further technical solution is also possible that the unlocking instruction, which is divided into normal unlocking instruction and abnormal unlocking, to be referred to Enable, the exception unlocking instruction include kidnap unlocking instruction or and destructive unlocking instruction;When the central controller receives When abnormal unlocking instruction, not only starts the photographic device and image, and synchronized to outside by the wireless networked device Transmission of network alarm signal.Accordingly, the door lock control system further invented, the unlocking instruction management module include normal Unlocking instruction management module and abnormal unlocking instruction management module, the exception unlocking instruction management module include kidnapping to unlock to refer to Enable management module or and destructive unlocking instruction management module;The exception unlocking instruction management module be used for receive it is different After normally opened lock information, not only starts the photographic device and image and the photograph is transmitted by the wireless networked device external network Piece, and alarm signal is transmitted by the wireless networked device external network.
The exception unlocking instruction is relative to the normal unlocking instruction and the definition that provides, including kidnaps unlocking instruction Or and destructive unlocking instruction.
The unlocking instruction of kidnapping is that a kind of crisis that has been preset in the central controller in advance is referred to using management It enables(Such as in the door lock using fingerprint management, it is normal unlocking fingerprint that can input right index finger fingerprint, can be previously entered the right side Middle finger fingerprint is that crisis uses fingerprint;Key number, one " today is very tired " that a string of crises use for example are set in advance again Etc. special language etc.);The crisis instruction that generally preset crisis control uses in the central controller in advance, this Kind of crisis instruction only has that setting person oneself or relatives know and others is unclear, and when crisis occurs, the people being held as a hostage can It is in addition opened the door using crisis unlocking instruction preset in advance with unlocking without using normal unlocking instruction(It can certainly be arranged For the function that cannot be opened the door)Although can open the door according to the instruction of hijacker, when the unlocking instruction pick device receives Corresponding hijacked signal is sent to be arranged in the central controller abnormal unlocking instruction after to this abduction unlocking instruction Management module, the exception unlocking instruction management module receive after this signal it is synchronous, in real time external network send out by The caution signal unlocked is kidnapped, consequently facilitating property management unit, police or household try rescue or urgent inquiry, but this alarm signal Breath appears in remote location, and bad person does not know that the central controller has been alarmed.When sending out various warnings, it can also pass through External network looks into the camera shooting data of misfeasor.It can be convenient for the central controller using the abduction unlocking instruction thus It identifies and transmits the behavior of being held as a hostage but be not necessarily required to that special sensor or pick device is arranged to pick up, such as fingerprint pickup Head can pick up normal unlocking instruction, can also pick up abduction unlocking instruction.
The destructiveness unlocking instruction refers to that the violence of the direct mechanical structure for destroying door lock is unlocked.In extreme circumstances Bad person is generally registered one's residence using the violence mode for directly destroying door lock, such as is directly broken door lock, directly bored unlocking using impact drill Head etc., these destructions action all can cause door lock by violent vibrations.Door lock Vibration induction can be set in door lock thus Device picks up this unconventional door lock vibration signal and this vibration signal is transmitted directly in the central controller The abnormal unlocking instruction management module of middle setting;The exception unlocking instruction management module synchronizes after receiving this signal, is real When external network send out the caution signal of destructive unlocking, consequently facilitating property management unit, police or household try rescue or Urgent inquiry, certain administrative staff also can judge that door lock is existing by means of this destructive unlocking signal and camera shooting Information integration Whether what happens field belongs to abnormal.
Wherein, the alarm signal refers to the personnel such as energy especially prompting door lock administrative staff, property management personnel or police Special suggestion signal, picture or short message, alarm call, blinker etc..
Further technical solution, which is also possible that, to be received outside such as the central controller by the wireless networked device Portion inquire outdoor environment instruction when, start the photographic device and image and by the wireless networked device external network Transmission absorbed picture or image, inquiry finish or are finished in inquiry and allow the central controller to open by external command After the locking control mechanism, detecting state is returned to.
After further technical solution is also possible that the photographic device camera shooting, photo or Dynamic Graph that it is absorbed As being stored directly in the memory of the central controller or/and being transmitted by the wireless networked device external network.
Further technical solution is also possible that the door leaf for further including to connect with the central controller is closed induction dress It sets, the door leaf is closed sensing device and is used to perceive whether door leaf to be closed signal in place;When the central controller is logical When crossing the door leaf and being closed sensing device and receive the not closed signal in place of door leaf and do not solved within the reasonable time, start institute It states the included buzzer of door lock and sends out prompt tone Huo and the external network transmission not closed alarm signal in place of door leaf.It is corresponding , the door lock control system further invented is additionally provided with door leaf in the central controller and is closed management module, further include with The door leaf of the central controller connection is closed sensing device, and the door leaf is closed whether sensing device can perceive door leaf It is closed signal in place;The door leaf is closed management module and is used to receive door leaf patent by door leaf closure sensing device When closing signal in place and not solved within the reasonable time, door leaf patent is transmitted by the wireless networked device external network Close alarm signal in place.Wherein, the door leaf is closed sensing device, is a kind of closed in door leaf or in the state of being left unlocked or unlatched When can incude door lock and whether locked the sensing device of closure.It is then generally not necessarily to make this sense when door leaf is opened completely It should act.According to the program, the information that the door leaf is closed whether door leaf is closed by sensing device is transmitted directly in described The door leaf being arranged in the controller of centre is closed management module;If door leaf closed but door lock and unlocked closure and more than reasonable The time of such as 10 seconds or more time or door leaf are in state of being left unlocked or unlatched and more than the time of such as 10 seconds or more reasonable time, institute It states after door leaf closure management module receives this signal and synchronizes, sends external network in real time.Administrative staff can be by In the inspection with high safety of this signal, if it is abnormal to there is locking.
Further technical solution is also possible that further include the display device being connect with the central controller, works as triggering When the Show Button, start the photographic device and the display device, the photographic device camera shooting is simultaneously passed to the display device Send absorbed photo or image.Door lock control system that is corresponding, further inventing further includes and the camera management module The display device of connection, the display device can when triggering the Show Button by the camera management module to the display Device transmits the photo of scene outdoors or dynamic image that the photographic device is absorbed.Described in wherein described the Show Button and startup The start button of unlocking instruction pick device can be the same button, can also be separated two buttons.In the display In the case of button and the start button for starting the unlocking instruction pick device are the same button, so that it may with described in startup When the Show Button, unlocking action is synchronous with camera shooting, Display Realization.
Further technical solution is also possible that further include the sound pick up equipment being connect with the central controller and playback dress It sets, when triggering intercommunication button, starts the sound pick up equipment and playback set realizes intercommunication call.In this way can by sound control with regard Frequency control, which merges, to be carried out.The wherein described intercommunication button can be combined into one with described the Show Button.
Further technical solution is also possible that further include the detection indicator light being connect with central controller signal, works as institute When stating Moving Target Exploitation device and having detected motive objects target, the light of the detection indicator light lights to use the detection The light of indicator light refers to the Moving Target Exploitation device and has detected motive objects target.
According to said program, the abnormal conditions of appearance are just especially uploaded to including alarm, send out carrying for alarm type Show information etc..That is, main points are placed on the state management and control to door lock itself, for being not belonging to any behavior example of abnormal start-up door lock As close to door lock behavior, close to door lock for a long time without departing from behavior, triggering doorbell behavior either normally-open door lock row For etc., then only take common surveillance and control measure(Record preserves information), alarming and managing pattern might not be used.In this way to appointing What motive objects, if close to door lock can direct monitoring, do not stay time dead angle, will not continually bother administrator, and The setting of the complex logic algorithm such as threshold value of the prior art and the setting of time are eliminated, control accuracy is high.Wherein, from movement Object occurs starting to this secondary control process to terminate(Unlocking gets in and closes the door or passerby has been moved off), the central controller Always it is in the implementation Process whole-process control that job control state is the process, unlocking, shutdown or the damage lock that occur to motive objects Monitoring.
Wherein, the photographic device is usually to be mounted on video camera on door lock outer panel, and the display device can both pacify On the backboard for filling door lock, indoor other places can also be mounted on.It, can be in the display device after the photographic device starts On intuitively check scene dynamics image conditions outdoors, can also pass through APP remote reviewings scene dynamics situation outdoors.
Wherein, described the Show Button is a kind of hand push button being arranged in door lock backboard or indoor other places, when manual Outdoor scene dynamics situation outdoors can be viewed when pressing described the Show Button by photographic device.
Under normal circumstances, the camera management module, photographic device and display device may be in sleep state, but Need the when of being inquired by external network such as APP, when motive objects occur, when there is unlocking signal(Including normal unlocking instruction, When there is alarm in abduction unlocking instruction), start the Show Button when, or door lock by mechanicalness tap or strenuous vibration percussion When signal, just start the photographic device and display device, to can not only record the personal information using door lock, Er Qiebian Whether belong to legal authorization personnel also by the specifically used personnel of long-range mode such as APP inquiry door locks in door lock administrator It is bad person.Wherein, when motive objects appear in investigative range, it is not essential however to which camera management module described in synchronous averaging is taken the photograph As device and display device, it can delay completely several seconds and restart the camera management mould after waiting detections determination to understand motive objects In general block, photographic device and display device need certain time from detection motive objects are started to completely specified degree, Setting deferred action not only simplifies control management logic, and more can guarantee the accuracy of judgement.
Further technical solution is also possible that after the central controller receives low voltage signal, synchronously to External network transmits low-voltage alarm signal.Accordingly, the intelligent security control system further invented, which is characterized in that institute It states and is additionally provided with low-voltage management module in central controller, the low-voltage management module in the central controller for connecing After receiving low voltage signal, synchronously external network transmits low-voltage alarm signal, is supplied to prompt user to replace at once Battery.
According to above-mentioned technical proposal and its intentional technique effect, present invention could apply to intelligent door lock products.
Description of the drawings
Fig. 1 is the system module structural schematic diagram using technical solution of the present invention;
Fig. 2 is the structural schematic diagram using the central controller of technical solution of the present invention;
Fig. 3 is the control program schematic diagram using technical solution of the present invention.
Specific implementation mode
1 attached drawing 3 is arrived below in conjunction with the accompanying drawings, the intelligent door lock system and its control method of application technical solution of the present invention are made Further illustrate.
As shown in Fig. 1 to Fig. 3, a kind of door lock control system based on active security protection, including door lock, be installed on door lock Power supply, Moving Target Exploitation device, central controller, unlocking instruction pick device, door lock vibration inductive device, door leaf are closed induction Device, photographic device and display device, the Show Button, sound pick up equipment and playback set, door bell device, wireless networked device, lock Close control mechanism etc..In addition, being provided with the detector pipe corresponding to the Moving Target Exploitation device in the central controller Manage module, corresponding to the unlocking instruction management module of the unlocking instruction pick device(Normal unlocking instruction management module, exception Unlocking instruction management module), corresponding to locking control mechanism locking control management module, correspond to the wireless networked device Wireless Networking management module, low-voltage management module, corresponding to the photographic device and display device camera management module, The door leaf that sensing device is closed corresponding to the door leaf is closed management module, corresponding to the sound of the sound pick up equipment and playback set The submodules such as sound management module;The wherein described abnormal unlocking instruction management module includes kidnapping unlocking instruction management module, breaking again Bad property unlocking instruction management module.Can also in the central controller the integration environment control module such as curtain, door and window, family The control module of fulgurite reason, can pass through the central controller integrated control indoor environment of door lock in this way.Due to the present invention Used control structure, control logic are simple, and control process is also very simple accordingly thus, is compared with the prior art significantly Speed, precision and the reliability of the control operation of raising.Wherein:
The Moving Target Exploitation device is for emission detection signal and can receive the spy locked the object in the external space and reflected It surveys signal and the central controller will be sent to the feedback signal corresponding to the reflected probe signal that is received.The movement Target detector can automatically receiving and transmitting signal such as infrared ray or microwave so as to detecting the movement in front of the detector Target.By the Moving Target Exploitation device it can be found that constantly close to any mobile the target such as people or motive objects of door lock Body.The detection range of the Moving Target Exploitation device be generally located on from lock 0.2 to 2 meters between such as 0.2 meter, 0.3 meter, 0.5 Rice etc., specific range can be debugged according to the usage type of door lock, detection range too far not only energy consumption it is big but also It is also a kind of detector of short distance not have any practical significance, the Moving Target Exploitation device.Secondly transmitting signal can be Continuously, can also be intermittence, in order to reduce the energy consumption of door lock, the present invention is existed using intermittent detection mode, interval time Between 10 milliseconds to 200 millimeters;In addition, the intensity of detectable signal can also be gradual, i.e. signal strength in stand-by mode It is minimum, interval time longest, when preliminary detection finds motive objects, then properly increase signal strength or development examination frequency to The judgment accuracy with the presence or absence of motive objects is improved, does not need to need to first determine whether motive objects as prior art at this time Activity pattern decides whether to alarm again.
The central controller is the control centre of door lock, it includes in various functions module mentioned in this article and operation The heart also includes memory information and various detection sensor information data for storing instruction, can not only receive, operation, tune The signal that various sensors are transmitted is spent, and the various instructions that external network provides can be received, moreover it is possible to by various sensings Information is uploaded in real time in the terminal device such as computer, mobile phone or APP of external network.
The unlocking instruction pick device for pick up external unlocking instruction and by with opening corresponding to the unlocking instruction Lock signal sends the unlocking instruction management module to;The unlocking instruction management module is for verifying unlocking instruction and verifying The locking control mechanism is opened in control after belonging to authorization unlocking instruction;The unlocking instruction pick device, which is one kind, to be picked up The device of unlocking instruction is taken, such as the fingerprint detection head of fingerprint signal, the sensor that IC card signal can be picked up, energy can be picked up Enough the face recognition device of pickup types of facial makeup in Beijing operas signal, can pick up key unlocking signal sensing device or and can pick up destructiveness The door lock vibration inductive device etc. of vibration signal caused by unlocking, can be by triggering described the Show Button come described in normal start Unlocking instruction pick device, allowing unlocking instruction pick device revival to power on the related unlocking instruction signal of pickup, to give signal whole Send the central controller after reason to.In general be directed to different signal characteristic needs be arranged on door lock it is corresponding, no With sensor or detector monitor, pick up different signals respectively, can also pick up difference by the same sensor Unlocking instruction can for example use fingerprint pick-up head or digital keys to pick up normal unlocking instruction and kidnap unlocking instruction.
If the motive objects close to door lock implement unlocking instruction close to door lock, picked up by the unlocking instruction pick device External unlocking instruction simultaneously will be also passed to the central controller, the center with the unlocking signal corresponding to the unlocking instruction Controller works on and implements to control accordingly;For the unlocking instruction of input, divides into normal unlocking instruction and exception is opened Lock instructs and accordingly makes two kinds of judgements;After the central controller receives normal unlocking instruction and verification belongs to mandate The locking control mechanism is then opened when unlocking instruction, else if verification be then not turned on when belonging to unauthorized unlocking instruction it is described Locking control mechanism;When the central controller receives abnormal unlocking instruction(Exception information)After can record, to preserve this different Yet synchronously external network transmits alarm signal to normal information.It is described exception unlocking instruction mainly include kidnap unlocking instruction, Destructive unlocking instruction etc..
The unlocking instruction of kidnapping is that a kind of crisis that has been preset in the central controller in advance is referred to using management It enables(Such as in the door lock using fingerprint management, it is normal unlocking fingerprint that can input right index finger fingerprint, can be previously entered the right side Middle finger fingerprint is that crisis uses fingerprint);Generally preset crisis controls the danger used in the central controller in advance Machine instructs, and this crisis instruction only has that setting person oneself or relatives know and others is unclear, when crisis occurs, is robbed The people held can not use normal unlocking instruction and unlock but in addition be opened the door using crisis unlocking instruction preset in advance, although energy It is enough to open the door according to the instruction of hijacker, but will be right after the unlocking instruction pick device receives this abduction unlocking instruction The hijacked signal answered(Exception information)Send the abnormal unlocking instruction management module being arranged in the central controller to, it is described different Normal unlocking instruction management module not only records the preservation abnormal unlocking signal information after receiving this abnormal signal and leads to Cross that synchronous, external network sends out the caution signal for unlocking of being held as a hostage in real time, consequently facilitating property management unit, police or household set Method is saved or urgent inquiry, but this warning message appears in remote location, and bad person has not known the central controller Alert.When sending out various warning messages, the camera shooting data of misfeasor can also be looked by external network.Thus The behavior of being held as a hostage can be identified and transmit using the abduction unlocking instruction convenient for the central controller but is not necessarily required to set Special sensor or pick device are set to pick up, such as fingerprint pick-up head can pick up normal unlocking instruction, can also pick up misfortune Hold unlocking instruction.
The destructiveness unlocking instruction refers to the violence unlocking action of the direct mechanical structure for destroying door lock.In extreme feelings Bad person can use the violence mode for directly destroying door or door lock register one's residence under condition, such as directly break door lock, direct using impact drill Unlocking head etc. is bored, these destructions action all can cause door lock by violent vibrations.Door lock shake can be set in door lock thus Dynamic sensing device picks up this unconventional door lock vibration signal(Exception information)And this vibration signal is transmitted directly to The abnormal unlocking instruction management module being arranged in the central controller;The exception unlocking instruction management module receives this Not only record preserves the abnormal unlocking signal information and by synchronization, external network is sent out in real time after kind of abnormal signal The caution signal that destructiveness is unlocked, consequently facilitating property management unit, police or household try rescue or urgent inquiry, certain administrator Whether member also can judge what happens door lock is live by means of this destructive unlocking signal and camera shooting Information integration Belong to abnormal.The sound management module can also be driven to realize pickup and playback intercommunication function.Certainly there are motive objects simultaneously And after long-range APP obtains this information alert, the central controller transmission camera shooting, recording can also be instructed by long-range APP In information to APP.
The door lock vibration inductive device, for perceiving door lock by mechanicalness percussion or the knocking and biography of strenuous vibration Abnormal unlocking instruction management module set in the central controller is given, is received by the door lock vibration inductive device After the knocking arrived, the central controller, which not only records, preserves the abnormal signal information and synchronously external network The alarm signal that transmission door lock is tapped.
The door leaf is closed sensing device, be it is a kind of door leaf closed or in be left unlocked or unlatched state when can incude door lock The sensing device for closure of whether having locked.It is then generally not necessarily to make this induction action when door leaf is opened completely.According to this Scheme, if door leaf closed but door lock and it is unlocked closure and more than such as 10 seconds or more reasonable time time or door For fan in state of being left unlocked or unlatched and more than the time of such as 10 seconds or more reasonable time, the door leaf is closed sensing device by this signal It is transmitted directly to the door leaf being arranged in the central controller and is closed management module;The door leaf is closed management module and receives It synchronized after this signal, send external network in real time.Administrative staff can be by means of the inspection with high safety of this signal It is no to there is locking exception.
The photographic device and display device, wherein the photographic device is usually to be mounted on door lock outer panel to image Machine, the display device can both be installed on the backboard of door lock, and indoor other places can also be mounted on.The photographic device After startup, outdoor scene dynamic image situation can be intuitively checked on said display means, can also pass through APP remote reviewings room Outer scene dynamic image situation.The photographic device is for absorbing the photo or dynamic image of scene outdoors and the figure that will be absorbed Piece or picture signal send the camera management module to;The camera management module is used to visit when the Moving Target Exploitation device It measures motive objects and the motive objects does not leave in the first time period of setting and are not carried out including triggering the unlocking yet Start the photographic device when any trigger action for instructing pick device, and the motive objects setting second time period Not leaving when that any trigger action including triggering the unlocking instruction pick device is also not carried out inside controls the camera shooting and fills Set camera shooting;The camera management module is additionally operable to when receiving unlocking instruction or external network sends out inquiry ring to the door lock When the instruction in border, start the photographic device camera shooting.
Described the Show Button is a kind of hand push button being arranged in door lock backboard or indoor other places, works as Manual press When described the Show Button, outdoor ambient conditions can be viewed by display device.
Under normal circumstances, the photographic device and display device may be at sleep state, but need to pass through extranets When network such as APP inquiries, when motive objects occur, when there is unlocking signal(Go out including normal unlocking instruction, abnormal unlocking instruction When existing alarm), start the Show Button when, or door lock by mechanicalness tap or strenuous vibration knocking when, just startup The photographic device and display device to can not only record the personal information using door lock, but also are convenient for door lock administrator Whether the specifically used personnel that door lock is inquired by long-range mode such as APP belong to legal authorization personnel or bad person.
The wireless networked device, it is mutual for realizing the real time information between the central controller and external network signal It changes;After the central controller receives motive objects signal or unlocking signal, further by the wireless networked device by this A little signal synchronous drivings are passed to the command signal of external network or external network by the wireless networked device described Central controller, allow the central controller to provide relevant information for example whether in the presence of motive objects outdoors, camera shooting, pickup information to External network.
The locking control mechanism be used for receive authorization unlocking instruction or external network send out unlocking to the door lock When instruction, is acted under the control that the locking controls management module and the door lock can be unlocked.
The door bell device, for driving the doorbell management module being arranged in the central controller in triggering, into And can synchronously external network or and the playback set transmit voice signal.In this way by the door bell device be come Visit person provides the function of the visiting request of prompt, and the information Perception transmitted by the doorbell management module outdoors visiting Person especially can also inquire visitor by external networks.Such as administrator is after learning the signal that someone comes to visit, it can be with Order-driven camera shooting is sent out to the central controller with remote mode by external network or voice inter-speaking system is checked, interrogated Visitor.The door bell device and described the Show Button can be combined into one in the present invention.
Secondly, low-voltage management module is set in the central controller, when the central controller receives low electricity Press signal(Exception information)Afterwards, synchronously external network transmits low-voltage alarm signal, to prompt user to replace at once Supplying cell.Secondly as the content of information collection and storage is relatively more, for the storage being stored in the central controller Information in device is also stored in the information in external network, the pattern periodically removed can be taken, generally, for normal Information storage one day to one month just enough, also enough for abnormality information storage 1 year.
Using above system, the control method for door lock based on active security protection being arranged as shown in Figure 3 is as follows:
Step 1, startup power supply allows the door lock to enter detecting state;At this point, the unlocking instruction pick device, camera shooting dress Set, wireless networked device and locking control mechanism are in standby in other words all in dormant state, to reduce electric energy Loss;Power supply indicator is also set up on the door lock, is used to indicate electric energy size.
Step 2, on the basis of step 1, as motive objects enter the investigative range of the Moving Target Exploitation device but are setting Motive objects have been moved off the investigative range of the Moving Target Exploitation device and are not carried out in fixed first time period such as 3 to 6 seconds Any trigger action including triggering the unlocking instruction pick device, door bell device etc., the door lock maintain detecting state; In this step 2, after motive objects enter in the investigative range of the Moving Target Exploitation device and determine, it is arranged on the door lock The detection indicator light being connect with the central controller signal light, to it is described detection indicator light light reference described in Moving Target Exploitation device has detected motive objects target.
Step 3, on the basis of step 1, as motive objects enter the investigative range of the Moving Target Exploitation device but are setting Motive objects do not leave the investigative range of the Moving Target Exploitation device and implement normal unlock and move in fixed first time period Make, then starts the photographic device and image;If the unlocking instruction management module verification of the central controller belongs at this time Then open-and-close control mechanism returns to detecting state after the locking control mechanism unlatching for authorization unlocking instruction;It is described at this time Camera shooting can be stored in the memory of the central controller by central controller, can also upload to the storage of external network In device or in APP, due to belonging to normal unlocking action, the central controller is not necessarily to send out alarm signal to outside thus;According to The step then starts the camera shooting dress as long as any time point in the first time period implements normal unlocking action It sets and images;Certainly, as long as any time point in the first time period implements any abnormal unlocking action, also start The photographic device simultaneously images, and the central controller also can external network transmission alarm signal;
Step 4, on the basis of step 1, in the first time period of setting motive objects do not leave as described in mobile mesh It marks the investigative range of detector but and any triggering including triggering the unlocking instruction pick device, door bell device etc. is not carried out Action, then the second time period of the setting after first time period start the photographic device in such as 1 to 3 seconds, described in startup Photographic device implements camera shooting for next step and provides preparation;
Step 5, on the basis of step 4, if motive objects and be not carried out including described in triggering in the second time period Any trigger action of unlocking instruction pick device, door bell device etc. and the investigative range for leaving the Moving Target Exploitation device, Then the door lock returns to detecting state;
Step 6, on the basis of step 4, if motive objects do not leave the mobile target in the second time period The investigative range of detector simultaneously implements normal unlocking action, then the photographic device camera shooting;The central controller at this time Unlocking instruction management module opens the locking control mechanism, the locking control machine if verification belongs to authorization unlocking instruction After structure is opened, the door lock returns to detecting state;
Step 7, on the basis of step 4, if motive objects do not leave the mobile target in the second time period It the investigative range of detector but and is not carried out dynamic including any triggering for triggering the unlocking instruction pick device, door bell device etc. Make, the photographic device starts to image after the second time period;I.e. for the motive objects for resting on the lock external space, although stopping But if the time have arrived at second time period do not implement trigger gate lock action then only image but without externally transmission report Alert signal.
Step 8, on the basis of step 7, if just implement normal unlocking action after the second time period, and should Unlocking action is later than the time of the started camera shooting of photographic device described in step 7, then is again started up the photographic device and images; The unlocking instruction management module of the central controller opens the locking control if verification belongs to authorization unlocking instruction at this time Mechanism processed after the locking control mechanism is opened, returns to detecting state;
Step 9, on the basis of step 7, if motive objects do not leave the mobile target after the second time period It the investigative range of detector but always and is not carried out and is touched including triggering any of the unlocking instruction pick device, door bell device etc. Start to make, then after the photographic device images, the door lock returns to detecting state.I.e. for resting on the lock external space Motive objects, although but if the residence time already exceed second time period do not implement trigger gate lock action then only imaged But without externally transmission alarm signal.
In above-mentioned steps, refer to if the unlocking instruction management module verification of the central controller belongs to unauthorized unlocking It enables and still cannot be verified in verification delay time, then will not start the locking control mechanism, verification delay terminates Afterwards, the door lock enters detecting state.Further, terminate in central controller verification delay, the normal unlocking refers to After enabling management module enter dormant state, again be delayed such as 3 minutes or so third period time after could wake up described in Normal unlocking instruction management module.
In above-mentioned steps, the unlocking instruction is further divided into normal unlocking instruction and abnormal unlocking instruction, institute State abnormal unlocking instruction include kidnap unlocking instruction or and destructive unlocking instruction;When the central controller receives exception When unlocking instruction, not only start the photographic device and image, and external network is synchronized by the wireless networked device Transmit alarm signal.
In above-mentioned steps, further, such as central controller is received for example by the wireless networked device When APP external inquiry outdoor environments instruct, starts the photographic device and image and by the wireless networked device to outside The picture or image that transmission of network is absorbed, inquiry finish or are finished in inquiry and allow the central controller by external command After opening the locking control mechanism, detecting state is returned to.
In above-mentioned steps, further, after the photographic device camera shooting, the photo or dynamic image that it is absorbed are straight It connects and is stored in the memory of the central controller or/and is transmitted by the wireless networked device external network.
In above-mentioned steps, further, received when the central controller is closed sensing device by the door leaf The not closed signal in place of door leaf and when not solved within the reasonable time, starts the included buzzer of the door lock and sends out prompt tone Huo and external network transmit the not closed alarm signal in place of door leaf.
In above-mentioned steps, further, when triggering the Show Button, start the photographic device and display dress It sets, the photographic device camera shooting simultaneously transmits absorbed photo or image to the display device.
In above-mentioned steps, further, when triggering intercommunication button, starts the sound pick up equipment and playback set is realized Intercommunication is conversed.
Further include the detection indicator light being connect with central controller signal, when the shifting further in above-mentioned steps When moving-target detector has detected motive objects target, the light of the detection indicator light lights to be indicated with the detection The light of lamp refers to the Moving Target Exploitation device and has detected motive objects target.

Claims (4)

1. the door lock opening control system based on active security protection, including be installed on door lock Moving Target Exploitation device, center control Device, unlocking instruction pick device, photographic device, wireless networked device and locking control mechanism processed are set in the central controller It is equipped with the detector management module corresponding to the Moving Target Exploitation device, corresponding to the unlocking of the unlocking instruction pick device Instruct management module, corresponding to the locking control management module of the locking control mechanism, taking the photograph corresponding to the photographic device Wireless Networking management module as management module and corresponding to the wireless networked device;It is characterized in that:
The Moving Target Exploitation device is for emission detection signal and can receive the detection letter locked the object in the external space and reflected Number and the detector management module will be sent to the feedback signal corresponding to the reflected probe signal that is received;
The unlocking instruction pick device is used to pick up external unlocking instruction and will believe with the unlocking corresponding to the unlocking instruction Number send the unlocking instruction management module to;The unlocking instruction management module is for verifying unlocking instruction and belonging in verification The locking control mechanism is opened in control after authorization unlocking instruction;
The photographic device is for absorbing the photo or dynamic image of scene outdoors and transmitting the picture of the intake or image To the camera management module;The camera management module is used to detect motive objects and institute when the Moving Target Exploitation device It states motive objects and does not leave times being also not carried out including triggering the unlocking instruction pick device in the first time period of setting Start the photographic device when what trigger action, and is not left in the second time period of setting in the motive objects also unreal The photographic device camera shooting is controlled when applying any trigger action including triggering the unlocking instruction pick device;The pick-up tube When reason module is additionally operable to when receiving unlocking instruction or external network sends out the instruction of inquiry environment to the door lock, start institute State photographic device camera shooting;
The wireless networked device exchanges for realizing the real time information between the central controller and external network signal;
The locking control mechanism be used for receive authorization unlocking instruction or external network send out unlocking instruction to the door lock When, it is acted under the control that the locking controls management module and the door lock can be unlocked.
2. control system according to claim 1, which is characterized in that further include connect with the camera management module it is aobvious Showing device, the display device can be transmitted by the camera management module to the display device when triggering the Show Button The photo of scene outdoors or dynamic image that the photographic device is absorbed.
3. control system according to claim 1, which is characterized in that the unlocking instruction management module includes normal unlocks Management module and abnormal unlocking instruction management module are instructed, the exception unlocking instruction management module includes kidnapping unlocking instruction pipe Manage module or and destructive unlocking instruction management module;The exception unlocking instruction management module is used to receive abnormal open After lock information, not only starts the photographic device and images and the photo is transmitted by the wireless networked device external network, And alarm signal is transmitted by the wireless networked device external network.
4. control system according to claim 1, which is characterized in that be additionally provided with door leaf closure in the central controller Management module further includes that the door leaf being connect with the central controller is closed sensing device, and the door leaf is closed sensing device energy Whether enough perception door leafs have been closed signal in place;The door leaf is closed management module and is used to be closed induction by the door leaf It is outside by the wireless networked device when device receives the not closed signal in place of door leaf and do not solved within the reasonable time The not closed alarm signal in place of portion's transmission of network door leaf.
CN201720555993.8U 2017-03-01 2017-05-18 Door lock opening control system based on active security protection Expired - Fee Related CN207660394U (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710150504 2017-03-01
CN2017101505045 2017-03-14

Publications (1)

Publication Number Publication Date
CN207660394U true CN207660394U (en) 2018-07-27

Family

ID=59529380

Family Applications (5)

Application Number Title Priority Date Filing Date
CN201710353274.2A Withdrawn CN107093244A (en) 2017-03-01 2017-05-18 Abnormal unlocking control method based on door lock
CN201710353272.3A Active CN107023224B (en) 2017-03-01 2017-05-18 Door lock opening control method and system based on active security
CN201720555993.8U Expired - Fee Related CN207660394U (en) 2017-03-01 2017-05-18 Door lock opening control system based on active security protection
CN201710354235.4A Active CN107093245B (en) 2017-03-01 2017-05-18 Door lock and doorbell control method and system based on active security
CN201720556485.1U Expired - Fee Related CN206757739U (en) 2017-03-01 2017-05-18 Door lock doorbell control system based on active security protection

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN201710353274.2A Withdrawn CN107093244A (en) 2017-03-01 2017-05-18 Abnormal unlocking control method based on door lock
CN201710353272.3A Active CN107023224B (en) 2017-03-01 2017-05-18 Door lock opening control method and system based on active security

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201710354235.4A Active CN107093245B (en) 2017-03-01 2017-05-18 Door lock and doorbell control method and system based on active security
CN201720556485.1U Expired - Fee Related CN206757739U (en) 2017-03-01 2017-05-18 Door lock doorbell control system based on active security protection

Country Status (1)

Country Link
CN (5) CN107093244A (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107762282B (en) * 2017-11-16 2023-07-18 广东樱花智能科技有限公司 Intelligent lock
DE102017011683A1 (en) * 2017-12-18 2019-06-19 Dräger Safety AG & Co. KGaA Gas measuring device
CN111630578B (en) * 2018-01-22 2022-07-22 亚萨合莱有限公司 Determining when an intrusion attempt is in progress
CN108347589A (en) * 2018-03-06 2018-07-31 卢竹林 A kind of area monitoring method and device
CN108412315B (en) * 2018-03-22 2020-05-26 深圳市创维群欣安防科技股份有限公司 Intelligent door lock warning system and control method thereof
CN110295796A (en) * 2018-03-22 2019-10-01 中兴通讯股份有限公司 A kind of intelligent door lock alarm method and device
CN108806043A (en) * 2018-06-12 2018-11-13 广东美的暖通设备有限公司 Door latch structure and detection method
CN111311786A (en) * 2018-11-23 2020-06-19 杭州眼云智家科技有限公司 Intelligent door lock system and intelligent door lock control method thereof
CN109098543A (en) * 2018-07-12 2018-12-28 安徽先锋门业科技有限公司 A kind of Intelligent pick-proof door system based on Oscillation Amplitude and vibration frequency
CN109035650A (en) * 2018-08-03 2018-12-18 叶春林 Easy household anti-theft system
TWI675364B (en) * 2018-08-31 2019-10-21 沅聖科技股份有限公司 Bell control device and bell control method
CN111223219A (en) * 2019-12-31 2020-06-02 深圳阜时科技有限公司 Identity recognition method and storage medium
CN111667620A (en) * 2020-05-08 2020-09-15 掌门物联科技(杭州)股份有限公司 Video snapshot system based on composite networking door lock and snapshot method thereof
CN111865735B (en) * 2020-07-10 2022-08-09 广州博冠智能科技有限公司 Intelligent household system and control method
CN114637223A (en) * 2020-11-30 2022-06-17 阿里巴巴(中国)有限公司 Startup control method, startup control device, electronic device, storage medium, and program product
CN112669483B (en) * 2020-12-10 2023-06-30 深圳优地科技有限公司 Door safety inspection method, device, robot and storage medium
CN114863635A (en) * 2022-02-17 2022-08-05 珠海格力电器股份有限公司 Intelligent door lock alarm method, intelligent door lock, electronic equipment and storage medium
CN115713818A (en) * 2022-09-22 2023-02-24 东莞安诺克电子科技有限公司 Anti-relegating door lock networking judgment method, door lock networking system and door lock device
CN116311714A (en) * 2023-04-24 2023-06-23 深圳市锦锐科技股份有限公司 Method and system for preventing false alarm of intelligent door lock

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3368019B2 (en) * 1993-11-25 2003-01-20 松下電工株式会社 Security entrance management system
KR200325263Y1 (en) * 2003-05-31 2003-09-02 김선호 A crime prevention device of door-lock
US7015943B2 (en) * 2003-07-11 2006-03-21 Chiang Thomas S C Premises entry security system
US7746223B2 (en) * 2006-12-01 2010-06-29 Embarq Holdings Company, Llc System and method for receiving security content from wireless cameras
CN201605898U (en) * 2009-03-16 2010-10-13 徐克林 Burglar alarm lock capable of photographing and sending short messages
CN201681427U (en) * 2009-10-31 2010-12-22 浙江德施曼机电有限公司 Electronic information lock
CN102122422A (en) * 2011-03-25 2011-07-13 山东卡尔电气股份有限公司 Video peephole viewer alarm device
CN102855716B (en) * 2011-11-14 2015-05-06 移康智能科技(上海)有限公司 Doorbell system and automatic visitor identification method thereof
JP5816117B2 (en) * 2012-03-29 2015-11-18 アイホン株式会社 Intercom system
CN102747891B (en) * 2012-07-13 2015-08-19 深圳市悦德智能科技有限公司 A kind of smart lock
CN103295351A (en) * 2013-05-17 2013-09-11 安科智慧城市技术(中国)有限公司 Safety and protection monitoring method, safety and protection monitoring device and monitoring system
CN103280009B8 (en) * 2013-05-23 2016-09-28 中山市安领星电子科技有限公司 A kind of Multifunctional access device
CN103530966B (en) * 2013-10-10 2016-09-07 张翔 A kind of active security entrance guard control method and control system
CN104268963A (en) * 2014-08-06 2015-01-07 成都百威讯科技有限责任公司 Intelligent door lock system, intelligent door lock and intelligent alarm door
US10133935B2 (en) * 2015-01-13 2018-11-20 Vivint, Inc. Doorbell camera early detection
CN104766395A (en) * 2015-03-11 2015-07-08 张瞳 Security control method of intelligent lock
CN104933791A (en) * 2015-06-03 2015-09-23 维融集团有限公司 Intelligent security control method and equipment
CN205243195U (en) * 2015-10-28 2016-05-18 陕西云智知识产权运营管理有限公司 Kidnap automatic alarm's intelligence lock
CN105389879B (en) * 2015-12-25 2017-09-29 成都比善科技开发有限公司 A kind of intelligent access control system and its control method
CN106327747B (en) * 2016-08-30 2018-01-26 特斯联(北京)科技有限公司 A kind of intelligent door lock based on Internet of Things

Also Published As

Publication number Publication date
CN107023224A (en) 2017-08-08
CN107023224B (en) 2022-05-17
CN107093245A (en) 2017-08-25
CN107093244A (en) 2017-08-25
CN206757739U (en) 2017-12-15
CN107093245B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN207660394U (en) Door lock opening control system based on active security protection
US11741766B2 (en) Garage security and convenience features
AU2023270262A1 (en) Doorbell call center
US11156420B1 (en) Smart firearm safety device
US20150379795A1 (en) Active Detection Type Radio Frequency Identification Smart Door Lock Controller
CN206438851U (en) Intelligent remote alarm for door lock
CN111691764B (en) Household intelligent door lock and control method thereof
CA3065806A1 (en) Control access utilizing video analytics
US11514764B2 (en) Smartlock system for improved fire safety
CN108412315A (en) A kind of intelligent door lock caution system and its control method
CN205840690U (en) The apartment antitheft door of corollary new electronic access control system
US20220215725A1 (en) Integrated doorbell devices
US11651666B2 (en) Attempted entry detection
CN206115524U (en) Door control system for building
US11941569B2 (en) Entity path tracking and automation
CN205080681U (en) Register one's residence door electronic monitoring device
CN109594858A (en) A kind of unlocking monitoring method of intelligent monitoring safe-guard door lock
CN113870508A (en) Intelligent security gateway arming and disarming method combining facial recognition
CN212411255U (en) Entrance guard system with body temperature detection function
WO2023130085A1 (en) Electronic lock with facial authentication features
CN209103386U (en) Dual system video cloud lock
CN217063882U (en) Intelligent anti-theft monitoring video recording system in space
CN220909472U (en) Safe handle and safe
CN211827367U (en) Intelligent door lock system
US11983963B2 (en) Anti-spoofing visual authentication

Legal Events

Date Code Title Description
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Assignee: Guangdong Archie Hardware Co., Ltd.

Assignor: Cao Hantian

Contract record no.: 2018440000112

Denomination of utility model: Door lock opening control system based on active security protection

Granted publication date: 20180727

License type: Exclusive License

Record date: 20180830

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20181225

Address after: 528231 North Korea Road, Changhong Ridge Industrial Park, Shishan, Nanhai District, Foshan, Guangdong, China

Patentee after: Guangdong Archie Hardware Co., Ltd.

Address before: 528200 Guangdong Foshan Shishan Nanling Changhong Shishan Industrial Park, Long Gang North Road Guangdong Ya Jie Hardware Co., Ltd.

Patentee before: Cao Hantian

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180727

Termination date: 20210518