Specific implementation mode
It should be appreciated that specific embodiment described herein is only used to explain the utility model, it is not used to limit this
Utility model.
The solution of the utility model embodiment is mainly:The door lock includes that near field communication (NFC) NFC takes
Power supply module 20 and main control module 10, the main control module 10 include microprocessor 11 and unlocking module 12, the unlocking module
12 connect with the microprocessor 11;It includes NFC reception antennas 23, NFC Energy extractions circuit 22 that the NFC, which takes power supply module 20,
With power circuit 21, the NFC reception antennas 23, NFC Energy extractions circuit 22 and power circuit 21 are sequentially connected in series, the power supply
Circuit 21 is connect with the main control module 10.It is exhausted with solving lithium ion battery in existing door lock or dry cell electricity
Afterwards, user does not open door lock, and the problem that door lock cost of manufacture is high.
Referring to Fig.1, Fig. 1 is the structural schematic diagram of the first embodiment of the utility model door lock.Door lock includes NFC (Near
Field Communication, near field communication (NFC)) power supply module 20 and main control module 10 are taken, NFC takes power supply module
20 and main control module 10 connect, main control module 10 includes microprocessor 11 and unlocking module 12, unlocking module 12 and microprocessor
11 connections;It includes NFC reception antennas 23, NFC Energy extractions circuit 22 and power circuit 21 that NFC, which takes power supply module 20, and NFC is received
Antenna 23, NFC Energy extractions circuit 22 and power circuit 21 are sequentially connected in series, and power circuit 21 is connect with main control module 10.
NFC reception antennas 23 are operated in 13.56MHz (Mega Hertz, megahertz) frequency range, the number of NFC reception antennas 23
It can be 106kbps (bit rate), 212kbps or 424kbps according to transmission rate, recognize reading distance in most applications, do not surpass
Cross 10 centimetres.NFC reception antennas 23 have following features:
1. supporting ISO (International Organization for Standardization, International standardization group
Knit)/IEC (International Electrotechnical Commission, International Electrotechnical Commission) 14443TypeA and
MIFARE&reg communication protocols;
2. reaching the reading/writing distance of 100mm (millimeter), reading/writing distance depends on size and the modulation of antenna;
3. the read-write of MF1xxS20, MF1xxS70 and MF1xxS50 is supported to encrypt;
4. supporting ISO 14443A, the up to communication of 848kbit/s transmission rates;
5. the host interface supported:The up to SPI of 10Mbit/s (Serial Peripheral Interface, serially
Peripheral Interface) interface.
Power circuit 21 is a kind of LDO (low dropout regulator, low pressure difference linear voltage regulator), for door
Each circuit and the module work of lock provide power supply.
NFC Energy extractions circuit 22 is used to extract the energy for the mobile device for carrying NFC function.In the embodiment of the present invention
In, the structure of MAC (Media Access Control, medium access control) layer by changing NFC, and in radio frequency, day
Line, low-power consumption, zero energy configuration etc. optimize, to increase the reception power of NFC Energy extractions circuit 22.Specifically, pass through
Low-power Technology, antenna matching technique etc. optimize.It can be obtained by experiment, the reception power of NFC Energy extractions circuit 22 can
Increase to 60mW (megawatt) or more.
NFC reception antennas 23, which are used to receive, carries the energy that the mobile device of NFC function is sent, and the energy that will be received
It is sent to NFC Energy extractions circuit 22, received institute's energy is sent to power circuit 21 by NFC Energy extractions circuit 22,
Power circuit 21 is powered by the energy received to door lock.Mobile device is the terminal for having NFC wireless charging functions, is such as taken
Mobile phone with NFC function, the iPad etc. with NFC function.
MCU (Microcontroller Unit, microprocessor 11) is used to control the operation of entire door-locking system.In this reality
It applies in example, STM32F205 microcontrollers can be used in microprocessor 11, and in other embodiments, microprocessor 11 can also be used other
Chip, this will not be repeated here.
Unlocking module 12 is used to drive the lock body of Door lock according to the unlocking instruction that mobile device is sent, to open door
Lock.
Specifically, if mobile device is less than pre-determined distance at a distance from door lock, door lock is received by NFC reception antennas 23
The energy of mobile device.Pre-determined distance is determined by the size and modulation system of NFC reception antennas 23.It is understood that when moving
When dynamic equipment is more than or equal to pre-determined distance at a distance from door lock, the NFC reception antennas 23 of door lock do not receive mobile device
Energy.
After the energy that door lock is extracted by NFC reception antennas 23 is powered, i.e., door lock after the power is turned on, the unlocking module 12 of door lock
It detects whether to detect unlocking cipher.After unlocking module 12 detects unlocking cipher, unlocking instruction is triggered according to unlocking cipher,
To open door lock.
