CN208240106U - Lockset - Google Patents
Lockset Download PDFInfo
- Publication number
- CN208240106U CN208240106U CN201820768774.2U CN201820768774U CN208240106U CN 208240106 U CN208240106 U CN 208240106U CN 201820768774 U CN201820768774 U CN 201820768774U CN 208240106 U CN208240106 U CN 208240106U
- Authority
- CN
- China
- Prior art keywords
- module
- lockset
- dimensional code
- user
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The utility model discloses a kind of locksets, including door lock assembly structure and power management module, further include safe master control, for identify two-dimensional code data it is whether legal and according to qualification result control door lock assembly structure opening and closing and meanwhile upload qualification result and lockset status information to external equipment and with peripheral device communication replacement code key seed;Two dimensional code acquisition module, for acquiring and parsing two-dimensional code data;Remote communication module, for being communicated with external device data;The two dimensional code acquisition module, remote communication module, door lock assembly structure and power management module are connect with safe master control.The utility model has the advantage of safety, versatility is good, cuts operating costs.
Description
Technical field
The utility model relates to a kind of locksets safe, that subscription authentication is realized by two-dimensional code scanning.
Background technique
Mobile communication from the connection of people and people, is strided forward to people and the connection of object and object and object, and all things on earth interconnection is must
Right trend.However current 4G network connect scarce capacity with object in object.In fact, compared to short distances such as bluetooth, ZigBee
The communication technology, mobile cellular network have the characteristics such as wide covering, removable and big connection number, can bring more abundant answer
With scene, the main interconnection technique of Internet of Things ought to be become.NB-IOT focuses on low-power consumption and extensively covers (LPWA) Internet of Things (IoT)
Market is that one kind can widely applied emerging technology in the world.With covering is wide, connection is more, rate is low, it is at low cost,
The low in energy consumption, features such as framework is excellent.NB-IOT uses License frequency range, can take three kinds of portions such as interior band, protection band or Independent Carrier Wave
Management side formula, coexists with existing network.
With intelligent city, the arriving of big data era, wireless communication will realize all things on earth connection.Many enterprise's estimated futures
Global Internet of Things connection number will be hundred billion grades of epoch.Coupling for a large amount of objects and object has been had already appeared at present, however these couple
It is carried mostly by short-range communications technologies such as bluetooth, Wi-Fi, but non-operator mobile network.In order to meet different Internet of Things industry
Business demand, according to internet of things service feature and mobile communications network feature, 3GPP has carried out increasing according to narrow band service application scenarios
The technical research of strong mobile communications network function is to adapt to booming internet of things service demand.
Intelligent door lock refer to be different from tradition machinery lock on the basis of it is improved, in user security, identification, managerial side
The lockset of the more intelligent easy in face.Intelligent door lock is the execution unit locked a door in access control system.Intelligent door lock is different from biography
System mechanical lock, is with safety, convenience, the compound lockset of advanced technology.On-mechanical key is used to identify as user
The mature technology of ID, such as: the non-contact class of magnetic card, radio-frequency card, safety is higher, plastic material, and configuration carries more convenient, price
It is cheap.The bio-identifications class such as Fingerprint Lock, iris recognition access control system, highly-safe, there is no lose damage;But be inconvenient to configure, at
This height.TM card is a kind of contact class, and safety is very high, stainless steel material, and configuration carrying is extremely convenient, and price is lower.In bank,
Government department (focusing on safety) and hotel, school dormitory, residential area, villa, hotels and other places are using more.
Intelligent door lock and its application system, equipment connection is more, and rate is low, demand low in energy consumption and its frequency of use
It is low, the LPWAN such as the low feature of delay requirement and NBIOT communicate the characteristics of match very much.China opens the research of planar bar code technology
It starts from 1993.Article Numbering Center of China is to several common two dimensional code PDF417, QRCCode, Data Matrix, Maxi
Code, Code 49, Code 16K, Code One technical specification carried out translation and follow-up study.With China market economy
The rapid development constantly improve with information technology, the domestic demand to two dimensional code this new technology is growing day by day.Chinese article
Encoding centre is under the support energetically of former China State Bureau of Quality and Technical Supervision and national departments concerned, not to the research of planar bar code technology
It is disconnected to go deep into.On the basis of digesting external correlation technique data, the national standard of two two dimensional codes: two dimensional code grid square has been formulated
Horizontal and vertical parity check code (SJ/T 11349-2006) and two dimensional code close matrix code (SJ/T 11350-2006), so that Chinese tool be greatly facilitated
There are the research and development of the two dimensional code of technology with proprietary intellectual property rights.On August 3rd, 2016 pays clearing association to payment mechanism and issues " bar code
Payment transaction specification " (exposure draft), payment mechanism is explicitly pointed out in opinion original text carries out the safety that bar code business needs to follow
Standard.This be Central Bank halted in 2014 two dimensional code payment after for the first time official recognize two dimensional code pay status.With two dimensional code
The maturation of industry and cognition it is perfect, more people can more easily receive two dimensional code Related product and application, in door lock and
It is also such in its relevant application.
Ordinary electronic lock is as shown in Figure 1, generally by live input module, acousto-optic hint module, power management module, master
MCU and door lock assembly structure composition.Wherein, live input module and acousto-optic cue module are mainly used for the man-machine friendship with visitor
Mutually, biological characteristic or Password Input, IC/ID card card reading etc. are acquired, and acousto-optic hint is provided;Power management module is mainly used for pair
The functions such as management of charging and discharging, the undervoltage warning of equipment;Main MCU is mainly used for realizing the various logic function of door lock, and control
Door lock modules realize corresponding function under logic guidance;Door lock assembly structure is the mechanical part of conventional lock, is used
In guarantee door safety.
Although electronic lock is greatly improved in the flexibility applied and authorized with respect to conventional door lock at present, but still
There are some following defects:
1, the occasion big in mobility such as hotels, often by the way of IC/ID card, user must be not square with card
Just and it is easy to be lost;
2, IC/ID card itself can generate loss with using, and generate operation cost;
3, the bio-identifications mode such as fingerprint needs live registed authorization, and is related to user's sensitive biological characteristic;
4, the components such as key, fingerprint sensor can be with using aging;
5, it has no idea to realize interim authorization, such as only allows primary etc operation of unlocking.
Summary of the invention
To solve the above problem existing for present technology, the utility model provide it is a kind of it is safe, versatility is good, reduces
The lockset of operation cost.
The technical solution adopted in the utility model is:
Lockset, including door lock assembly structure and power management module, it is characterised in that: further include
Safe master control, for identifying whether two-dimensional code data is legal and controls opening for door lock assembly structure according to qualification result
It closes while uploading qualification result and lockset status information and replace code key seed to external equipment and with peripheral device communication;
Two dimensional code acquisition module, for acquiring and parsing two-dimensional code data;
Remote communication module, for being communicated with external device data;
The two dimensional code acquisition module, remote communication module, door lock assembly structure and power management module with safety master
Control connection.
Further, the safe master control includes security algorithm module, data safety memory module, code security operation mould
Block, abnormality detection module, safety protection module, data self-destruction module and lockset tamper module.
Further, the remote communication module is LPWAN communication mode.
Further, the remote communication module is NBIOT module or LORA module.
It further, further include the universal input module being connect with safe master control, the scene input for lockset.
Further, the universal input module be IC/ID card read module, it is NFC communication module, bio-identification module, close
One of code input module or multiple combinations.
It further, further include the acousto-optic hint module being connect with safe master control, for being provided by sound and light signal user
Prompt information.
Further, the acousto-optic hint module be buzzer prompt tone module, voice output module, lamplight pointing module,
One or more combinations in screen display module.
Further, the two-dimensional code data includes OTP data, the user mobile phone location information of encryption, user information, authorization
Time limit and authorization number.
The beneficial effects of the utility model are:
1, the promotion of ease for use, administrator authorize and cancel more flexible, user management and synchronizing information automation;
2, cut operating costs, avoid because lose IC/ID card and caused by loss, two dimensional code acquisition module is with respect to fingerprint
Sensor has the lower proportion of goods damageds and cost;
3, good compatibility can be compatible with general at present various electronic lock functions and application scenarios;
4, safety is promoted, and is realized the other information security of financial level by OTP technology, be may be implemented to lock by safety chip
Have the design such as safe tamper of itself, prevents various information, electric appliance or physical attacks;
5, remote communicating function, can be with real-time informing manager's lockset state, between automatic synchronization administrator and user
Partial information;
6, the simplification of multiple equipment management can easily realize administrator to multiple by cloud service and APP design
The management of lockset, and being organically combined with existing system, such as with the combination of Hospitality management system etc..
Detailed description of the invention
Fig. 1 is a kind of schematic diagram of existing electric lockset.
Fig. 2 is the schematic diagram of the utility model.
Fig. 3 is the application schematic diagram of the utility model.
Fig. 4 is the process for using figure of the utility model.
Specific embodiment
Combined with specific embodiments below the utility model to be further described, but the utility model is not limited to
In these specific embodiments.One skilled in the art would recognize that the utility model covers in Claims scope
All alternatives, improvement project and the equivalent scheme that may include.
Description of Related Art is as follows:
NB-IoT:NB-IoT is the emerging technology in one, the field IoT, supports low power consuming devices in the cellular data of wide area network
Connection, also referred to as low-power consumption wide area network (LPWAN).NB-IoT supports stand-by time length, to network connectivity requirements higher device
Efficient connection.It is said that the NB-IoT device battery service life can be improved at least 10 years, while can also provide very comprehensive room
Interior cellular data connection covering.
Access control system: access control system is to mean Access Control System, abbreviation ACS in intelligent building field.
Refer to " door " forbids permission, is the prevention of the guard to " door ".Here " door ", it is in broad terms, various logical including what can be passed through
Road, including the door that people is current, the door etc. of vehicle pass-through.Gateway gate inhibition safety management system is new-modernization safety management system
System, it integrates microcomputer automatic identification technology and modern safety management measure, it is related to electronics, mechanical, optics, computer skill
Art, mechanics of communication, many new technologies such as biotechnology.It is to solve important department entrance to realize the effective of safety precaution management
Measure.Various confidential departments are applicable in, it is intelligent small such as bank, hotel, parking lot management, computer room, armory, safe care registry, cubicle
Area, factory etc..
Two dimensional code: two-dimensional bar code/two dimensional code (2-dimensional bar code) is pressed with certain specific geometric figure
The chequered with black and white graphic recording data symbol information that certain rule is distributed in plane (on two-dimensional directional);In code compilation
It is opposite with binary system using several dexterously using " 0 " of composition computer-internal logical foundations, the concept of " 1 " bit stream
The geometrical body answered indicates text numerical information, by image input device or photoelectric scanning device automatically identifying and reading to realize letter
Breath automatically processes: it has some general character of barcode technology: every kind of code system has its specific character set;Each character occupies centainly
Width;With certain verifying function etc..Also have simultaneously to the information automatic identification function and processing figure rotation that do not go together
Turn change point.
LPWAN: low-power consumption wide area network (LPWAN) is the M2M communication scene optimization in applying for Internet of Things, by electricity
Battery-powered, low rate, super low-power consumption, low duty ratio support single node maximal cover reachable with Star Network covering
The remote wireless network mechanics of communication of 100 kilometers of honeycomb aggregation gateway.The technology is a kind of revolutionary object in the world in recent years
Network access technology, have the characteristics that at a distance, low-power consumption, low O&M cost, with the prior arts phase such as WiFi bluetooth, ZigBee
Than LPWAN is truly realized big region Internet of Things low cost all standing.LPWAN technology has not yet formed a unified standard at present,
Sigfox, LoRa, Telensa, PTC etc. are than more typical LPWAN technology.LPWAN itself is relative to 2G/3G/4G/5G
A relative concept for the WWAN such as LTE-MTC, there is no clear, stringent definition to this industry.
OTP full name One-time Password, also referred to as dynamic password, be according to special algorithm generate can not be pre-
The random digit of survey combines, and each password is used only once.OTP divides from technology there are three types of form, and time synchronization, event are same
Step, challenge/response.
(1) time synchronization
Principle was compared based on the time of dynamic token and verifying dynamic password server, based on the token of time synchronization,
One new password of general generation in every 60 seconds, it is desirable that server can keep correct clock with high accuracy, while to its token
Crystal oscillator frequency have a strict requirements, the corresponding terminal of this technology is hardware token.
(2) event synchronization
Token based on event synchronization, principle are by a certain specific event order and identical seed as defeated
Enter, by calculating consistent password in HASH algorithm.
(3) challenge/response
The operational line being usually used in, inputs the challenge code that server-side issues in website/response, and dynamic token inputs this and chooses
War code, by generating one 6/8 random digit on built-in algorithm, password is once effective, and this technology is applied most at present
It is universal, including scratch card, short message password, dynamic token also have challenge/response form.
Referring to fig. 2, a kind of lockset provided in this embodiment, comprising:
Safe master control 1-1, the main logic for realizing door lock, and each peripheral module is logically controlled, for identifying two
Whether dimension code data are legal and upload qualification result and lockset shape simultaneously according to the opening and closing that qualification result controls door lock assembly structure
State information replaces code key seed to external equipment and with peripheral device communication;
Information acquisition module 1-5 includes universal input module 1-5-1 and two dimensional code acquisition module 1-5-2,
Wherein universal input module 1-5-1 is IC/ID card read module, NFC communication mould for the scene input of lockset
One of block, bio-identification module, Password Input module or multiple combinations can be selected according to the demand of actual product
It selects;
Two dimensional code acquisition module 1-5-2, for acquiring and parsing two-dimensional code data, two-dimensional code data includes OTP data, adds
Close user mobile phone location information, user information, licensing term and authorization number;
Remote communication module 1-3 is used to communicate with external device data, preferably LPWAN communication mode, such as NBIOT module
Or LORA module.
Door lock assembly structure 1-2, the main mechanical structure and function for realizing conventional lock, including what is unlocked to mechanical key
It supports;
Power management module 1-4 is mainly used for being powered whole system, and realizes the power management of system, including
Management of charging and discharging, the functions such as undervoltage warning;
Acousto-optic hint module 1-6 is buzzer prompt tone mould for providing prompt information to user by sound and light signal
Block, voice output module, lamplight pointing module, one or more combinations in screen display module, can be according to actual product
Demand is selected;
The universal input module 1-5-1, two dimensional code acquisition module 1-5-2, remote communication module 1-3, door lock assembly knot
Structure 1-2, power management module 1-4 and acousto-optic cue module 1-6 are connect with safe master control 1-1.
Safe master control 1-1 described in the present embodiment is a safety chip, including security algorithm module, data safety store mould
Block, code security operation module, abnormality detection module, safety protection module, data self-destruction module and lockset tamper module.I.e.
The safety chip can provide various security algorithms, such as the close or general HASH, OTP of state, symmetrical, asymmetric encryption are calculated
Method;The safety chip can provide the function of data safety storage and code security operation;The safety chip can provide
Anti-invasion and partly intrusive attack the ability such as abnormal voltage detection, abnormal temperature detection, active defense layer, data self-destruction;Institute
State safety chip can provide tamper pin make lockset can be realized tamper design.
Referring to Fig. 3, a kind of typical case system of lockset described in the present embodiment, including server/cloud service, administrator,
Casual user A, legitimate user B, illegal user C, lockset, the communication between lockset and administrator, user and server should
It is the public network communication based on security protocol, includes but be not limited only to through modes such as ipsec, https or wss.
Wherein:
Administrator holds property right to room, house or other resources of lockset protection, the people of the right to use or empowerment management
Member.Such as house householder, hotel management, the scenes such as people Su Guanli.Administrator can be authorized and be cancelled to user by APP
Authorization can also modify the code key seed inside lockset by APP.Administrator can simultaneously authorize multiple users.Pipe
Reason person can cancel and authorize to user by way of replacing seed, i.e. user's code key seed and lockset code key seed is inconsistent,
The two dimensional code that user generates is weathering.Administrator can check lockset opening time and user by APP.
Casual user A, that is, the person of being managed authorization, the use of lockset can be only opened in finite number of time and time restriction
Family.Such as nobody or letting agency see the scene in room with people in friends and family's visiting man.
Legitimate user B, that is, the person of being managed authorization, the people of the protected resources use right of lockset is obtained within the authorization time
Member.Such as the short rent in people place, long-term lessee, the scenes such as hotel occupancy personnel.Legitimate user can be by showing that APP is generated to lockset
, the two dimensional code that dynamic updates is authenticated by lockset, is opened lockset before the deadline and is used resource.Legitimate user does not have
The right of two sub-authorizations.
Illegal user C does not receive the user of administrator's authorization.Such as mobile personnel, expired lessee etc..It is illegal to use
In there is no code key seed, therefore legal two dimensional code can not be generated, lockset failed authentication will not open the door, and generate alarm signal
Breath.When illegal user gets the legal two dimensional code used, due to time factor and event factor and current lockset
Interior is inconsistent, lockset failed authentication, and generates warning information.When long-range acquisition one does not make illegal user from legitimate user
Legal two dimensional code, since the location information gap of location information and lockset itself in two dimensional code is more than threshold values, lockset mirror
Power failure, and generate warning information.
Lockset can scan the two dimensional code of user's offer and realize identification authentication, as confirmation legitimate user, then unlock
Operation.Telecommunication may be implemented in lockset, issues the replacement instruction such as seed or remote unlocking for receiving administrator, can also be real
The functions such as existing remote alarms, transmission state.
Server/cloud service can also for establishing the server connected between administrator and user, administrator and lockset
For use as the data synchronizing function between administrator, user and lockset, for example, event factor synchronization and time factor correction.
The two dimensional code of the present embodiment unlocking can typically consist of the following parts, and can also be done according to practical application
It extends or deletes.
1, the encryption information obtained based on code key seed and time factor and event factor, i.e. OTP data;
2, the location information that APP is obtained from user mobile phone, and carry out data encryption;
3, user information;
4, licensing term and authorization number;
5, information above is required to by encryption, for example, use OTP generate value by agreement calculating as pair
The secret key pair equipment of encryption is claimed to be encrypted, so that equipment and user be made to realize code key matching in the case where not needing communication.
For the present embodiment when using two dimensional code acquisition module as scene input, referring to fig. 4, process for using is as follows:
1, administrator configures the lockset of deployed the present embodiment at the scene;
2, lockset saves corresponding information, including administrator, location information, safe code key etc.;
3, lockset and administrator complete resource registering in server/cloud platform jointly, cloud platform return success to
Administrator;
4, corresponding resource is online in cloud platform, and user is waited to apply for resource;
5, user's online application resource, cloud platform are forwarded to administrator;
6, whether administrator's audit allows to authorize;
If 6.1, not allowing, user is notified to apply for failure, and return step 4 continues waiting for;
If 6.2, allowing, confirmed and authorized, by cloud platform and secure data link, realizes that authorization message is same
Step;
7.1, user obtains the code key seed of authorization, the authorization authorization messages such as time and number;
7.2, lockset obtains code key seed, authorized user;
7.3, cloud platform updates resource information, identifies resource occupation;
8, the other informations production such as the authorization message obtained when user needs to unlock using 7.1 and location information is opened
The two dimensional code of lock;
9, the two dimensional code that lockset scanning client provides, and authenticated, including to OTP data, authorization time and number, use
The data such as family information and location information carry out analysis judgment;
If 10.1, the authentication is passed, unlocking action is carried out, and notifies client, server and administrator's behaviour in service;
If 10.2, failed authentication, without unlocking action, and warning information is generated to cloud and administrator, and at this
Ground generates audible and visible alarm;
11, whether server admin monitoring user's lease expire, actively throw a lease, administrator cancels authorization;
12, when then return step 8 in user's rental period, unlocking service is provided for user;
13, when any behavior of generation causes user to lose permission, then by the synchronous authorization message of server initiation, notice is used
Family, lockset, administrator, and update resource status be it is vacant, return step 4 waits new user to apply for resource.
The lockset of the present embodiment is greatly improved with respect to ordinary electronic lock in many aspects.
Firstly, administrator can change the code key seed inside lockset at any time, it is opposite to recycle badge and delete fingerprint, householder
It can be operated in the case where not notifying user completely, improve Product's Ease of Use;
Secondly, single lockset can be licensed to multiple users by administrator, avoid needing multiple badges when multi-user, but uses
It can not be authorized mutually between family, therefore avoid the problem of user sublets;
Again, administrator can accomplish to the temporary Authorization of user or by sub-authorization;
Again, by the customized development of server/cloud service and APP, administrator can be accomplished to a plurality of locksets
Empowerment management;
Finally, lockset according to itself present position information and the location information in scanning the two-dimensional code, based on time factor and
The encryption data of event factor, it can be determined that Replay Attack and illegal remote authorization, such as attempt to have used
Two dimensional code or legitimate user unlocking two dimensional code is being sent to illegal user far from the position of lockset.
The utility model uses the two-dimentional code encryption of OTP dual lock, realizes dynamic two-dimension code authorization, prevents identical bar code weight
Attack is put, device security is improved;It is implemented in combination with multi-user management using LPWAN and server/cloud service and APP, is mentioned
High ease for use;Using position information confirming legitimate user and lockset in reasonable distance, two sub-authorization of user is prevented;By safety
Promotion of the chip as master control bring lockset overall security, such as the protection of tamper design and the attack of each electric appliances;It uses
The mode of remotely modifying OTP seed replaces authorized user, does not need the operation at any scene;It is every using being generated based on OTP value
Secondary different symmetrical code key, so that user is not needed any communication with lockset can synchronous code key.
It should be noted that above-described embodiment can be freely combined as needed.The above is only to the utility model
Preferred embodiment and principle be described in detail, for those of ordinary skill in the art, mention according to the utility model
The thought of confession, will change in specific embodiment, and these changes also should be regarded as the protection scope of the utility model.
Claims (9)
1. lockset, including door lock assembly structure and power management module, it is characterised in that: further include
Safe master control, for identify two-dimensional code data it is whether legal and according to qualification result control door lock assembly structure opening and closing it is same
Shi Shangchuan qualification result and lockset status information replace code key seed to external equipment and with peripheral device communication;
Two dimensional code acquisition module, for acquiring and parsing two-dimensional code data;
Remote communication module, for being communicated with external device data;
The two dimensional code acquisition module, remote communication module, door lock assembly structure and power management module connect with safe master control
It connects.
2. lockset according to claim 1, it is characterised in that: the safe master control includes security algorithm module, data peace
Full memory module, code security operation module, abnormality detection module, safety protection module, data self-destruction module and lockset are anti-
Demoulding block.
3. lockset according to claim 1, it is characterised in that: the remote communication module is LPWAN communication mode.
4. lockset according to claim 3, it is characterised in that: the remote communication module is NBIOT module or LORA mould
Block.
5. lockset according to claim 1, it is characterised in that: it further include the universal input module being connect with safe master control,
Scene input for lockset.
6. lockset according to claim 5, it is characterised in that: the universal input module be IC/ID card read module,
One of NFC communication module, bio-identification module, Password Input module or multiple combinations.
7. lockset according to claim 1, it is characterised in that: it further include the acousto-optic hint module being connect with safe master control,
For providing prompt information to user by sound and light signal.
8. lockset according to claim 7, it is characterised in that: the acousto-optic hint module be buzzer prompt tone module,
Voice output module, lamplight pointing module, one or more combinations in screen display module.
9. lockset according to claim 1, it is characterised in that: the two-dimensional code data includes the user of OTP data, encryption
Mobile phone position information, user information, licensing term and authorization number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201820768774.2U CN208240106U (en) | 2018-05-22 | 2018-05-22 | Lockset |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201820768774.2U CN208240106U (en) | 2018-05-22 | 2018-05-22 | Lockset |
Publications (1)
Publication Number | Publication Date |
---|---|
CN208240106U true CN208240106U (en) | 2018-12-14 |
Family
ID=64580868
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201820768774.2U Active CN208240106U (en) | 2018-05-22 | 2018-05-22 | Lockset |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN208240106U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109712294A (en) * | 2019-01-02 | 2019-05-03 | 张国宁 | A kind of Novel box intelligent door lock |
CN110738758A (en) * | 2019-06-19 | 2020-01-31 | 广东互动电子网络媒体有限公司 | Remote control method of intelligent locks and intelligent lock |
-
2018
- 2018-05-22 CN CN201820768774.2U patent/CN208240106U/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109712294A (en) * | 2019-01-02 | 2019-05-03 | 张国宁 | A kind of Novel box intelligent door lock |
CN110738758A (en) * | 2019-06-19 | 2020-01-31 | 广东互动电子网络媒体有限公司 | Remote control method of intelligent locks and intelligent lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11244524B2 (en) | System and method for managing electronic locks | |
US11580801B2 (en) | Access control system with dynamic access permission processing | |
CN104134253B (en) | A kind of gate control system and gate inhibition's deployment method | |
TW201706895A (en) | Systems and methods for redundant access control systems based on mobile devices | |
Divya et al. | Survey on various door lock access control mechanisms | |
CN103370717A (en) | Always-available embedded theft reaction subsystem | |
CN108257266A (en) | A kind of multi-functional smart lock | |
CN109712287A (en) | A kind of intelligent district access control system | |
CN104967825A (en) | Gatekeeper electronic dog system | |
CN202904839U (en) | Intelligent security system based on internet of things | |
KR102261462B1 (en) | Security enhanced door lock and door security management system using that | |
CN208240106U (en) | Lockset | |
CN104732634B (en) | A kind of display methods of lockset | |
CN109102605A (en) | A kind of intelligent lock system opened based on permission | |
KR102017337B1 (en) | Smart safe based on bluetooth processed with smartphone and method for providing lock or unlocking service of door of safe | |
WO2023280277A1 (en) | Control method and system | |
Aluri | Smart lock systems: An overview | |
CN107967731A (en) | Door-locking system based on two-dimensional code scanning unlock | |
Javare et al. | Access control and intrusion detection in door lock system using Bluetooth technology | |
Pradeepkumar et al. | A Novel Hybrid Approach to Smart Door Locking System based on Real Time Data Transmission | |
US20240127655A1 (en) | Smart lock | |
Raju et al. | Smart lock controlled using voice call | |
CN116311643B (en) | NFC mobile device-based intelligent entrance guard authentication method | |
CN104008587A (en) | Energy-saving safe-guard chain door lock based on optical communication technique | |
KR20230026341A (en) | connection locking system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |