CN210605841U - Intelligent lock control system - Google Patents

Intelligent lock control system Download PDF

Info

Publication number
CN210605841U
CN210605841U CN201921581928.8U CN201921581928U CN210605841U CN 210605841 U CN210605841 U CN 210605841U CN 201921581928 U CN201921581928 U CN 201921581928U CN 210605841 U CN210605841 U CN 210605841U
Authority
CN
China
Prior art keywords
module
mobile device
transmission interface
verification
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201921581928.8U
Other languages
Chinese (zh)
Inventor
刘和兴
邓志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen AVIC Information Industry Group Co.,Ltd.
Original Assignee
SHENZHEN CATIC INFORMATION TECHNOLOGY INDUSTRY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN CATIC INFORMATION TECHNOLOGY INDUSTRY CO LTD filed Critical SHENZHEN CATIC INFORMATION TECHNOLOGY INDUSTRY CO LTD
Priority to CN201921581928.8U priority Critical patent/CN210605841U/en
Application granted granted Critical
Publication of CN210605841U publication Critical patent/CN210605841U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The utility model relates to an intelligence lock control system, include: mobile device and client device, the client device includes: handheld device and authentication card, the mobile device includes: the check-up and control module of unblanking, first battery, communication module and intelligence lock, the authentication card includes: the second battery, the second transmission interface and the encryption and decryption module. The utility model realizes the function of individually controlling whether to allow unlocking in different time periods or scenes; a plurality of passwords do not need to be memorized, so that the operation of a user is facilitated; the operation convenience is improved; the method and the device realize binary authentication, increase a verification link compared with the verification of a mechanical key or a password, and improve the safety.

Description

Intelligent lock control system
Technical Field
The utility model belongs to the technical field of the intelligence lock control system and specifically relates to an intelligence lock control system.
Background
The existing intelligent lock system is mainly used for products with external power supply and network connection, such as doors or fixed storage cabinets. For mobile devices, conventional smart lock systems cannot be generally applied to such devices due to reasons such as power failure or movement to a location where a network cannot be connected. For mobile devices, the locks used therefore generally include the following forms:
(1) mechanical locks have the disadvantage of being difficult to manage. The problems of key loss, illegal copying and the like are difficult to avoid, and especially when a plurality of devices are respectively locked, a large number of keys are difficult to carry and inconvenient to find, so that great labor cost is consumed; and the mechanical lock is difficult to realize fine control, for example, in a certain period or scene, a key keeper should not be allowed to unlock the lock according to business requirements, but the mechanical key cannot meet the business requirements.
(2) Simple electronic locks, for example: such electronic locks, such as an IC card, an RFID card, and a combination lock, which are hung outside a mobile device, generally have their own batteries, and although they replace mechanical keys, they still have the same problems as mechanical locks. For example, when the number of managed devices is large, if each device is provided with different passwords, an operator cannot remember a plurality of groups of passwords; and if each equipment sets up the same password, then there is the potential safety hazard again, and can't carry out unlocking authority control to equipment individuality.
(3) The RFID/wireless coded lock installed inside the mobile device is also provided with a battery or an external power supply. If adopt built-in battery mode drive lock control circuit, because lock control circuit power consumptive great, need frequently dismantle the battery and change that charges to some mobile device, like bank cash case, built-in large capacity battery can have the potential safety hazard of catching fire or explosion, and if adopt external power supply drive lock control circuit, the user can't find the power in some places then, leads to unable the unblanking, even find the power moreover, still need additionally insert the electricity action when unblanking, complex operation.
At present, an external mobile power supply adopted by a part of built-in locks reversely supplies power through a USB mode. However, most lock control power supply has high voltage, and the 5V voltage of the USB cannot meet the requirement in many cases.
In summary, the technical problems that fine management is difficult, unlocking authority control cannot be performed on individual equipment, and a built-in battery has potential safety hazards and is inconvenient to charge exist in the prior art.
SUMMERY OF THE UTILITY MODEL
The present invention aims at solving at least one of the technical problems in the related art to a certain extent. Therefore, the embodiment of the utility model provides an aim at provides an intelligence lock control method and system, can be when different time quantum or scene to whether allow to unblank the function of carrying out the independent control, need not to set up a plurality of passwords, can realize binary authentication.
The embodiment of the utility model provides an adopted technical scheme is:
an embodiment of the utility model provides an intelligence lock control system, include: a mobile device and a client device, the client device comprising: handheld device and authentication card, the mobile device includes: the check-up and control module of unblanking, first battery, communication module and intelligence lock, the authentication card includes: the second battery, the second transmission interface and the encryption and decryption module;
the communication module is connected with the handheld device and used for receiving user personal password verification data and a service operation request sent by the handheld device;
the encryption and decryption module is connected with the second transmission interface, the second transmission interface is connected with the communication module, and the communication module is connected with the unlocking verification and control module and used for sending the password verification data and the authentication result;
the unlocking verification and control module is connected with the electric control lock and used for sending a control signal to the electric control lock to execute business according to the authentication result.
Further, the communication module includes: the wireless communication module is connected with the handheld device, the first transmission interface is connected with the second transmission interface, and the first transmission interface is connected with the unlocking verification and control module and the electric control lock.
Further, the system certificate public key of the mobile device is generated and injected by a mobile device management server or key injection software.
Further, the mobile device management server comprises a key management module and/or a service management module;
the key management module is used for injecting a system certificate public key into the mobile equipment;
the service management module is used for writing a service state into the mobile equipment, determining a service state allowing unlocking and/or a user ID with unlocking authority.
Further, the encryption and decryption module stores the personal identity certificate of the operator, the personal password storage value and the corresponding private key.
Further, the content of the personal identification certificate of the operator includes: user ID, personal identity certificate public key, allowed business actions to be performed, and/or certificate validity period.
The utility model has the advantages that:
the embodiment of the utility model provides a before mobile device gets into the off-line state, preset the business action that mobile device allowed under different states to carry out through the system, follow-up in the off-line operation in-process, business operation only allows to carry out under the business state that presets to whether realized when different time quantums or scene whether allow to unblank the function of carrying out the independent control; before the mobile equipment enters an offline state, a state allowing unlocking operation to be executed is preset or a user controls unlocking permission, the user can control different mobile equipment only by using a certificate and a password of the user, different passwords do not need to be set for each equipment, a plurality of passwords do not need to be memorized, and the operation of the user is facilitated; the authentication card simultaneously realizes two functions of power supply and offline identity authentication, so that the problem of high-current power supply of the lockset is solved, and meanwhile, the power supply action is changed into the unlocking action in the user experience, so that the operation convenience is improved; by combining two modes of user password verification and authentication card verification, binary authentication is realized, a verification link is added compared with single mechanical key or password verification, and the safety is improved.
Drawings
FIG. 1 is a block diagram of an intelligent lock control system according to an embodiment of the present invention;
FIG. 2 is another block diagram of the intelligent lock control system according to the embodiment of the present invention;
fig. 3 is a schematic flow chart of a control method of a third intelligent lock according to an embodiment of the present invention;
fig. 4 is a flowchart of a control method of the intelligent lock according to the fourth embodiment of the present invention;
fig. 5 is a flowchart of a control method of the intelligent lock according to a fifth embodiment of the present invention;
fig. 6 is a flowchart of a control method of an intelligent lock according to a sixth embodiment of the present invention;
fig. 7 is a flowchart of a control method of the intelligent lock according to the seventh embodiment of the present invention.
Reference numerals
10. A mobile device management server; 20. a mobile device; 30. a client device; 11. a key management module; 12. a service management module; 21. an unlocking inspection and control circuit; 22. an electrically controlled lock; 23. a first battery; 24. a first communication interface; 25. a communication module; 250. a wireless communication module; 31. a rechargeable battery; 32. a second communication interface; 33. an encryption and decryption module 34 and a handheld device; 35. and a user interaction module.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
In order to facilitate accurate understanding of the embodiments of the present invention, the key terms involved in the embodiments of the present invention are now defined:
HASH value: hash, which is generally translated as a "Hash," also known as direct transliteration, is the conversion of an input of arbitrary length into a fixed-length output, which is a Hash value, by a hashing algorithm. This transformation is a kind of compression mapping, i.e. the space of hash values is usually much smaller than the space of inputs, different inputs may hash to the same output, so it is not possible to determine a unique input value from a hash value. In short, it is a function of compressing a message of an arbitrary length to a message digest of a certain fixed length.
Example 1
An embodiment provides an electrically controlled lock system, see fig. 1, comprising:
mobile device 20 and client device 30, client device 30 comprising: handheld device 34 and authentication card, the mobile device includes: the verification and control module 21, first battery 23, communication module 25 and electric control lock 22 unblank, and the authentication card includes: a second battery 31, a second transmission interface 32 and an encryption/decryption module 33;
in one embodiment, the first battery 23 is connected to and supplies power to the unlock verification and control module 21 and the communication module 25, respectively, for providing power required for the operation of the mobile device 20.
In the present embodiment, the handheld device 34 may be selected from a cell phone, a tablet computer, and the like; the unlocking verification and control module 21 is realized based on a relay, if the verification is passed, the relay is conducted to open the electric control lock, and the first battery 23 and the second battery 32 can be 12V direct current batteries; the electric control lock 22 can be a small 12V/0.8A electric control lock of SARY brand, LY-03 type.
The communication module 25 is connected with the handheld device 34 and is used for receiving the user personal password verification data and the service operation request sent by the handheld device 34; the handset 34 is used for running and operating APP, and sending user personal password verification data and service operation requests.
The encryption and decryption module 33 is connected with the second transmission interface 32, the second transmission interface 32 is connected with the communication module 25, and the communication module 25 is connected with the unlocking verification and control module 21 and used for sending password verification data and an authentication result;
in this embodiment, the encryption/decryption module 33 is typically implemented by a chip with asymmetric encryption/decryption functions and corresponding driver software, such as an LKT4305 chip in policeman, and the module is responsible for the asymmetric encryption/decryption operation and the secure storage of the related key.
The first transmission interface 14 and the second transmission interface 32 are mainly used for realizing data and power transmission, data and power transmission can be realized simultaneously through the data interfaces, and the second battery 31 supplies power to the encryption and decryption module and the electric control lock respectively to realize the function of charging the mobile device 20 through the authentication card.
In a specific embodiment, the encryption and decryption module 33 stores a personal identity certificate, a personal password storage value and a corresponding private key of an operator, where the personal private key cannot be read and the personal identity certificate can be read; the content of the personal identity certificate of the operator usually contains information such as a user ID, a public key of the personal identity certificate, a business action allowed to be executed, a validity period of the certificate and the like, and can be signed by using a private key of a system certificate.
The unlocking verification and control module 21 is connected with the electric control lock 22 and is used for sending a control signal to the electric control lock 22 for service execution according to the authentication result.
In the present embodiment, the communication module 24 includes: the wireless communication module 240 is connected with the handheld device 34, the first transmission interface 14 is connected with the second transmission interface 32, and the first transmission interface 14 is connected with the unlocking verification and control module 21.
In this embodiment, the wireless communication module 240 may adopt a bluetooth module, a WiFi module or a zigbee module.
In this embodiment, the system certificate public key of the mobile device is generated and injected by the mobile device management server. The device management server 10 includes a key management module 11 and a service management module 12, both of which are software modules, wherein the key management module 11 is configured to inject a system certificate public key into the mobile device 20; the service management module 12 is configured to write a service state, determine a service state allowing unlocking, and/or determine a user ID having an unlocking right;
in this embodiment, the client 30 may be a handheld device 34 and an authentication card or an interactive authentication card, where the interactive authentication card actually uses the user interaction module 35 to replace the handheld device 34, and integrates the user interaction module 35 and the authentication card into one card to form the interactive authentication card; the user interaction module 35 is configured to obtain login information of a user, where the login information includes a password and a user identity, and may be implemented by using common terminal equipment, such as a liquid crystal display, an input keyboard, and the like.
Example 2
Embodiment 2 also provides a smart lock system which is different from embodiment 1 in that only the key management module 11 is included in the mobile device management server 10.
Example 3
Referring to fig. 1, embodiment 3 provides a control method of an intelligent lock implemented based on embodiments 1 and 2, where the control method of the intelligent lock includes the following steps:
s1: the client device 30 acquires the personal password of the user and the service operation request, generates password verification data and sends the password verification data to the mobile device 20;
when an operator needs to perform an authorization operation such as unlocking or switching a service state in an offline state, the operator inserts an authentication card into the mobile device 20 through the first transmission interface 24 of the mobile device 20, inputs a personal password to transmit to the client device 30, and transmits a service operation request.
When the client device 30 is an interactive authentication card, the user may enter a personal password directly on the interactive authentication card.
In this embodiment, the service operation request sent by the user through the client device 30 includes, but is not limited to: unlocking action and action of switching to a certain service state.
S2: the mobile device 20 generates verification request data according to the password verification data and sends the verification request data to the client device 30; in this step, the password may be verified in a conventional password verification manner.
S3: the client device 30 performs validity authentication on the verification request data by combining the personal identity certificate and the private key to generate an authentication result;
s4: the mobile device 20 performs service execution by using the system certificate public key and the service authority in combination with the authentication result and the service operation request.
In this embodiment, before step S1, a pre-step S01 is further included: the system certificate public key is injected into the mobile device 20, which is typically performed at the time of factory shipment of the mobile device 20.
In this embodiment, before step S1, a pre-step S02 is further included: this step of writing the traffic status, determining the traffic status allowed to unlock and/or the user ID with unlocking authority into the mobile device 20 is typically performed when the mobile device 20 is ready to be transported out of the system signal coverage area.
Example 2
Referring to fig. 2, the present embodiment provides a control method for performing authentication only by means of an authentication card when the client device 30 is a handheld device 34 and the authentication card is combined, and the method includes the following steps:
pre-step S01: the system certificate public key is injected into the mobile device 20, which is typically performed at the time of factory shipment of the mobile device 20.
Pre-step S02: this step of writing the traffic status, determining the traffic status allowed to unlock and/or the user ID with unlocking authority into the mobile device 20 is typically performed when the mobile device 20 is ready to be transported out of the system signal coverage area.
S1: the handheld device 34 acquires the personal password and the service operation request;
s2: the mobile device 20 verifies the validity of the authentication card and, if the card is valid, executes the service request, and if the card is not valid, denies execution of the service request. The legality authentication can adopt conventional password authentication, fingerprint authentication and other modes.
Example 4
Referring to fig. 4, the present embodiment provides that, in the case that the client 30 is a handset 34 combined with an authentication card, the client 30 is authenticated with a personal password, and the method includes the following steps:
pre-step S01: the system certificate public key is injected into the mobile device 20, which is typically performed at the time of factory shipment of the mobile device 20.
Pre-step S02: this step of writing the traffic status, determining the traffic status allowed to unlock and/or the user ID with unlocking authority into the mobile device 20 is typically performed when the mobile device 20 is ready to be transported out of the system signal coverage area.
S1: the handheld device 34 acquires the personal password of the user and the service operation request, generates password verification data and sends the password verification data to the mobile device 20; when an operator needs to perform an authorization operation such as unlocking or switching a service state in an offline state, the operator inserts an authentication card into the mobile device 20 through the first transmission interface 24 of the mobile device 20, inputs a personal password into the handheld device 34, and sends a service operation request.
S2: the mobile device 20 generates verification request data according to the password verification data and sends the verification request data to the client device 30; in this step, the password may be verified in a conventional password verification manner.
S3: the authentication card combines the personal identity certificate and the private key to carry out validity authentication on the verification request data to generate an authentication result;
s4: the mobile device 20 performs service execution by using the system certificate public key and the service authority in combination with the authentication result and the service operation request.
Example 5
Referring to fig. 5, the present embodiment provides a control method only by authenticating a client 30 in the case that the client 30 is an interactive authentication card, which includes the following steps:
referring to fig. 2, the present embodiment provides a control method for performing authentication only by means of an authentication card when the client device 30 is a handheld device 34 and the authentication card is combined, and the method includes the following steps:
pre-step S01: the system certificate public key is injected into the mobile device 20, which is typically performed at the time of factory shipment of the mobile device 20.
Pre-step S02: this step of writing the traffic status, determining the traffic status allowed to unlock and/or the user ID with unlocking authority into the mobile device 20 is typically performed when the mobile device 20 is ready to be transported out of the system signal coverage area.
S1: the interactive authentication card acquires a service operation request;
s2: the mobile device 20 verifies the validity of the interactive authentication card and executes the service request if the authentication card is valid and refuses to execute the service request if the authentication card is not valid. The legality authentication can adopt conventional password authentication, fingerprint authentication and other modes.
Example 6
Referring to fig. 6, the present embodiment provides a control method for authenticating a client 30 in combination with personal password verification in the case that the client 30 is an interactive authentication card, which includes the following steps:
pre-step S01: the system certificate public key is injected into the mobile device 20, which is typically performed at the time of factory shipment of the mobile device 20.
Pre-step S02: this step of writing the traffic status, determining the traffic status allowed to unlock and/or the user ID with unlocking authority into the mobile device 20 is typically performed when the mobile device 20 is ready to be transported out of the system signal coverage area.
S1: the interactive authentication card acquires a user personal password and a service operation request, generates password verification data and sends the password verification data to the mobile device 20; when an operator needs to perform authorization operations such as unlocking or switching service states in an offline state, the interactive authentication card is first inserted into the mobile device 20 through the first transmission interface 24 of the mobile device 20, and meanwhile, a personal password is input to the interactive authentication card to send a service operation request.
S2: the mobile device 20 generates verification request data according to the password verification data and sends the verification request data to the interactive verification card;
s3: the interactive authentication card is combined with the personal identity certificate and the private key to carry out validity authentication on the verification request data to generate an authentication result;
s4: the mobile device 20 performs service execution by using the system certificate public key and the service authority in combination with the authentication result and the service operation request.
In this embodiment, after the interactive authentication card obtains the personal password of the user, the method further includes performing password verification on the personal password, and if the password verification fails, prompting that the password is wrong.
Example 7
In embodiments 3 to 6, the operation of injecting the key in the pre-step S01 may be performed by a separate key injection software.
The embodiment of the utility model provides a before mobile device gets into the off-line state, preset the business action that mobile device allowed under different states to carry out through the system, follow-up in the off-line operation in-process, business operation only allows to carry out under the business state that presets to whether realized when different time quantums or scene whether allow to unblank the function of carrying out the independent control; before the mobile equipment enters an offline state, a state allowing unlocking operation to be executed is preset or a user controls unlocking permission, the user can control different mobile equipment only by using a certificate and a password of the user, different passwords do not need to be set for each equipment, a plurality of passwords do not need to be memorized, and the operation of the user is facilitated; the authentication card simultaneously realizes two functions of power supply and offline identity authentication, so that the problem of power supply of the lockset is solved, and meanwhile, the power supply action is changed into the unlocking action in the user experience, so that the operation convenience is improved; by combining two modes of user password and authentication card verification, binary authentication is realized, a verification link is added compared with the verification of a mechanical key or a password, and the safety is improved.
While the preferred embodiments of the present invention have been described, the present invention is not limited to the above embodiments, and those skilled in the art can make various equivalent modifications or substitutions without departing from the spirit of the present invention, and such equivalent modifications or substitutions are intended to be included within the scope of the present invention as defined by the appended claims.

Claims (6)

1. An intelligent lock control system, comprising: a mobile device and a client device, the client device comprising: handheld device and authentication card or interactive authentication card, mobile device includes: the check-up and control module of unblanking, first battery, communication module, first transmission interface and electric control lock, the authentication card includes: the second battery, the second transmission interface and the encryption and decryption module;
the first battery is respectively connected with the unlocking verification and control module and the communication module and supplies power;
the unlocking verification and control module and the electric control lock are respectively connected with the first transmission interface, the encryption and decryption module and the second battery are respectively connected with the second transmission interface, and the first transmission interface is connected with the second transmission interface;
the encryption and decryption module sends password verification data and an authentication result to the unlocking verification and control module;
the second battery respectively supplies power to the encryption and decryption module and the electric control lock;
the communication module is connected with the handheld device and used for receiving user personal password verification data and a service operation request sent by the handheld device;
the unlocking verification and control module is connected with the intelligent lock and used for sending a control signal to the electric control lock to execute business according to an authentication result.
2. The intelligent lock control system according to claim 1, wherein the communication module includes: the wireless communication module is connected with the handheld device, the first transmission interface is connected with the second transmission interface, and the first transmission interface is connected with the unlocking verification and control module and the electric control lock.
3. The intelligent lock control system according to claim 1, wherein the system certificate public key of the mobile device is generated and injected by a mobile device management server or key injection software.
4. The intelligent lock control system according to claim 3, wherein the mobile device management server includes a key management module and/or a service management module;
the key management module is used for injecting a system certificate public key into the mobile equipment;
the service management module is used for writing a service state into the mobile equipment, determining a service state allowing unlocking and/or a user ID with unlocking authority.
5. The intelligent lock control system according to claim 1, wherein the encryption/decryption module stores therein a personal identification certificate of an operator, a stored value of a personal password, and a corresponding private key.
6. The intelligent lock control system according to claim 5, wherein the content of the personal identification certificate of the operator includes: user ID, personal identity certificate public key, allowed business actions to be performed, and/or certificate validity period.
CN201921581928.8U 2019-09-20 2019-09-20 Intelligent lock control system Active CN210605841U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201921581928.8U CN210605841U (en) 2019-09-20 2019-09-20 Intelligent lock control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201921581928.8U CN210605841U (en) 2019-09-20 2019-09-20 Intelligent lock control system

Publications (1)

Publication Number Publication Date
CN210605841U true CN210605841U (en) 2020-05-22

Family

ID=70722080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201921581928.8U Active CN210605841U (en) 2019-09-20 2019-09-20 Intelligent lock control system

Country Status (1)

Country Link
CN (1) CN210605841U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110610569A (en) * 2019-09-20 2019-12-24 深圳中航信息科技产业股份有限公司 Intelligent lock system and control method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110610569A (en) * 2019-09-20 2019-12-24 深圳中航信息科技产业股份有限公司 Intelligent lock system and control method thereof

Similar Documents

Publication Publication Date Title
EP3726865A1 (en) Method for generating and using virtual key of vehicle, system for same, and user terminal
CN102936980B (en) Method and device for controlling electronic lock
US20100186075A1 (en) Method and system for accessing devices in a secure manner
CN105871874A (en) Mobile Internet virtual key authorizing system and hardware door lock control method thereof
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN104636777B (en) ID card information obtains system
CN104282061B (en) Unlocking method for safety intelligent lock system
CN107277033B (en) Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced
CN205121680U (en) Bluetooth lock system based on intelligent terminal
CN104303481A (en) Method and apparatus for remote portable wireless device authentication
CN113965328B (en) Authority transfer method and system for digital key offline condition of trusted execution environment
CN106127888A (en) Smart lock operational approach and smart lock operating system
CN109685946A (en) Open method, device, equipment and the storage medium of lockset
CN113674455A (en) Intelligent door lock remote control method, device, system, equipment and storage medium
CN210605841U (en) Intelligent lock control system
CN110610569A (en) Intelligent lock system and control method thereof
CN204480367U (en) A kind of electronic intelligent lock system based on wireless network to bidirectionally communication
KR20200091142A (en) Electric vehicle customer auto certification service support apparatus
CN104282059A (en) Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods
CN111275852A (en) Lock terminal management method, system, shared object and storage medium
US11597349B2 (en) Vehicle operation device, vehicle operation method, and non-transitory storage medium storing vehicle operation program
KR20140083132A (en) Tele-management system of construction machinery using smart key
CN110942537A (en) Intelligent door lock unlocking system, method, device and medium
CN106685931B (en) Smart card application management method and system, terminal and smart card
CN101465011B (en) Lock control system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 518000 workshop 301-2 and 302, building 1, Shenzhen Software Park, Central District, high tech Zone, Nanshan District, Shenzhen, Guangdong

Patentee after: Shenzhen AVIC Information Industry Group Co.,Ltd.

Address before: 518000 workshop 301-2 and 302, building 1, Shenzhen Software Park, Central District, high tech Zone, Nanshan District, Shenzhen, Guangdong

Patentee before: SHENZHEN CATIC INFORMATION TECHNOLOGY INDUSTRY Co.,Ltd.