Further, unlocking module 12 can be BLE (Bluetooth Low Energy, Bluetooth Low Energy) modules or purple
Bee agreement ZigBee module.In some specific embodiment, BLE modules and ZigBee module can exist simultaneously in door lock, that is, open
Lock module 12 includes BLE modules and ZigBee module, at this point, user can as needed select through BLE modules, or is passed through
ZigBee module receives unlocking cipher.When unlocking module 12 includes BLE modules and ZigBee module, BLE modules and ZigBee
Module is connect with microprocessor 11 respectively.
When unlocking module 12 be BLE modules when, when door lock after the power is turned on, mobile device starts its bluetooth module.Door lock detects
Whether its BLE module did not established communication connection with the bluetooth module of mobile device.If BLE modules were not established with bluetooth module
Communication connection, door lock then triggers matched order, and is matched BLE modules with bluetooth module according to the matched order.Work as BLE
After module and bluetooth module successful matching, BLE modules establish communication connection with bluetooth module.It should be noted that bluetooth module
It can actively be triggered by door lock with the matched order during BLE module pairs, also can actively be triggered by mobile device.If pairing refers to
Enable by door lock actively trigger, then when door lock after the power is turned on, by door lock BLE modules trigger matched order;If matched order is by moving
Equipment triggers, then after mobile device is powered by its NFC function to door lock, matched order is triggered by bluetooth module.If BLE moulds
Block established communication connection with bluetooth module, and door lock need not execute the matching operation of pairing BLE modules and bluetooth module again,
BLE modules can establish communication and connect with bluetooth module automatically, at this point, door lock can be detected directly by the way that whether BLE modules receive
The unlocking cipher that mobile terminal is sent by bluetooth module.
After bluetooth module and BLE modules establish communication connection, mobile device detect whether to detect user with door lock
The unlocking cipher inputted in corresponding application program.If mobile device detects unlocking cipher, this is opened by bluetooth module
Lock cipher is sent to the BLE modules of door lock.After BLE modules receive the unlocking cipher, is triggered and unlocked according to the unlocking cipher
Instruction drives Door lock, to open door lock according to the unlocking instruction.Wherein, unlocking cipher include but not limited to finger-print cipher,
Numerical ciphers and fingerprint sum number combinatorics on words password.
Further, whether after mobile device detects unlocking cipher, it is correct first to detect the unlocking cipher, should when confirming
After unlocking cipher is correct, which is sent to the BLE modules of door lock by the bluetooth module by mobile device.When BLE moulds
After block receives the unlocking cipher, first detect unlocking cipher whether correctness.After confirming that the unlocking cipher is correct, BLE modules
Unlocking instruction is triggered according to the unlocking cipher, to open door lock.It avoids unlocking cipher from being tampered in transmission process, improves and pass through
Unlocking cipher opens the safety of door lock.
Mobile device detects the whether correct process of unlocking cipher:If unlocking cipher input by user is answered with mobile device
It is consistent with pre-stored unlocking cipher in program, then confirm that unlocking cipher is correct;If unlocking cipher input by user and movement
Pre-stored unlocking cipher is inconsistent in appliance applications, then confirms unlocking cipher mistake.The BLE modules detection of door lock is opened
Whether correct lock cipher process be consistent with the mobile device detection whether correct process of unlocking cipher, and this will not be repeated here.
Further, after mobile device gets unlocking cipher input by user, bluetooth module uses advance with door lock
The Encryption Algorithm encryption unlocking cipher consulted, obtains encrypted unlocking cipher, and encrypted unlocking cipher is sent to
The BLE modules of door lock.To improve safety of the unlocking cipher in transmission process.Encryption Algorithm includes but not limited to DES (Data
Encryption Standard, data encryption standards), AES (Advanced Encryption Standard, superencipherment mark
It is accurate), RSA cryptographic algorithms and MD5 (Message-Digest Algorithm 5, Message-Digest Algorithm 5).
When unlocking module 12 is ZigBee module, when door lock after the power is turned on, mobile device starts corresponding with door lock application
Program prompts user to input unlocking cipher in the application program.After mobile device detects unlocking cipher input by user,
The unlocking cipher is sent to server by mobile device.After server receives the unlocking cipher, whois lookup and the shifting
The ZigBee module of dynamic apparatus bound, and unlocking cipher is sent to the ZigBee module bound with mobile device.When door lock
After ZigBee module receives the unlocking cipher, unlocking instruction is triggered, drives Door lock to open door lock according to the unlocking instruction.
It should be noted that mobile device and the ZigBee module of door lock have been bound in advance.When server receives unlocking cipher
Afterwards, the unlocking cipher can be parsed, the mobile device mark of unlocking cipher carrying is obtained, is found according to the mark of the mobile device
With the ZigBee module of mobile device binding.In the server, mobile device and ZigBee module mapping table have been prestored, when
After obtaining mobile device mark, corresponding ZigBee module can be found by the mapping table.It is understood that movement is set
Standby mark can be the packet name of mobile device or other information that can uniquely indicate the mobile device.
Further, whether just mobile device first detects unlocking cipher after it will detect unlocking cipher input by user
Really, after only confirming that unlocking cipher is correct, the unlocking cipher is just encrypted, obtains encrypted unlocking cipher, and will be encrypted
Unlocking cipher is sent to bound ZigBee module by server.It is understood that when unlocking module 12 is ZigBee
When module, mobile device detects unlocking cipher process that is whether correct and encrypting unlocking cipher and door lock detects unlocking cipher
Consistent when whether correct process and unlocking module 12 are bluetooth module, details are not described herein.
Further, when unlocking cipher mistake input by user, the exportable prompt message of mobile device prompts user defeated
The password mistake entered.
The present embodiment door lock includes that NFC takes power supply module 20 and main control module 10, main control module 10 to include microprocessor 11
With unlocking module 12, unlocking module 12 is connect with microprocessor 11;It includes NFC reception antennas 23, NFC that NFC, which takes power supply module 20,
Energy extraction circuit 22 and power circuit 21, NFC reception antennas 23, NFC Energy extractions circuit 22 and power circuit 21 are gone here and there successively
Connection, power circuit 21 are connect with main control module 10.NFC Energy extractions circuit 22 is extracted by NFC reception antennas 23 and carries NFC work(
Can mobile device energy give door lock power supply, when door lock after the power is turned on, unlocking module 12 according to unlocking instruction execute unlocking operation.
So that door lock is not needed battery, directly uses the energy of mobile device to power by NFC, to open door lock, avoid when in door lock
Lithium ion battery or after dry cell electricity exhausts, user do not open door lock the case where occur.Further, due in door lock
Do not need battery, therefore during making door lock, also need not on door lock reserved space placing battery, reduce door lock
Cost of manufacture.Further, since door lock does not have battery, door lock battery drain is also avoided, the charging of door lock battery is on fire
Situations such as occur.
Further, it is the structural schematic diagram of the utility model door lock second embodiment with reference to Fig. 2, Fig. 2.
It further includes regulator circuit 24, NFC Energy extractions circuit 22, regulator circuit 24 and power supply electricity that NFC, which takes power supply module 20,
Road 21 is sequentially connected in series.Regulator circuit 24 is used to stablize NFC Energy extractions circuit 22 and extracts the voltage exported after energy, is stablized
Voltage afterwards, and the voltage after stabilization is sent to power circuit 21, so that power circuit 21 can export stable electricity.It can be with
Understand, the voltage that NFC Energy extractions circuit 22 exports is the corresponding voltage of energy that is extracted.
The present embodiment provides stable electricity to power circuit 21, at the electricity for making supply door lock by regulator circuit 24
In stable state, avoid in door lock power supply process, due to spread of voltage, the case where reducing door lock service life, occurs,
Extend the service life of door lock.
Further, it is the structural schematic diagram of the utility model door lock 3rd embodiment with reference to Fig. 3, Fig. 3.
Main control module 10 further includes fingerprint input module 13, and fingerprint input module 13 is connect with microprocessor 11, and fingerprint is defeated
Enter module 13 and connect fingerprint input panel, to detect user fingerprints.When door lock after the power is turned on, user can be defeated by fingerprint input panel
Enter the fingerprint that opens the door.After user inputs enabling fingerprint by fingerprint input panel, fingerprint input module 13 detects that the enabling refers to
Line, and unlocking instruction is triggered by the enabling fingerprint, to open door lock.By the fingerprint input module 13, user can be in door
It locks and directly inputs the fingerprint needed for opening the door, when fingerprint input by user is correct, you can open door lock.
Further, one or more finger-print cipher can also be arranged in user by fingerprint input panel, by set
The finger-print cipher set is to open door lock.
Further, with reference to Fig. 3, main control module 10 further includes the touch key-press module 14 being connect with microprocessor 11, is touched
Key-press module 14 is touched to connect with touch panel.When door lock after the power is turned on, user can be inputted on touch panel open the door needed for unlocking
Password.It is understood that unlocking cipher at this time can be numerical ciphers.When user inputs unlocking cipher on touch panel
Afterwards, the touch key-press module 14 being connect with touch panel detects unlocking cipher, unlocking instruction is triggered by unlocking cipher, to beat
Door lock.In the present embodiment, 12 road capacitance touch chips can be used in touch key-press module 14, in other embodiments,
The touch chip of other forms can also be used in touch key-press module 14, and details are not described herein.
Further, with reference to Fig. 3, main control module 10 further includes voice playing module 15, voice playing module 15 and Wei Chu
It manages device 11 to connect, voice playing module 15 is connect with loud speaker, for exporting voice messaging.Specifically, when door lock confirmation is connect
When the unlocking cipher mistake of receipts, 15 controlling loudspeaker of voice playing module of door lock exports voice messaging, prompts user password defeated
Enter mistake.As received when door lock unlocking cipher mistake when, 15 controlling loudspeaker of voice playing module output " password mistake,
Please re-enter " voice messaging, to prompt user to re-enter password.Or when user is when being arranged password, speech play
15 controlling loudspeaker of module exports voice messaging, prompts the length of setting password needed for user.In the present embodiment, speech play
Module 15 uses WT588D-20SS intelligent sound chips, and in other embodiments, other classes can also be used in voice playing module 15
The intelligent sound chip of type, is not limited herein.
In the present embodiment, by the output of voice playing module 15 and the relevant voice messaging of current state, to prompt to use
Family improves the intelligent of door lock.
Further, with reference to Fig. 3, door lock further includes NFC card reading modules 17, when door lock after the power is turned on, NFC card reading modules 17 are examined
The instruction of swiping the card for whether reading corresponding contactless card surveyed.When NFC card reading modules 17, which are read, swipes the card instruction, according to brush
Card instruction triggers unlocking instruction, and unlocking instruction is sent to microprocessor 11.After microprocessor 11 receives unlocking instruction,
Microprocessor 11 drives Door lock, to open door lock.
Wherein, contactless card is the NFC label badge that user carries, and the door lock is opened for swiping the card in door lock.Contactless card
Can be IC (integrated circuit, integrated circuit) cards or TM (Touch Memory) cards etc..
Further, it is the structural schematic diagram of the utility model door lock fourth embodiment with reference to Fig. 4, Fig. 4.
Main control module 10 further includes the safety chip 16 being connect with microprocessor 11.The safety chip 16 is close for dual lock
Code carries out the operations such as hardware encryption and decryption, to ensure the safety of unlocking cipher.In the present embodiment, safety chip 16 passes through
CC EAL5 level security certifications.
If the unlocking cipher received when the bluetooth module or ZigBee module of door lock is close by encrypted unlocking
Code, then the safety chip of door lock decrypts the encrypted unlocking cipher using decipherment algorithm, with the unlocking cipher after being decrypted,
Wherein, the decipherment algorithm is corresponding with the mobile device encryption Encryption Algorithm of unlocking cipher.Such as when mobile device uses DES algorithms
When being encrypted, the safety chip of door lock is decrypted also by DES algorithms.
When unlocking cipher is arranged by connecting touch panel with touch key-press module 14 in user, safety chip can be to user
Set password carries out hardware encryption, to improve the safety of unlocking cipher.
It should be noted that correctly whether operation can be executed detection unlocking cipher by safety chip, it also can be by bluetooth mould
Block or ZigBee module execute, and are not limited herein.
Further, microprocessor 11 is connect with motor.Specifically, when unlocking instruction is triggered, 11 basis of microprocessor
Unlocking instruction controls motor and opens door lock.It is understood that power circuit 21 is also connected with motor, to power to motor, make
Motor can open door lock.
Further, door lock further includes motor driving, and motor driving connect with microprocessor 11, driven by the motor
Controllable motor work.
Further, door lock further includes button doorbell, which connect with microprocessor 11.Pass through the button doorbell
The resident family inside house can be prompted, has guest visiting.
Further, door lock further includes backlight, which connect with microprocessor 11.
Further, it can also be powered to door lock by way of meeting wireless charging QI standards.It is understood that passing through
Other intelligence can also be applied to the method for the door lock power supply for having NFC reception antennas 23 by carrying the mobile device of NFC function
In home equipment, as being applied in electric cooker, humidifier.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
It should be noted that the technical solution of each embodiment of the utility model can be combined with each other, but must be
Basis is can be implemented as with those skilled in the art, it should when the combination of technical solution appearance is conflicting or cannot achieve
People thinks that the combination of this technical solution is not present, also not within the protection domain of the requires of the utility model.
Above-mentioned the utility model embodiment serial number is for illustration only, can not represent the quality of embodiment.
It these are only the preferred embodiment of the utility model, it does not limit the scope of the patent of the present invention, every
Equivalent structure or equivalent flow shift made based on the specification and figures of the utility model, is applied directly or indirectly in
Other related technical areas are equally included in the patent within the scope of the utility model.