CN208240106U - Lockset - Google Patents

Lockset Download PDF

Info

Publication number
CN208240106U
CN208240106U CN201820768774.2U CN201820768774U CN208240106U CN 208240106 U CN208240106 U CN 208240106U CN 201820768774 U CN201820768774 U CN 201820768774U CN 208240106 U CN208240106 U CN 208240106U
Authority
CN
China
Prior art keywords
module
lockset
dimensional code
user
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201820768774.2U
Other languages
Chinese (zh)
Inventor
黄权
夏舒畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Synodata Security Technology Co Ltd
Original Assignee
Hangzhou Synodata Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Synodata Security Technology Co Ltd filed Critical Hangzhou Synodata Security Technology Co Ltd
Priority to CN201820768774.2U priority Critical patent/CN208240106U/en
Application granted granted Critical
Publication of CN208240106U publication Critical patent/CN208240106U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The utility model discloses a kind of locksets, including door lock assembly structure and power management module, further include safe master control, for identify two-dimensional code data it is whether legal and according to qualification result control door lock assembly structure opening and closing and meanwhile upload qualification result and lockset status information to external equipment and with peripheral device communication replacement code key seed;Two dimensional code acquisition module, for acquiring and parsing two-dimensional code data;Remote communication module, for being communicated with external device data;The two dimensional code acquisition module, remote communication module, door lock assembly structure and power management module are connect with safe master control.The utility model has the advantage of safety, versatility is good, cuts operating costs.

Description

Lockset
Technical field
The utility model relates to a kind of locksets safe, that subscription authentication is realized by two-dimensional code scanning.
Background technique
Mobile communication from the connection of people and people, is strided forward to people and the connection of object and object and object, and all things on earth interconnection is must Right trend.However current 4G network connect scarce capacity with object in object.In fact, compared to short distances such as bluetooth, ZigBee The communication technology, mobile cellular network have the characteristics such as wide covering, removable and big connection number, can bring more abundant answer With scene, the main interconnection technique of Internet of Things ought to be become.NB-IOT focuses on low-power consumption and extensively covers (LPWA) Internet of Things (IoT) Market is that one kind can widely applied emerging technology in the world.With covering is wide, connection is more, rate is low, it is at low cost, The low in energy consumption, features such as framework is excellent.NB-IOT uses License frequency range, can take three kinds of portions such as interior band, protection band or Independent Carrier Wave Management side formula, coexists with existing network.
With intelligent city, the arriving of big data era, wireless communication will realize all things on earth connection.Many enterprise's estimated futures Global Internet of Things connection number will be hundred billion grades of epoch.Coupling for a large amount of objects and object has been had already appeared at present, however these couple It is carried mostly by short-range communications technologies such as bluetooth, Wi-Fi, but non-operator mobile network.In order to meet different Internet of Things industry Business demand, according to internet of things service feature and mobile communications network feature, 3GPP has carried out increasing according to narrow band service application scenarios The technical research of strong mobile communications network function is to adapt to booming internet of things service demand.
Intelligent door lock refer to be different from tradition machinery lock on the basis of it is improved, in user security, identification, managerial side The lockset of the more intelligent easy in face.Intelligent door lock is the execution unit locked a door in access control system.Intelligent door lock is different from biography System mechanical lock, is with safety, convenience, the compound lockset of advanced technology.On-mechanical key is used to identify as user The mature technology of ID, such as: the non-contact class of magnetic card, radio-frequency card, safety is higher, plastic material, and configuration carries more convenient, price It is cheap.The bio-identifications class such as Fingerprint Lock, iris recognition access control system, highly-safe, there is no lose damage;But be inconvenient to configure, at This height.TM card is a kind of contact class, and safety is very high, stainless steel material, and configuration carrying is extremely convenient, and price is lower.In bank, Government department (focusing on safety) and hotel, school dormitory, residential area, villa, hotels and other places are using more.
Intelligent door lock and its application system, equipment connection is more, and rate is low, demand low in energy consumption and its frequency of use It is low, the LPWAN such as the low feature of delay requirement and NBIOT communicate the characteristics of match very much.China opens the research of planar bar code technology It starts from 1993.Article Numbering Center of China is to several common two dimensional code PDF417, QRCCode, Data Matrix, Maxi Code, Code 49, Code 16K, Code One technical specification carried out translation and follow-up study.With China market economy The rapid development constantly improve with information technology, the domestic demand to two dimensional code this new technology is growing day by day.Chinese article Encoding centre is under the support energetically of former China State Bureau of Quality and Technical Supervision and national departments concerned, not to the research of planar bar code technology It is disconnected to go deep into.On the basis of digesting external correlation technique data, the national standard of two two dimensional codes: two dimensional code grid square has been formulated Horizontal and vertical parity check code (SJ/T 11349-2006) and two dimensional code close matrix code (SJ/T 11350-2006), so that Chinese tool be greatly facilitated There are the research and development of the two dimensional code of technology with proprietary intellectual property rights.On August 3rd, 2016 pays clearing association to payment mechanism and issues " bar code Payment transaction specification " (exposure draft), payment mechanism is explicitly pointed out in opinion original text carries out the safety that bar code business needs to follow Standard.This be Central Bank halted in 2014 two dimensional code payment after for the first time official recognize two dimensional code pay status.With two dimensional code The maturation of industry and cognition it is perfect, more people can more easily receive two dimensional code Related product and application, in door lock and It is also such in its relevant application.
Ordinary electronic lock is as shown in Figure 1, generally by live input module, acousto-optic hint module, power management module, master MCU and door lock assembly structure composition.Wherein, live input module and acousto-optic cue module are mainly used for the man-machine friendship with visitor Mutually, biological characteristic or Password Input, IC/ID card card reading etc. are acquired, and acousto-optic hint is provided;Power management module is mainly used for pair The functions such as management of charging and discharging, the undervoltage warning of equipment;Main MCU is mainly used for realizing the various logic function of door lock, and control Door lock modules realize corresponding function under logic guidance;Door lock assembly structure is the mechanical part of conventional lock, is used In guarantee door safety.
Although electronic lock is greatly improved in the flexibility applied and authorized with respect to conventional door lock at present, but still There are some following defects:
1, the occasion big in mobility such as hotels, often by the way of IC/ID card, user must be not square with card Just and it is easy to be lost;
2, IC/ID card itself can generate loss with using, and generate operation cost;
3, the bio-identifications mode such as fingerprint needs live registed authorization, and is related to user's sensitive biological characteristic;
4, the components such as key, fingerprint sensor can be with using aging;
5, it has no idea to realize interim authorization, such as only allows primary etc operation of unlocking.
Summary of the invention
To solve the above problem existing for present technology, the utility model provide it is a kind of it is safe, versatility is good, reduces The lockset of operation cost.
The technical solution adopted in the utility model is:
Lockset, including door lock assembly structure and power management module, it is characterised in that: further include
Safe master control, for identifying whether two-dimensional code data is legal and controls opening for door lock assembly structure according to qualification result It closes while uploading qualification result and lockset status information and replace code key seed to external equipment and with peripheral device communication;
Two dimensional code acquisition module, for acquiring and parsing two-dimensional code data;
Remote communication module, for being communicated with external device data;
The two dimensional code acquisition module, remote communication module, door lock assembly structure and power management module with safety master Control connection.
Further, the safe master control includes security algorithm module, data safety memory module, code security operation mould Block, abnormality detection module, safety protection module, data self-destruction module and lockset tamper module.
Further, the remote communication module is LPWAN communication mode.
Further, the remote communication module is NBIOT module or LORA module.
It further, further include the universal input module being connect with safe master control, the scene input for lockset.
Further, the universal input module be IC/ID card read module, it is NFC communication module, bio-identification module, close One of code input module or multiple combinations.
It further, further include the acousto-optic hint module being connect with safe master control, for being provided by sound and light signal user Prompt information.
Further, the acousto-optic hint module be buzzer prompt tone module, voice output module, lamplight pointing module, One or more combinations in screen display module.
Further, the two-dimensional code data includes OTP data, the user mobile phone location information of encryption, user information, authorization Time limit and authorization number.
The beneficial effects of the utility model are:
1, the promotion of ease for use, administrator authorize and cancel more flexible, user management and synchronizing information automation;
2, cut operating costs, avoid because lose IC/ID card and caused by loss, two dimensional code acquisition module is with respect to fingerprint Sensor has the lower proportion of goods damageds and cost;
3, good compatibility can be compatible with general at present various electronic lock functions and application scenarios;
4, safety is promoted, and is realized the other information security of financial level by OTP technology, be may be implemented to lock by safety chip Have the design such as safe tamper of itself, prevents various information, electric appliance or physical attacks;
5, remote communicating function, can be with real-time informing manager's lockset state, between automatic synchronization administrator and user Partial information;
6, the simplification of multiple equipment management can easily realize administrator to multiple by cloud service and APP design The management of lockset, and being organically combined with existing system, such as with the combination of Hospitality management system etc..
Detailed description of the invention
Fig. 1 is a kind of schematic diagram of existing electric lockset.
Fig. 2 is the schematic diagram of the utility model.
Fig. 3 is the application schematic diagram of the utility model.
Fig. 4 is the process for using figure of the utility model.
Specific embodiment
Combined with specific embodiments below the utility model to be further described, but the utility model is not limited to In these specific embodiments.One skilled in the art would recognize that the utility model covers in Claims scope All alternatives, improvement project and the equivalent scheme that may include.
Description of Related Art is as follows:
NB-IoT:NB-IoT is the emerging technology in one, the field IoT, supports low power consuming devices in the cellular data of wide area network Connection, also referred to as low-power consumption wide area network (LPWAN).NB-IoT supports stand-by time length, to network connectivity requirements higher device Efficient connection.It is said that the NB-IoT device battery service life can be improved at least 10 years, while can also provide very comprehensive room Interior cellular data connection covering.
Access control system: access control system is to mean Access Control System, abbreviation ACS in intelligent building field. Refer to " door " forbids permission, is the prevention of the guard to " door ".Here " door ", it is in broad terms, various logical including what can be passed through Road, including the door that people is current, the door etc. of vehicle pass-through.Gateway gate inhibition safety management system is new-modernization safety management system System, it integrates microcomputer automatic identification technology and modern safety management measure, it is related to electronics, mechanical, optics, computer skill Art, mechanics of communication, many new technologies such as biotechnology.It is to solve important department entrance to realize the effective of safety precaution management Measure.Various confidential departments are applicable in, it is intelligent small such as bank, hotel, parking lot management, computer room, armory, safe care registry, cubicle Area, factory etc..
Two dimensional code: two-dimensional bar code/two dimensional code (2-dimensional bar code) is pressed with certain specific geometric figure The chequered with black and white graphic recording data symbol information that certain rule is distributed in plane (on two-dimensional directional);In code compilation It is opposite with binary system using several dexterously using " 0 " of composition computer-internal logical foundations, the concept of " 1 " bit stream The geometrical body answered indicates text numerical information, by image input device or photoelectric scanning device automatically identifying and reading to realize letter Breath automatically processes: it has some general character of barcode technology: every kind of code system has its specific character set;Each character occupies centainly Width;With certain verifying function etc..Also have simultaneously to the information automatic identification function and processing figure rotation that do not go together Turn change point.
LPWAN: low-power consumption wide area network (LPWAN) is the M2M communication scene optimization in applying for Internet of Things, by electricity Battery-powered, low rate, super low-power consumption, low duty ratio support single node maximal cover reachable with Star Network covering The remote wireless network mechanics of communication of 100 kilometers of honeycomb aggregation gateway.The technology is a kind of revolutionary object in the world in recent years Network access technology, have the characteristics that at a distance, low-power consumption, low O&M cost, with the prior arts phase such as WiFi bluetooth, ZigBee Than LPWAN is truly realized big region Internet of Things low cost all standing.LPWAN technology has not yet formed a unified standard at present, Sigfox, LoRa, Telensa, PTC etc. are than more typical LPWAN technology.LPWAN itself is relative to 2G/3G/4G/5G A relative concept for the WWAN such as LTE-MTC, there is no clear, stringent definition to this industry.
OTP full name One-time Password, also referred to as dynamic password, be according to special algorithm generate can not be pre- The random digit of survey combines, and each password is used only once.OTP divides from technology there are three types of form, and time synchronization, event are same Step, challenge/response.
(1) time synchronization
Principle was compared based on the time of dynamic token and verifying dynamic password server, based on the token of time synchronization, One new password of general generation in every 60 seconds, it is desirable that server can keep correct clock with high accuracy, while to its token Crystal oscillator frequency have a strict requirements, the corresponding terminal of this technology is hardware token.
(2) event synchronization
Token based on event synchronization, principle are by a certain specific event order and identical seed as defeated Enter, by calculating consistent password in HASH algorithm.
(3) challenge/response
The operational line being usually used in, inputs the challenge code that server-side issues in website/response, and dynamic token inputs this and chooses War code, by generating one 6/8 random digit on built-in algorithm, password is once effective, and this technology is applied most at present It is universal, including scratch card, short message password, dynamic token also have challenge/response form.
Referring to fig. 2, a kind of lockset provided in this embodiment, comprising:
Safe master control 1-1, the main logic for realizing door lock, and each peripheral module is logically controlled, for identifying two Whether dimension code data are legal and upload qualification result and lockset shape simultaneously according to the opening and closing that qualification result controls door lock assembly structure State information replaces code key seed to external equipment and with peripheral device communication;
Information acquisition module 1-5 includes universal input module 1-5-1 and two dimensional code acquisition module 1-5-2,
Wherein universal input module 1-5-1 is IC/ID card read module, NFC communication mould for the scene input of lockset One of block, bio-identification module, Password Input module or multiple combinations can be selected according to the demand of actual product It selects;
Two dimensional code acquisition module 1-5-2, for acquiring and parsing two-dimensional code data, two-dimensional code data includes OTP data, adds Close user mobile phone location information, user information, licensing term and authorization number;
Remote communication module 1-3 is used to communicate with external device data, preferably LPWAN communication mode, such as NBIOT module Or LORA module.
Door lock assembly structure 1-2, the main mechanical structure and function for realizing conventional lock, including what is unlocked to mechanical key It supports;
Power management module 1-4 is mainly used for being powered whole system, and realizes the power management of system, including Management of charging and discharging, the functions such as undervoltage warning;
Acousto-optic hint module 1-6 is buzzer prompt tone mould for providing prompt information to user by sound and light signal Block, voice output module, lamplight pointing module, one or more combinations in screen display module, can be according to actual product Demand is selected;
The universal input module 1-5-1, two dimensional code acquisition module 1-5-2, remote communication module 1-3, door lock assembly knot Structure 1-2, power management module 1-4 and acousto-optic cue module 1-6 are connect with safe master control 1-1.
Safe master control 1-1 described in the present embodiment is a safety chip, including security algorithm module, data safety store mould Block, code security operation module, abnormality detection module, safety protection module, data self-destruction module and lockset tamper module.I.e. The safety chip can provide various security algorithms, such as the close or general HASH, OTP of state, symmetrical, asymmetric encryption are calculated Method;The safety chip can provide the function of data safety storage and code security operation;The safety chip can provide Anti-invasion and partly intrusive attack the ability such as abnormal voltage detection, abnormal temperature detection, active defense layer, data self-destruction;Institute State safety chip can provide tamper pin make lockset can be realized tamper design.
Referring to Fig. 3, a kind of typical case system of lockset described in the present embodiment, including server/cloud service, administrator, Casual user A, legitimate user B, illegal user C, lockset, the communication between lockset and administrator, user and server should It is the public network communication based on security protocol, includes but be not limited only to through modes such as ipsec, https or wss.
Wherein:
Administrator holds property right to room, house or other resources of lockset protection, the people of the right to use or empowerment management Member.Such as house householder, hotel management, the scenes such as people Su Guanli.Administrator can be authorized and be cancelled to user by APP Authorization can also modify the code key seed inside lockset by APP.Administrator can simultaneously authorize multiple users.Pipe Reason person can cancel and authorize to user by way of replacing seed, i.e. user's code key seed and lockset code key seed is inconsistent, The two dimensional code that user generates is weathering.Administrator can check lockset opening time and user by APP.
Casual user A, that is, the person of being managed authorization, the use of lockset can be only opened in finite number of time and time restriction Family.Such as nobody or letting agency see the scene in room with people in friends and family's visiting man.
Legitimate user B, that is, the person of being managed authorization, the people of the protected resources use right of lockset is obtained within the authorization time Member.Such as the short rent in people place, long-term lessee, the scenes such as hotel occupancy personnel.Legitimate user can be by showing that APP is generated to lockset , the two dimensional code that dynamic updates is authenticated by lockset, is opened lockset before the deadline and is used resource.Legitimate user does not have The right of two sub-authorizations.
Illegal user C does not receive the user of administrator's authorization.Such as mobile personnel, expired lessee etc..It is illegal to use In there is no code key seed, therefore legal two dimensional code can not be generated, lockset failed authentication will not open the door, and generate alarm signal Breath.When illegal user gets the legal two dimensional code used, due to time factor and event factor and current lockset Interior is inconsistent, lockset failed authentication, and generates warning information.When long-range acquisition one does not make illegal user from legitimate user Legal two dimensional code, since the location information gap of location information and lockset itself in two dimensional code is more than threshold values, lockset mirror Power failure, and generate warning information.
Lockset can scan the two dimensional code of user's offer and realize identification authentication, as confirmation legitimate user, then unlock Operation.Telecommunication may be implemented in lockset, issues the replacement instruction such as seed or remote unlocking for receiving administrator, can also be real The functions such as existing remote alarms, transmission state.
Server/cloud service can also for establishing the server connected between administrator and user, administrator and lockset For use as the data synchronizing function between administrator, user and lockset, for example, event factor synchronization and time factor correction.
The two dimensional code of the present embodiment unlocking can typically consist of the following parts, and can also be done according to practical application It extends or deletes.
1, the encryption information obtained based on code key seed and time factor and event factor, i.e. OTP data;
2, the location information that APP is obtained from user mobile phone, and carry out data encryption;
3, user information;
4, licensing term and authorization number;
5, information above is required to by encryption, for example, use OTP generate value by agreement calculating as pair The secret key pair equipment of encryption is claimed to be encrypted, so that equipment and user be made to realize code key matching in the case where not needing communication.
For the present embodiment when using two dimensional code acquisition module as scene input, referring to fig. 4, process for using is as follows:
1, administrator configures the lockset of deployed the present embodiment at the scene;
2, lockset saves corresponding information, including administrator, location information, safe code key etc.;
3, lockset and administrator complete resource registering in server/cloud platform jointly, cloud platform return success to Administrator;
4, corresponding resource is online in cloud platform, and user is waited to apply for resource;
5, user's online application resource, cloud platform are forwarded to administrator;
6, whether administrator's audit allows to authorize;
If 6.1, not allowing, user is notified to apply for failure, and return step 4 continues waiting for;
If 6.2, allowing, confirmed and authorized, by cloud platform and secure data link, realizes that authorization message is same Step;
7.1, user obtains the code key seed of authorization, the authorization authorization messages such as time and number;
7.2, lockset obtains code key seed, authorized user;
7.3, cloud platform updates resource information, identifies resource occupation;
8, the other informations production such as the authorization message obtained when user needs to unlock using 7.1 and location information is opened The two dimensional code of lock;
9, the two dimensional code that lockset scanning client provides, and authenticated, including to OTP data, authorization time and number, use The data such as family information and location information carry out analysis judgment;
If 10.1, the authentication is passed, unlocking action is carried out, and notifies client, server and administrator's behaviour in service;
If 10.2, failed authentication, without unlocking action, and warning information is generated to cloud and administrator, and at this Ground generates audible and visible alarm;
11, whether server admin monitoring user's lease expire, actively throw a lease, administrator cancels authorization;
12, when then return step 8 in user's rental period, unlocking service is provided for user;
13, when any behavior of generation causes user to lose permission, then by the synchronous authorization message of server initiation, notice is used Family, lockset, administrator, and update resource status be it is vacant, return step 4 waits new user to apply for resource.
The lockset of the present embodiment is greatly improved with respect to ordinary electronic lock in many aspects.
Firstly, administrator can change the code key seed inside lockset at any time, it is opposite to recycle badge and delete fingerprint, householder It can be operated in the case where not notifying user completely, improve Product's Ease of Use;
Secondly, single lockset can be licensed to multiple users by administrator, avoid needing multiple badges when multi-user, but uses It can not be authorized mutually between family, therefore avoid the problem of user sublets;
Again, administrator can accomplish to the temporary Authorization of user or by sub-authorization;
Again, by the customized development of server/cloud service and APP, administrator can be accomplished to a plurality of locksets Empowerment management;
Finally, lockset according to itself present position information and the location information in scanning the two-dimensional code, based on time factor and The encryption data of event factor, it can be determined that Replay Attack and illegal remote authorization, such as attempt to have used Two dimensional code or legitimate user unlocking two dimensional code is being sent to illegal user far from the position of lockset.
The utility model uses the two-dimentional code encryption of OTP dual lock, realizes dynamic two-dimension code authorization, prevents identical bar code weight Attack is put, device security is improved;It is implemented in combination with multi-user management using LPWAN and server/cloud service and APP, is mentioned High ease for use;Using position information confirming legitimate user and lockset in reasonable distance, two sub-authorization of user is prevented;By safety Promotion of the chip as master control bring lockset overall security, such as the protection of tamper design and the attack of each electric appliances;It uses The mode of remotely modifying OTP seed replaces authorized user, does not need the operation at any scene;It is every using being generated based on OTP value Secondary different symmetrical code key, so that user is not needed any communication with lockset can synchronous code key.
It should be noted that above-described embodiment can be freely combined as needed.The above is only to the utility model Preferred embodiment and principle be described in detail, for those of ordinary skill in the art, mention according to the utility model The thought of confession, will change in specific embodiment, and these changes also should be regarded as the protection scope of the utility model.

Claims (9)

1. lockset, including door lock assembly structure and power management module, it is characterised in that: further include
Safe master control, for identify two-dimensional code data it is whether legal and according to qualification result control door lock assembly structure opening and closing it is same Shi Shangchuan qualification result and lockset status information replace code key seed to external equipment and with peripheral device communication;
Two dimensional code acquisition module, for acquiring and parsing two-dimensional code data;
Remote communication module, for being communicated with external device data;
The two dimensional code acquisition module, remote communication module, door lock assembly structure and power management module connect with safe master control It connects.
2. lockset according to claim 1, it is characterised in that: the safe master control includes security algorithm module, data peace Full memory module, code security operation module, abnormality detection module, safety protection module, data self-destruction module and lockset are anti- Demoulding block.
3. lockset according to claim 1, it is characterised in that: the remote communication module is LPWAN communication mode.
4. lockset according to claim 3, it is characterised in that: the remote communication module is NBIOT module or LORA mould Block.
5. lockset according to claim 1, it is characterised in that: it further include the universal input module being connect with safe master control, Scene input for lockset.
6. lockset according to claim 5, it is characterised in that: the universal input module be IC/ID card read module, One of NFC communication module, bio-identification module, Password Input module or multiple combinations.
7. lockset according to claim 1, it is characterised in that: it further include the acousto-optic hint module being connect with safe master control, For providing prompt information to user by sound and light signal.
8. lockset according to claim 7, it is characterised in that: the acousto-optic hint module be buzzer prompt tone module, Voice output module, lamplight pointing module, one or more combinations in screen display module.
9. lockset according to claim 1, it is characterised in that: the two-dimensional code data includes the user of OTP data, encryption Mobile phone position information, user information, licensing term and authorization number.
CN201820768774.2U 2018-05-22 2018-05-22 Lockset Active CN208240106U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201820768774.2U CN208240106U (en) 2018-05-22 2018-05-22 Lockset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201820768774.2U CN208240106U (en) 2018-05-22 2018-05-22 Lockset

Publications (1)

Publication Number Publication Date
CN208240106U true CN208240106U (en) 2018-12-14

Family

ID=64580868

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201820768774.2U Active CN208240106U (en) 2018-05-22 2018-05-22 Lockset

Country Status (1)

Country Link
CN (1) CN208240106U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109712294A (en) * 2019-01-02 2019-05-03 张国宁 A kind of Novel box intelligent door lock
CN110738758A (en) * 2019-06-19 2020-01-31 广东互动电子网络媒体有限公司 Remote control method of intelligent locks and intelligent lock

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109712294A (en) * 2019-01-02 2019-05-03 张国宁 A kind of Novel box intelligent door lock
CN110738758A (en) * 2019-06-19 2020-01-31 广东互动电子网络媒体有限公司 Remote control method of intelligent locks and intelligent lock

Similar Documents

Publication Publication Date Title
US11244524B2 (en) System and method for managing electronic locks
US11580801B2 (en) Access control system with dynamic access permission processing
CN104134253B (en) A kind of gate control system and gate inhibition's deployment method
KR101296863B1 (en) Entry authentication system using nfc door lock
TW201706895A (en) Systems and methods for redundant access control systems based on mobile devices
Divya et al. Survey on various door lock access control mechanisms
CN108257266A (en) A kind of multi-functional smart lock
CN109712287A (en) A kind of intelligent district access control system
CN104967825A (en) Gatekeeper electronic dog system
CN107301702A (en) Intelligent door lock system based on pattern code and Internet
CN202904839U (en) Intelligent security system based on internet of things
KR102261462B1 (en) Security enhanced door lock and door security management system using that
US20220014388A1 (en) Virtual security guard
CN208240106U (en) Lockset
CN104732634B (en) A kind of display methods of lockset
CN109102605A (en) A kind of intelligent lock system opened based on permission
WO2023280277A1 (en) Control method and system
Aluri Smart lock systems: An overview
CN107967731A (en) Door-locking system based on two-dimensional code scanning unlock
Javare et al. Access control and intrusion detection in door lock system using Bluetooth technology
US20240127655A1 (en) Smart lock
Raju et al. Smart lock controlled using voice call
CN116311643B (en) NFC mobile device-based intelligent entrance guard authentication method
CN104008587A (en) Energy-saving safe-guard chain door lock based on optical communication technique
KR20230026341A (en) connection locking system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant