CN208077278U - lock control system and terminal - Google Patents

lock control system and terminal Download PDF

Info

Publication number
CN208077278U
CN208077278U CN201820690103.9U CN201820690103U CN208077278U CN 208077278 U CN208077278 U CN 208077278U CN 201820690103 U CN201820690103 U CN 201820690103U CN 208077278 U CN208077278 U CN 208077278U
Authority
CN
China
Prior art keywords
password
unlocking
user
request
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201820690103.9U
Other languages
Chinese (zh)
Inventor
杨勇印
朱军
汪剑超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu North Environmental Protection Technology Co Ltd
Original Assignee
Chengdu North Environmental Protection Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu North Environmental Protection Technology Co Ltd filed Critical Chengdu North Environmental Protection Technology Co Ltd
Priority to CN201820690103.9U priority Critical patent/CN208077278U/en
Application granted granted Critical
Publication of CN208077278U publication Critical patent/CN208077278U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

Present disclose provides a kind of lock control system and terminals, which is characterized in that the lock control system includes:Lock, server and password provide unit, wherein server includes:Request receiving module, receives unlocking request from the user, and request of unlocking includes the user information and location information of user;Identification module is electrically connected with request receiving module, and the identity of user is identified based on user information;Password provides module, is electrically connected with identification module, and is identified as registration user in response to user, and unit the first unlocking password of offer is provided by the way that the password at the position indicated by location information is arranged;Password receiving module receives the second unlocking password that user sends;And execution module, it is electrically connected with password receiving module, and identical as the second unlocking password in response to the first unlocking password, opens lock.

Description

Lock control system and terminal
Technical field
This disclosure relates to a kind of lock control system and terminal.
Background technology
The unlocking mode of the common intelligent door lock of current market is usually access card, numerical ciphers, fingerprint or recognition of face Deng, but all there is certain defect and deficiency in these gate inhibition's modes, such as:Access card needs to be issued to user in advance, and easily It replicates, safety is poor;Numerical ciphers are easily revealed;Fingerprint or recognition of face need to acquire user data in advance, difficult in maintenance, equipment It is of high cost, and usage experience is poor;It scans the two-dimensional code in the presence of the risk remotely opened the door, safety is worse.
In addition to this, for the space of the more and more self-service types occurred on the market at present, gate inhibition's demand It is changed into relatively weak control to the strong control of incomer, is embodied in:The people for passing in and out gate inhibition, from relatively-stationary group Body (such as resident family, employee) becomes unfixed crowd;It does not need or information collection can not be carried out in advance to disengaging crowd and (such as refer to Line, facial information), entity need not be provided and access authority (such as access card);Allow user to register by mobile terminal scene to obtain Take access entitlements.
Gate inhibition's setting of above-mentioned scene is needed to consider problems with:Random access person needs that right of access is obtained ahead of time Limit needs display screen and set-top box come long-range Connection Service device, is laid with of high cost using dynamic two-dimension code verification mode;Using quiet The verification mode of state Quick Response Code is difficult to control the behavior of remote unlocking, and there are security risks;Using static two dimensional code and bluetooth/ Wifi combines verification to increase the complexity of user's operation again, reduces user experience, exists simultaneously the risk for the order that is stolen.
As described above, existing gate inhibition's technology, equipment cost is high, safety is poor, later maintenance is difficult, restricts gate inhibition system The application range of system can not especially be suitable for gate inhibition's scene in current unmanned service type space, hinder unmanned intelligent empty Between development.
Utility model content
For at least one above-mentioned technical problem, in the first aspect, present disclose provides a kind of lock control systems, special Sign is, which includes that lock, server and password provide unit, wherein server includes:
Request receiving module, receives unlocking request from the user, and request of unlocking includes user information and the position of user Information;
Identification module is electrically connected with request receiving module, and the identity of user is identified based on user information;
Password provides module, is electrically connected with identification module, and is identified as registration user in response to user, is existed by setting Password at position indicated by location information provides unit and provides the first unlocking password;
Password receiving module receives the second unlocking password that user sends;And
Execution module is electrically connected with password receiving module, and identical as the second unlocking password in response to the first unlocking password, Open lock.
In some embodiments, lock control system further includes:Two dimension at position indicated by location information is set Code, wherein request of unlocking is generated based on Quick Response Code.
In some embodiments, Quick Response Code is static two dimensional code.
In some embodiments, lock control system further includes:NFC moulds at position indicated by location information are set Block, wherein request of unlocking is generated based on NFC module.
In some embodiments, it includes at least one of the following that password, which provides unit,:
Display screen;And loud speaker.
In some embodiments, display screen includes at least one of the following:
Liquid crystal display;LED screen;And charactron.
In second aspect, present disclose provides a kind of terminals, which is characterized in that the terminal includes:
Module is requested to generate, generates request of unlocking, and request of unlocking is sent to server, request of unlocking includes the use of user Family information and location information;
Password sending module, according to the first unlocking password provided at the position indicated by location information, input second Unlocking password, and the second unlocking password is sent to server.
In some embodiments, request of unlocking is generated based on Quick Response Code and/or NFC module.
In some embodiments, terminal includes at least one of the following:
Mobile phone;Tablet computer;And wearable device.
In some embodiments, it further includes camera and/or NFC module to request to generate module.
Description of the drawings
Attached drawing shows the illustrative embodiments of the disclosure, and it is bright together for explaining the principles of this disclosure, Which includes these attached drawings to provide further understanding of the disclosure, and attached drawing is included in the description and constitutes this Part of specification.
Fig. 1 is the structural schematic block diagram according to the lock control system of the disclosure some embodiments;
Fig. 2 is the schematic block diagram according to the server of the disclosure some embodiments;
Fig. 3 is the flow signal according to the lock control method of the disclosure some embodiments;
Fig. 4 is the flow diagram that user identity is identified according to the server of the disclosure some embodiments;
Fig. 5 is the schematic block diagram according to the lock control method of the disclosure some embodiments;
Fig. 6 is the schematic block diagram according to the terminal of the disclosure some embodiments;
Fig. 7 is the workflow schematic diagram according to the lock of the disclosure some embodiments;And
Fig. 8 is adapted for the structure of the computer system for the lock control method or server of realizing disclosure embodiment Schematic diagram.
Specific implementation mode
The disclosure is described in further detail with embodiment below in conjunction with the accompanying drawings.It is understood that this place The specific implementation mode of description is only used for explaining related content, rather than the restriction to the disclosure.It also should be noted that being Convenient for description, illustrated only and the relevant part of the disclosure in attached drawing.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the disclosure can To be combined with each other.The disclosure is described in detail below with reference to the accompanying drawings and in conjunction with embodiment.
Fig. 1 shows the structural schematic diagram of the lock control system according to the disclosure some embodiments.As shown in Figure 1, root Lock control system according to the disclosure some embodiments includes that lock 10, server 20 and password provide unit 30.
Lock 10 can be mounted in door body, to lock door body.Such as lock 10 can be any lock body by weak electric signal control, Including but not limited to electromagnetic force lock.In a specific implementation mode of the disclosure, lock 10 can realize to be limited with macrocrystalline science and technology Electric control lock of the microcontroller of the model STC8F2K16S2 of company as lock body micro-control unit (MCU), however art technology Personnel should understand that lock 10 can also be the vulnerabilities scan lock body using other microprocessors.
Server 20 is communicatively coupled with lock 10.Server 20 has input/output function, communication function, computing function Deng.Server 20 can be realized for example, by all-purpose computer, special purpose computer or computer cluster.Server 20 may include:
Request receiving module, receives unlocking request from the user, and request of unlocking includes user information and the position of user Information;
Identification module is attended to anything else based on the user's information received and is identified;
Password provides module, is identified as registering user in response to user, and to the position indicated by location information is arranged The password for setting place provides the first unlocking password of offer of unit 30;
Password receiving module receives the second unlocking password that user sends;And
Execution module, it is identical as the second unlocking password in response to the first unlocking password, open lock 10.
In some embodiments of the disclosure, request receiving module and password receiving module can pass through the defeated of server 20 Enter output par, c to realize.In the other embodiment of the disclosure, identification module, password provide module and execution module can It is realized by the process part of server 20.
In some embodiments of the disclosure, lock 10 may include wireless communication module, to be communicated with server 20. In an illustrative embodiments of the disclosure, lock 10 can be used Shenzhen peace letter can Science and Technology Ltd. model ESP- For the Wifi modules of 01S as wireless communication module, ESP-01S can connect the wireless router of access internet to obtain network Resource, the MCU for locking 10 carries out data interaction by the serial ports of its serial ports (baud rate 115200bps) and ESP-01S, to realize The connection of lock 10 and server 20.However, it is understood by those of ordinary skill in the art that lock 10 also can pass through wired company with server 20 It connects or optical fiber connection is communicated, the disclosure is not restricted to this.
Further, it since the MCU in lock 10 is operated in the voltage range of 3.3V-5V, and locks 10 major parts and is operated in Voltage between 12V-24V, therefore using the photo-coupler of the model PC817 of Sharp Corp as in lock 10 in present embodiment Portion controls the transmission of signal, and PC817 is light-coupled isolation signal transmission component, and effect is that the signal between realizing different voltages passes It is defeated.
Password provides unit 30 for providing the first unlocking password, may include at least one of display screen and loud speaker. The loud speaker that unit 30 is provided for password can be reported the first unlocking password to user with speech form, be convenient for a variety of crowds (such as old man, child) uses.The display screen that unit 30 is provided for password may include in liquid crystal display, LED screen or charactron at least One of, the first unlocking password is shown to user.Password provides unit 30 and may be provided near door body, enables a user to Observe the first unlocking password.In some embodiments of the disclosure, password provides unit 30 can be in the control of server 20 Under provide a user the first unlocking password.In other embodiments of the disclosure, lock 10 can be carried receiving server 20 After the first unlocking password supplied, control password provides unit 30 to provide a user the first unlocking password.
In some embodiments of the disclosure, lock control system may also include Quick Response Code, may be provided on lock 10, door On body or near lock 10 or door body or at other appropriate positions.User can be set by smart mobile phone/tablet computer/wearable Standby wait generates request of unlocking based on Quick Response Code.In an illustrative embodiments of the disclosure, user can be by being mounted on hand Wechat on machine is scanned Quick Response Code to generate request of unlocking.In some embodiments of the disclosure, lock control system It can also include NFC module.Similar to Quick Response Code, NFC module may also be arranged on lock 10 on, in door body or lock 10 or door body it is attached Closely or at other appropriate positions.User can be generated by supporting the mobile terminal of NFC function to be in contact with the NFC module It unlocks and asks.
It will be appreciated by those skilled in the art that the hardware selection of foregoing exemplary is simply facilitated to the specific of present embodiment Understand, the disclosure is not limited to the above embodiment of the disclosure, there can also be other alternative solutions.
Fig. 2 shows the schematic block diagrams according to the servers 20 of the disclosure some embodiments.As shown in Fig. 2, according to The server 20 of disclosure embodiment may include:
Request receiving module 21, receives unlocking request from the user, and request of unlocking includes user information and the position of user Confidence ceases;
Identification module 22 is electrically connected with request receiving module 21, and is attended to anything else progress based on the user's information received Identification;
Password provides module 23, be electrically connected with identification module 22, and is identified as registration user in response to user, and to setting It sets the password at the position indicated by location information and the first unlocking password of offer of unit 30 is provided;
Password receiving module 24 receives the second unlocking password that user sends;And
Execution module 25 is electrically connected with password receiving module 24, and in response to the first unlocking password and the second unlocking password It is identical, open lock 10.
Fig. 3 shows the flow diagram of the lock control method according to the disclosure some embodiments.As shown in Fig. 2, root It may include according to the lock control method of the disclosure some embodiments:
S100, receives unlocking request from the user, and request of unlocking includes the user information and location information of user;
S200 identifies the identity of user based on user information;
S300 is identified as registering user in response to user, and providing first at the position indicated by location information unlocks Password;
S400 receives the second unlocking password that user sends;And
S500, it is identical as the second unlocking password in response to the first unlocking password, open lock.
In some embodiments of the disclosure, the step of the first unlocking password is provided at the position indicated by location information Suddenly may also include:
Include on the display screen at the position indicated by customer position information by the first unlocking password;Or
First unlocking password is read by voice at position indicated by customer position information.
In some embodiments of the disclosure, above-mentioned display screen can be any tools such as liquid crystal display/LED screen/charactron There is the product of display function.In addition, in some embodiments of the disclosure, can loud speaker in a manner of voice to user First unlocking password is provided.
In some embodiments of the disclosure, the first unlocking password can be based on Quick Response Code and generate, and wherein the Quick Response Code is set It sets and is locking, in door body or near lock or door body or at other appropriate positions.It can/tablet computer/can by smart mobile phone The generations such as wearable device, which are unlocked, asks.It, can be by micro- on mobile phone in an illustrative embodiments of the disclosure Letter is scanned Quick Response Code to generate request of unlocking.In some embodiments of the disclosure, static state two can be used in Quick Response Code Tie up code.In other substitutability embodiments of the disclosure, request of unlocking can also be generated by NFC module.It is similar In Quick Response Code, NFC module, which may also be arranged on, to be locked, in door body or near lock or door body or at other appropriate positions.It can lead to It crosses and supports the mobile terminal of NFC function to be in contact with the NFC module and generate unlocking request.
In some embodiments of the disclosure, as shown in figure 4, step S200 can also include the steps of:
S201 receives unlocking request from the user, and wherein unlocking request includes the user information and position letter of user Breath;
S202 judges whether the user is registered according to user information;
S203 generates the first unlocking password if registered, and user is asked to input unlocking password;
S204 guides user to complete registration if the user is unregistered.
Fig. 5 shows the lock control method according to some embodiments of the disclosure comprising:
S101, generate unlock request, and to server send unlock request, unlock request include user user information with Location information;And
S102, the first unlocking password provided at the position indicated by location information input the second unlocking password, and Second unlocking password is sent to server.
Similarly with the above embodiment, can the generations such as used Quick Response Code or NFC unlock request, the disclosure to this not into Row repeats.In an illustrative embodiments of the disclosure, the mobile terminal of such as smart mobile phone can be used to scan two dimension Code is to generate request of unlocking, and according to the first unlocking password that display screen or loud speaker provide, inputs second in the terminal and opens Lock password.
Fig. 6 shows the schematic block diagram of the terminal 60 according to the disclosure some embodiments.As shown in fig. 6, according to this The terminal 60 for disclosing some embodiments may include:
Module 61 is requested to generate, generates request of unlocking, and request of unlocking is sent to server;And
Password sending module 62, the first unlocking password provided at the position indicated by location information, input second Unlocking password, and the second unlocking password is sent to server.
According in some of disclosure embodiments, request to generate module 61 can be by the process part of terminal come real It is existing.According in the disclosure a illustrative embodiments, requests to generate module 61 and may also include camera or NFC module. In the other embodiment according to the disclosure, password sending module 62 can by the importation of terminal (such as keyboard or Touch screen) and communication part realize.
Fig. 7 shows the unlocking process of a specific implementation mode comprising:
S1, parameter configuration:Configuration lock status (being defaulted as locking) after lock booting, is arranged MCU serial ports parameters:8 digits, nothing are stopped Stop bit, no parity check position.Baud rate 115200bps;
S2, network configuration:Configuration ESP-01S is operated in client mode;
S3 obtains equipment unique identifier (MAC):MCU sends AT to ESP-01S by serial ports and instructs " AT+ CIPSTAMAC_CUR?", you can obtain the MAC Address of ESP-01S;
S4 detects network:It attempts to establish with server and connect, successful connection then illustrates that network is normal, and into S7, connection is lost It loses, illustrates that Network Abnormal enters S5;
S5 opens smartconfig:When can not be established with server connect when, it may be possible to network is not configured, arrangement abnormalities Or external hotspot situations such as change has occurred, smartconfig is the included network configuration patterns of ESP-01S, is used The application software that person very easily can use ESP-01S producers to provide carries out network configuration to it, waits for (provide later within 90 seconds To the time of network configuration);
S6, equipment are restarted automatically:MCU can restart ESP-01S by sending AT+RST, while program is returned to S1;
S7, request server:After success is established the link with server, MCU can send HTTP to server every 2 seconds and ask It asks, to have checked whether the first unlocking password;
S8 after obtaining the first unlocking password, provides unit by password and provides;
S9, after obtaining unlocking instruction, lock is opened.
Fig. 8 shows the structural representation of the computer system 600 of the server suitable for being used for realizing the application embodiment Figure.
As shown in figure 8, computer system 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 or be loaded into the program in random access storage device (RAM) 603 from storage section 608 and Execute various actions appropriate and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data. CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always Line 604.
It is connected to I/O interfaces 605 with lower component:Importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loud speaker etc.;Storage section 608 including hard disk etc.; And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on driver 610, as needed in order to be read from thereon Computer program be mounted as needed such as storage section 608.
Particularly, according to embodiment of the present disclosure, it is soft that the process that above-mentioned reference chart 3 describes may be implemented as computer Part program.For example, embodiment of the present disclosure includes a kind of computer program product comprising be tangibly embodied in machine readable Computer program on medium, computer program include the program code of the method for executing Fig. 3.In such mounting means In, which can be downloaded and installed by communications portion 609 from network, and/or from 611 quilt of detachable media Installation.
Flow chart in attached drawing and block diagram, it is illustrated that according to system, method and the computer of the various embodiments of the present invention The architecture, function and operation in the cards of program product.In this regard, each box in flowchart or block diagram can be with A part for a module, program segment, or code is represented, a part for module, program segment, or code includes one or more uses The executable instruction of the logic function as defined in realization.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, the box that two connection ground indicate is actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it to note Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
The specific implementation process of the disclosure is described in detail above in association with attached drawing, disclosed technique scheme uses dynamic password Verification is unlocked, safety higher;The enabling that dynamic two-dimension code could be completed, which can be completed, using static two dimensional code verifies flow, It reduces and is laid with cost, simplify user's operation flow;Simplify lock body structure, while user's operation experience is more preferable;Dynamic password voice It reports or display is shown, improve user experience;It is suitble to a variety of gate inhibition's scenes such as space of unmanned service type to use, practicability By force.
It will be understood by those of skill in the art that the above embodiment is used for the purpose of clearly demonstrating the disclosure, and simultaneously Non- be defined to the scope of the present disclosure.For those skilled in the art, may be used also on the basis of disclosed above To make other variations or modification, and these variations or modification are still in the scope of the present disclosure.

Claims (10)

1. a kind of lock control system, which is characterized in that the lock control system includes:Lock, server and password provide unit,
Wherein, the server includes:
Request receiving module, receives unlockings from the user request, the request of unlocking include the user user information with Location information;
Identification module is electrically connected with the request receiving module, and the identity of the user is identified based on the user information;
Password provides module, is electrically connected with the identification module, and is identified as registration user in response to the user, by setting It sets the password at the position indicated by the location information and unit the first unlocking password of offer is provided;
Password receiving module receives the second unlocking password that the user sends;And
Execution module is electrically connected with the password receiving module, and is unlocked in response to the first unlocking password and described second Password is identical, opens the lock.
2. lock control system according to claim 1, which is characterized in that the lock control system further includes:Setting is in institute The Quick Response Code at the position indicated by location information is stated, wherein unlocking request is generated based on the Quick Response Code.
3. lock control system according to claim 2, which is characterized in that the Quick Response Code is static two dimensional code.
4. lock control system according to claim 1, which is characterized in that the lock control system further includes:Setting is in institute The NFC module at the position indicated by location information is stated, wherein unlocking request is generated based on the NFC module.
5. lock control system according to claim 1, which is characterized in that the password provide unit include it is following at least One of:
Display screen;And
Loud speaker.
6. lock control system according to claim 5, which is characterized in that the display screen includes at least one of the following:
Liquid crystal display;
LED screen;And
Charactron.
7. a kind of terminal, which is characterized in that the terminal includes:
Module is requested to generate, generates request of unlocking, and the unlocking request is sent to server, the unlocking request includes user User information and location information;
Password sending module, according to the first unlocking password provided at the position indicated by the location information, input second Unlocking password, and the second unlocking password is sent to the server.
8. terminal according to claim 7, which is characterized in that the unlocking request is given birth to based on Quick Response Code and/or NFC module At.
9. terminal according to claim 8, which is characterized in that the terminal includes at least one of the following:
Mobile phone;
Tablet computer;And
Wearable device.
10. terminal according to claim 7, which is characterized in that it is described request to generate module further include camera and/or NFC module.
CN201820690103.9U 2018-05-10 2018-05-10 lock control system and terminal Active CN208077278U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201820690103.9U CN208077278U (en) 2018-05-10 2018-05-10 lock control system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201820690103.9U CN208077278U (en) 2018-05-10 2018-05-10 lock control system and terminal

Publications (1)

Publication Number Publication Date
CN208077278U true CN208077278U (en) 2018-11-09

Family

ID=64045611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201820690103.9U Active CN208077278U (en) 2018-05-10 2018-05-10 lock control system and terminal

Country Status (1)

Country Link
CN (1) CN208077278U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108648311A (en) * 2018-05-10 2018-10-12 成都奥北环保科技有限公司 Lock control system and method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108648311A (en) * 2018-05-10 2018-10-12 成都奥北环保科技有限公司 Lock control system and method and system

Similar Documents

Publication Publication Date Title
US11095643B2 (en) Universal digital identity authentication service
JP6937764B2 (en) Systems and methods for controlling access to physical space
CN103248484B (en) Access control system and method
CN102067555B (en) Improved biometric authentication and identification
CN111478917B (en) Background system for providing network service for access control device and user terminal
CN104050510A (en) Intelligent room reservation system based on mobile terminal
CN205354152U (en) Intelligent gate inhibition system
CN107291432A (en) Cloud desktop management-control method, device and cloud desktop access method, device
CN104754582A (en) Client and method for maintaining BYOD (Bring Your Own Device) safety
WO2021175018A1 (en) Card making method for hotel, card making system for hotel, and hotel management system
CN103544749A (en) Cloud control access control management system and authentication method thereof
CN106791627A (en) Network Video Surveillance and security alarm integrated system and its secure access method for authenticating
WO2021228035A1 (en) Express box control method, apparatus and system, express box, and storage medium
JP2018010449A (en) Smart lock authentication system and method in smart lock
CN108920919A (en) Control method, device and system of interactive intelligent equipment
CN109166216A (en) A kind of control method and device of smart bluetooth door lock
CN109409057A (en) Security system and its control method, control device and storage medium
WO2019101156A1 (en) Device control method, and related device for same
CN104853354A (en) Bluetooth authentication method and system thereof
CN208077278U (en) lock control system and terminal
CN110349316A (en) A kind of visitor's access control system and control method
CN109801418A (en) User autonomous controllable fining authorization management method and device
US20110125875A1 (en) Terminal management system, terminal management server, and terminal device
CN108648311A (en) Lock control system and method and system
CN108447163A (en) A kind of school leads to cloud access control system and its control method

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant