KR20120045668A - Security reinforced door lock with external power connection or motion detection sensor - Google Patents

Security reinforced door lock with external power connection or motion detection sensor Download PDF

Info

Publication number
KR20120045668A
KR20120045668A KR1020100107347A KR20100107347A KR20120045668A KR 20120045668 A KR20120045668 A KR 20120045668A KR 1020100107347 A KR1020100107347 A KR 1020100107347A KR 20100107347 A KR20100107347 A KR 20100107347A KR 20120045668 A KR20120045668 A KR 20120045668A
Authority
KR
South Korea
Prior art keywords
door lock
user
password
message
input
Prior art date
Application number
KR1020100107347A
Other languages
Korean (ko)
Inventor
김민겸
Original Assignee
김민겸
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 김민겸 filed Critical 김민겸
Priority to KR1020100107347A priority Critical patent/KR20120045668A/en
Publication of KR20120045668A publication Critical patent/KR20120045668A/en

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B51/00Operating or controlling locks or other fastening devices by other non-mechanical means
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B53/00Operation or control of locks by mechanical transmissions, e.g. from a distance
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • E05B67/38Auxiliary or protective devices
    • EFIXED CONSTRUCTIONS
    • E06DOORS, WINDOWS, SHUTTERS, OR ROLLER BLINDS IN GENERAL; LADDERS
    • E06BFIXED OR MOVABLE CLOSURES FOR OPENINGS IN BUILDINGS, VEHICLES, FENCES OR LIKE ENCLOSURES IN GENERAL, e.g. DOORS, WINDOWS, BLINDS, GATES
    • E06B5/00Doors, windows, or like closures for special purposes; Border constructions therefor
    • E06B5/10Doors, windows, or like closures for special purposes; Border constructions therefor for protection against air-raid or other war-like action; for other protective purposes
    • E06B5/16Fireproof doors or similar closures; Adaptations of fixed constructions therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0094Mechanical aspects of remotely controlled locks
    • E05B2047/0095Mechanical aspects of locks controlled by telephone signals, e.g. by mobile phones

Abstract

PURPOSE: A security enhanced door-lock equipped with an external power connector and a motion sensor is provided to cost effectively increase security performance and to remain messages to an authorized user. CONSTITUTION: An authorized user is authenticated, and a public message is registered. The message displaying part(25) of a door-lock displays the messages. When the user opens the door-lock, the message displaying part of the door-lock displays a closed message. An external interface module(26) informs the transmittance of the closed message to a pre-determined user. The external interface module with/without wires is interlocked with an external input/output unit.

Description

Security-reinforced door lock with external power connection or motion detection sensor {.}

As the standard of living has improved, the need for security has increased, and the demand for digital door locks has increased due to the convenience of not having to carry a key.

The types of door locks currently used can be summarized as follows.

(A) Door lock with key and lock

(B) Door lock by password (password)

(C) Door lock by biometric technology such as fingerprint recognition

(D) Door lock by card recognition (mainly RF applied)

(E) Door lock by the combination application of said (A), (B), (C), (D)

The said (E) system is mainly comprised by the hybrid system including the said (B) system, and also including another system (namely, (A), (C), or (D) system).

The present invention supplements the contents of the patent application number "10-2006-0062232" application.

In addition to improving living standards, there is an increasing need for additional functions beyond simple security through door locks.

By inputting and outputting the desired message in the door lock, a person or company can publicize themselves and leave a desired message to an authorized user of the door lock (eg, a family member or co-worker).

By adding communication functions to digital door locks and combining them with popular mobile phones, it is possible to solve the user's demand for increased security at a very low cost and to check the access of user members.

In addition to improving living standards, there is an increasing need for additional functions beyond simple security through door locks.

By inputting and outputting the desired message in the door lock, a person or company can publicize themselves and leave a desired message to an authorized user of the door lock (eg, a family member or co-worker).

Figure 1a. Door lock block diagram including message input and output unit
Figure 1b. Door lock configuration example including message input and output
Figure 2a. Door lock block diagram including message input / output unit and external interface module
Figure 2b. Door lock configuration example including message input / output unit and external interface module
Figure 3. Door lock block diagram including message input / output unit and communication module

[For public use message ]

Although not necessarily described in the present invention, the basic functions of the existing door lock (eg, automatic locking after the door is closed) may be included. The door lock for the present invention additionally has a display device (eg, liquid crystal), and outputs a message input by the user (public PR message or a private message provided to an authorized user) to the display device. "Message" includes "text message (visual message)" and "voice message (audio message)".

In the case of digital door locks, most of them have a basic method of authenticating by a password (password). This is because it is inexpensive compared to the biometric method and does not have a key. In the case of a password method, since a numeric keypad is usually provided, it can be used as a keypad for text input. In the present invention, the door lock may be additionally configured not only a password method but also a biometric method such as an RF card method and a fingerprint.

FIG. 1A is a conceptual block diagram of a case in which a message input / output function is additionally provided in a door lock having a numeric keypad, and FIG. 1B is a configuration diagram in this case. In FIG. 1B, the Korean keypad for Hangul character input technology presented by the applicant has been presented, but it is obvious that any character input technology can be applied. In Fig. 1B, the case of simply displaying a "public PR message" is given. Generating a message based on the input value is performed inside the door lock. In FIG. 1A, the “sound output unit” outputs a warning sound or a guide sound, and may or may not be depending on the product. In addition, the "password input unit 13" and the "message input unit 14" may be made on the same keypad, but when implemented in software, the message input mode and the password input mode will be different. It is represented that there are branch inputs 13 and 14.

Also, due to the small size of the display device (eg liquid crystal), the message may not be displayed. To solve this, it is possible to make the message appear sliding. For example, if only one line is displayed, the message slides from right to left. Even if multiple lines are displayed, it is possible to make the entire message appear by sliding up and down.

In the past, when a general house was generalized, there was a nameplate, and in a hard age when only the number (apartment lake) remains as the residential environment is converted into an apartment, the message for the door lock disclosure of the present invention can be expected to provide softness. . You can put the phrase "This is a security company!"

[Private message ]

In some cases, it may not be just a public message that is open to everyone. For example, “My dear son, I am late today. Evening meals can't be made public so that everyone can see them. ” This is because the thieves advertise that the house is empty. It should only be visible to certain authorized users. Therefore, it should be stored as a "private message" and only authorized users can view the message.

A typical way of viewing a message would be to enter a user ID and a password that corresponds to that user ID. Recently, however, a door lock system has been introduced to designate a large number of passwords and to allow users to use their own passwords. In this case, since the specific password itself serves as an ID (identifier) for a specific person, when a specific password is input, a specific message designated to the user can be output.

There may be various methods of storing a private message, but an example is as follows. The user enters the administrator mode with his or her password, selects the user who will deliver the message from the user list, and writes the desired message after selecting the user. Similarly, the process of outputting a private message is possible by a procedure in which a user to receive the message is authorized (the corresponding password is input) and a process of outputting the message.

For example, the mother saves the private message (“Love Son, I'm late today. Dinner will be resolved…”) for the password (password) “1111” or “ㄱㄱㄱㄱ” that the son uses. After the procedure of saving as a message or storing as voice), when the son returns home and enters the promised password (“1111” or “ㄱㄱㄱㄱ”), the message is output in the promised manner (output in the display window of the door lock, text). To convert the voice to voice or output the stored voice) to process the private message. Preferably, after the message has been output, if the user takes some action (e.g., presses the "OK" button or the "Delete" button), the door lock opens or after a certain time (e.g. 3 seconds) after outputting the entire message. The door lock can also be opened.

In the keypad illustrated in Fig. 1A, “[1] button = [a] button”, and the scan code (the unique key value defined for each key) are the same. Therefore, regardless of whether the user is aware of or enters “1111” or “a ㄱㄱㄱ”, the door lock recognizes the same. Therefore, the password is expressed as “1111” or “ㄱㄱㄱㄱ”. This is the same as entering the Korean [ㅁ] key, entering the English [a] key or recognizing the same password when entering the password on the PC. [1] ~ [0] The numeric buttons are the same for all products, so in the following, the numeric values are mainly displayed as passwords.

[External Interface Module]

The present invention is not applicable only to a password-type door lock, and in the case of a door lock without a keypad as an input device, an interface module 23 connected to a separate built-in input device or an external input device (wired or wirelessly connected) Have). In addition, even if the door lock is provided with the input device 23, it is possible to input a desired message through an external input device (eg, mobile phone, PC) desired by the user.

2A is a block diagram when an external input device is used. When using an external input device without using an internal input device (eg, a keypad of a door lock) provided in the door lock itself, only the scan code value (a unique key value defined for each key) required for character generation in the external input device is used. A message can be generated from the door lock, and a message generated from an external input device can be received and displayed. The former is a case where a message for the input value is generated in the door lock as shown in Figure 1b, the latter is a message generated by the external input device to deliver the message generated to the door lock.

The interface 26 with the external input / output device 27 may be made through any means, including infrared communication, Bluetooth, wireless LAN (WiFi), wireless Internet (WiBro), wired internet, and landline. It can be achieved by the communication function (eg CDMA, GSM) and the short message transmission function of the mobile phone. 2B is a configuration diagram when an external input / output device 27 is applied to a mobile phone or a similar terminal having a communication function of the mobile phone. In FIG. 2B, an example of posting a public PR message of a company is given.

In the case of applying a non-short-range wireless communication means such as infrared communication or Bluetooth (e.g., CDMA or GSM), there is an advantage in that the door lock can be controlled (eg, message registration) at a remote location. In this case, the control program operating on the mobile phone in conjunction with the door lock will be implemented as a program on the wireless Internet platform of the mobile phone in reality.

[Notified User]

In addition, the door lock may be provided with a wired or wireless communication module 38. See Figure 3. Wired communication is typical telephone and wireless communication is typical mobile phone communication function. The difference between the wired or wireless interface modules 27 and 37 and the wired or wireless communication module 38 is as follows. The interface modules 27 and 37 are modules that allow control of the door lock through an external input / output device, and the communication module 38 may be viewed as a communication means with an external device. The wired and / or wireless interface module 37 in FIG. 3 may be provided as in FIG. 2A or may not be provided as in FIG. 1A. In the case where 37 as mobile communication is provided, realistically 38 as mobile communication will be configured with 37, but is conceptually shown separately. Likewise, if 37 is provided as wired communication (eg the Internet), it will be configured with 38 as wired communication in practice.

When the door lock is opened when the private message is first displayed, a message (text message or voice message) is sent to the mobile phone of the promised user (for example, the user who entered the private message or the entire administrator), indicating that the message has been read. It is possible. For example, it informs the promised user that "the message was output to his son (user of" 1111 "password) at xx hour xx minute xx seconds xx date xx xx 2006". If in all cases a text message is sent to or from a particular user (a son using the password “1111” or “ㄱㄱㄱㄱ” in the case), if the son opens and closes the door lock 10 within 10 minutes, 10 characters within 10 minutes. The message will be sent, because it causes a tremendous waste in operating costs and is very annoying for spammers as a user.

In the case of private messages, when a specified number of users are specified, each user first reads the message (that is, the doorlock outputs the message for the first user for the first time). Can be.

That is, in addition to the above-described procedure, a procedure for confirming whether a private message is first outputted to a user to be viewed, and notifying a promised user of the fact (message output fact) if the private message is output for the first time. It includes additional procedures.

In addition, in the door lock in which the external communication function 38 is added to the door lock, if the mobile phone number of the user as the subject of the private message is registered in the user database (stored in the memory 32 of the door lock), the user's mobile phone number is stored when the private message is stored. It is also possible to send the message to a mobile phone.

Furthermore, even if there is no private message, the promised user (e.g. highest) only when the first user opens the door lock in a certain time zone (e.g. 0 to 24 o'clock, 13 o'clock or 24 o'clock, or 06 o'clock to 12 o'clock). It is possible to notify the administrator (text message or voice message). A family example can help mothers who are going out to know when they are home.

[User Management]

The management of the user can be made similar to the existing user management (user management in a device such as a PC). A simple example in connection with the present invention is as follows. In this case, the specific user is not recognized by the ID and password, but the password itself has a specific user authentication function.

First, it is assumed that the user of the registered password basically has the super administrator function. Super administrators can create multiple passwords (i.e. users) and grant privileges (e.g. administrator or general user rights). Each user can enter his or her password and enter management mode to change his or her password or to enter a public or private message.

Here, whether or not a user designated as an administrator by the super administrator has the same authority as the super administrator (eg, creation of a password, that is, creation of a user, etc.) is a matter of operation policy and thus will not be discussed further. In addition, whether to subdivide the user class or to make a public message with general user authority is a detail problem in the operation policy, so it is not mentioned anymore.

First, when the super administrator enters the super administrator password and enters the management mode to query the list of registered users, the following contents stored in the memory of the door lock will be displayed. Of course, the process of entering the management mode may be performed by an input device of the door lock itself, or may be performed in conjunction with an external input device (eg, a mobile phone or a PC).

password Username authority (cellphone) 7777 or us Supervisor

If a user is added according to a predetermined procedure (e.g., pressing a menu button and selecting add password from a menu that is created), the user will be as follows. The following is an example of modifying super administrator information and adding users. The user name may be viewed as an alias registered to make it easy to identify who the user of a specific password is, and may register the user's name or position. In reality, the chief administrator will be the security officer of the organization (company or home) or a representative of a security guard company.

password Username authority (cellphone) 7777 or us Security officer Supervisor (010-7777-7777) 5555 or ㅁㅁㅁㅁ CEO manager (010-5555-5555) 3333 or ㄷ ㄷㄷㄷ Temple Normal

Conventionally, user-friendly interface implementation (eg user name input and display) would not be possible in a door lock without a display device (e.g. liquid crystal) and an input device. However, if liquid crystal is provided as in the present invention, the above management Interface configuration is possible. When performed by an external input / output device, the output of management details will also be displayed on the display device of the external input device (eg, the screen of a PC or the liquid crystal of a mobile phone), not the liquid crystal of the door lock. Of course, once the management details (e.g. the creation of a public message) are completed, the public message is displayed on the display device of the door lock, but the details of the management status should not be displayed on the display device of the door lock at the user and the remote site. In addition, a contact number such as a mobile phone is indicated in parentheses because it is not necessary when the communication module 38 is not added to the door lock itself.

When creating a public message (eg, pressing the menu button and selecting Create a Public PR Message), you can enter the public message creation screen and save the message after creating it. If you want to modify the information of a specific user, select the specific user and enter the “edit information” to perform the information modification. Likewise, when creating a private message, select a target user (one or more) (eg select a check box for each user) and enter the “Private Message” menu (eg press the Menu button and select Create Private Message). Just do it.

It is important to note that if a general user (eg son) using the password “1111” or “ㄱㄱㄱㄱ” enters administrative mode, the user's list should not be visible to others. That is, it is preferable that a user (password) list is displayed as in the following example. Whether or not to allow cell phone numbers to be viewed under normal user rights is also a matter of operational policy.

password Username authority (cellphone) **** Security officer Supervisor (010-7777-7777) **** CEO manager (010-5555-5555) 3333 or ㄷ ㄷㄷㄷ Temple Normal

In the case of a small company, the door lock opening log data may be used to manage employee time and attendance. Of course, this is possible by connecting a device such as a PC through an external interface module of the door lock and dumping the door lock opening log data.

In the example, the password is expressed as four digits for convenience, but security can be strengthened by specifying the minimum number of password digits according to the security policy.

[Emergency contact]

If a voice call function is added to the communication module 38 in the door lock, an unauthorized visitor (i.e., a visitor who has not been given a password) is allowed to make an emergency call (eg a phone call) to a promised user (e.g., a super administrator). can do. Of course, in this case, the mobile communication number assigned to the door lock and the phone number of the promised user (eg, super administrator) are not exposed. This means, for example, that the courier can cope with his / her absence without notifying the baggage recipient's mobile phone number in advance. In addition, the emergency contact phone number is registered as the security guard's phone number can be used in an emergency.

[Security anomaly notice]

When the communication module 38 is attached to the door lock, when a security abnormality sign (e.g., a password mismatch more than a certain number of times (e.g. 3 times)) occurs, the user (e.g., a supervisor or a security guard company) Notification service (text or voice) is available.

Expressed as a procedure, a procedure for counting password inconsistencies, a procedure for checking occurrences of inconsistencies more than a predetermined number of times for a predetermined time, and a procedure for notifying the fact by the means promised to the promised contact. If a certain number of times is specified as "one time," each time an incorrect password is entered, the registered user (eg, supervisor: home = mother, company = security officer) will be notified of the fact.

[Security anomaly notification and camera linkage]

Currently, remote access or remote monitoring services that allow users to monitor the situation of a remote site by accessing a camera installed at a remote place through a mobile phone or a smart phone are common. When detecting a security abnormality sign that the wrong password is input, it is a matter of course that the user who is notified by the text message to the user can access and monitor the door lock or a camera installed around the door lock through the remote monitoring service.

It may be convenient to use the "callback URL" which is currently generalized. According to the glossary, "a short message service (SMS) leaves an Internet URL, and when a mobile phone user presses the call button, they are automatically connected to the wireless Internet site at that address. It's easy to access, so you can use download service or internet information service. " That is, the callback URL checks the text message notifying the security abnormality and presses the [call] button of the mobile phone. Of course, since the predetermined URL has a remote access address of the camera, remote monitoring through the camera is possible.

The camera module may be included in the door lock itself, but the production cost of the product is increased. Since the remote access and remote monitoring function can be an additional function, it is possible to use a separate camera by a necessary user without having a camera embedded in the door lock itself. In other words, by designating and sending a callback URL for accessing the separate camera from a text message notifying a security abnormality sign in the door lock, the user presses the [call] button after confirming the text message, thereby remotely (eg, home or company). Will be able to monitor the situation. In this case, the surveillance camera may be installed completely separate from the door lock, and only the door lock has a callback URL for accessing the camera (of course, the callback URL may be set as a door lock management function), and a security anomaly symbol may be used. The callback URL can be provided to the user when sending a message. For example, a text message such as "Incorrect password X times. Press [Call] to access the camera" is sent to the user. The advantage is that by not providing a camera to users who do not need a camera, the product cost can be kept low, and the installation position of the camera can be freely installed.

Of course, as mentioned, the product may include a camera module in the door lock, a camera may be installed separately from the door lock, and the camera module may be installed in conjunction with the door lock. In the third case, only the interface module for connecting the camera to the door lock needs to be provided. The connection between the door lock and the camera may use a recently generalized USB interface, and a wireless interface module that may be connected wirelessly may be applied to simplify installation. (26) of FIG. 2A and (36) of FIG. 3, which are "wired or air interface modules", can be utilized as an interface module for camera connection. See Figure 4.

[Dual security, secondary password]

When a wired or wireless communication module 38 is added to the door lock, double security is possible by inputting a secondary password for the user. In the example, if the “boss” password (in this case the primary password) “5555” is exposed, the unauthorized user can open the door lock. However, according to the security policy (e.g., the super administrator sets the second password application), when entering “5555”, the secondary password is assigned to the registered president's mobile phone number “010-5555-5555”. A password or a random number generated by a door lock) may be transmitted as a text message, and a second password may be re-entered within a predetermined time (eg 30 seconds) to open the door lock.

In the application of a secondary password, the entry of the primary password serves to identify (not approve) the user, and this user identification can not only be achieved by entering the primary password, but also biometrics (eg fingerprint recognition). ), User identification may be performed by RF card recognition. The second password can be sent to the mobile phone registered with the user and the user can be entered to complete the double security. In the above example where only the primary password was applied, using the RF card as the user identification, the user database would be as follows.

RF card Username authority (cellphone) Card 1 Security officer Supervisor (010-7777-7777) Card2 CEO manager (010-5555-5555) Card3 Temple Normal

In summary, the process of recognizing a user (by inputting a primary password, biometric or RF card), transmitting a secondary password to a mobile phone of a registered user, and receiving and confirming the transmitted secondary password It is possible.

In this case, the person who attempts to break into the system will not be able to open the door lock simply by obtaining the available password (primary password), and the security of the user will be required because the user's mobile phone must also be the password.

However, having to enter a secondary password all the time can be inconvenient, and according to security policy, for example, if a particular user successfully authenticates with the secondary password for the first time for a period of time (eg a day), During the day, you can operate without asking for the secondary password. This security policy profile can also be specified by the super administrator.

To reorganize the above cases, the process of recognizing the user (by inputting the primary password, biometrics or RF card), checking whether the secondary password was authenticated within a predetermined period of time, and if so, opens the door lock. Otherwise, the second password may be transmitted to the user's mobile phone, and the second password may be input again and confirmed.

Another example would be to send a prompt (voice and / or text) to enter a secondary password and send the secondary password to the user's cell phone if there is no input within a certain time (eg 5 seconds). According to the security policy, if the secondary password sent to the user is valid for a certain period of time (for example, one day or one week), the secondary password already known to the user can be reused during that period. It is explained that it is possible to reduce the operating cost of the door lock (eg text message transmission cost) while applying the second password.

To reorganize the above cases, the process of recognizing the user (by inputting the primary password, biometric or RF card), the process of requesting the input of the secondary password, and the registration of the second password if there is no input of the secondary password within a certain time The second password may be transmitted to the user's mobile phone, and the second password may be input again and confirmed.

The above application of double security (secondary password) may be particularly applicable to the point where security is required. It can also be implemented for security purposes in the event of signs of a security breach or in the case of a company.

[Dual security, Callback  or To the callback server  2nd authentication]

Double security can also be cumbersome for the user to press the second password. Therefore, instead of inputting the secondary password indicated on the text message after checking the text message, the second authentication is made by pressing a [call] button, and the door lock can be opened. This can also be implemented via a callback URL. In this case, a text message saying "Please press the [Call] button to open the door through the second authentication" is sent to the user.

The callback server for secondary authentication will be referred to as "secondary authentication server" for convenience. The server sends a "open" order (command) to the door lock when the user confirms the text message and the callback is confirmed by pressing the [call] button within a predetermined time (eg 1 minute or 2 minutes). The door lock is opened.

To do this, the following process is required.

The door lock notifies the " secondary authentication server " that the user's callback will be within the predetermined time, and sends a message capable of callback to the secondary authentication server to the user's mobile phone. Of course, the door lock has a unique ID (e.g., a physical network ID, an IP address, or other identifier that uniquely identifies the door lock). Upon receiving the callback of the user, the secondary authentication server drops an open order to the corresponding door lock, and the door lock is opened. This is illustrated in Figure 5a.

One similar thing is as follows. Rather than transmitting a message from the door lock to the user's mobile phone, the door lock notifies the secondary authentication server to request the second authentication, and sends the message for the second authentication from the second authentication server to the mobile phone. When a callback enters the secondary authentication server from the user's mobile phone, the secondary authentication server places an order to open the door in the door lock. See Figure 5b.

The method by the secondary authentication server is complicated to the system as to operate the server for the secondary authentication, and there is a difficult problem of ensuring the reliability of the system.

A second authentication method by easier callback is possible as follows. As a communication module, if a mobile communication module (eg CDMA), a wired LAN or a Wi-Fi module is built in, the door lock itself has a mobile communication number (eg 010-xxxx-xxxx) or an Internet phone number (eg 070-xxxx-xxxx). Can be given. In this case, a message (voice or text message) requesting the second authentication is transmitted to the user's mobile phone that is the first authentication (eg password, RF card, fingerprint recognition, iris recognition, ...), and the user within a predetermined time. When the callback to the caller's number (eg 010-xxxx-xxxx or 070-xxxx-xxxx) of the text message (eg press the [call] button after checking the text message), the door lock system detects this and opens the door. . See Figure 6.

Considering the cost-effectiveness, the second authentication method using the second password seems to be realistic.

[External power and power operation to increase battery duration]

Wired / wireless communication module (eg CDMA, landline, WiBro, Wi-Fi, ...) provided in the door lock of the present invention can be added to one or a plurality of communication modules, of course. The most concern when adding a communication module to the door lock is a problem of battery consumption of the door lock due to the operation of the communication module. Since the development of rechargeable batteries (hereinafter referred to as "batteries" for convenience) to the extent that electric vehicles are commercialized, there is a possibility that it will be solved in a short time. However, at the current low cost level of technology, when a mobile communication (eg CDMA) module is installed as a communication module, even if a high capacity battery having twice the capacity of the mobile phone is installed in the door lock, it is twice the standby time of the mobile phone. You can guess the battery life. If the Wi-Fi module is installed as a communication module, a shorter battery life can be predicted. Therefore, an external power connection (eg, an external power connection using an AC-DC adapter, etc.) is required. The fatal disadvantage of this case is that the installation is cumbersome.

External Power Source-Wireless Charging Method

One of the technologies currently available is wireless charging technology, which was used in high-end electric shavers and notebook PCs. Wireless charging technology is said to be "magnetic induction method" and "magnetic resonance method". The magnetic resonance method is said to have a wider charging range (charging distance) than the electromagnetic induction method. Currently, the magnetic resonance method is mostly used. The disadvantage of wireless charging technology is that the current technology does not have a wide range of charging, and the power efficiency of charging against the supply is low. In addition, it has not yet been popularized in terms of price as it is used only for expensive high-end products.

External Power Source-POE Method

If the wireless charging technology is used, the ease of installation is solved, but there is a concern that the cost of the product may be increased. One method of using wired charging, but relatively simple to install, is POE (Power Over Ethernet), which is an existing technology. This is a communication module that is equipped with a wired LAN module, and the DC power supply for supplying the external power of the door lock to two of the four strands except the four strands used for data among the eight strands of the LAN cable (UTP cable). It is used for supply. In other words, if only a LAN line is connected, power can be supplied together through two of the eight strands of the LAN line. This is provided with a wired LAN module as a communication module in the door lock, and supplies power together with a wired LAN cable (UTP cable) connected to the wired LAN module. To supply power to the door lock using the POE method, a LAN cable is connected to the door lock via a POE hub (or a router or a hub that supports the POE method). That is, the door lock supporting the POE method and the POE hub are used in pairs. The POE hub is usually provided with at least one LAN port for plugging in a LAN line. If a port supporting POE is provided in only one LAN port among the plurality of LAN ports, the door lock is transferred to the LAN line from the POE support port. Just plug it in. As explained, POE hub is an Internet hub that can supply the DC voltage of the promised voltage to the promised 2 wires among the 8 wires of the LAN line.

The advantage of the above method is that by using a low-cost wired LAN module (ie wired LAN card for wired internet) as a communication module and providing only one additional POE hub, there is no need to replace the battery periodically (even in existing digital door locks). The battery had to be replaced). For example, in apartments and homes, wired internet is most often introduced into the living room. Since there are almost no obstacles from the living room to the front door, it is easy to wire the LAN (UTP line). Do not. FIG. 7A is a case of wiring to the ceiling, and FIG. 7B is a case of wiring to the floor. The horizontal distance "L" from the power outlet to the door lock shown in FIGS. 7a and 7b may vary according to the environment of each home or office. When the power adapter is connected, the length of the power line can not be arbitrarily cut and adjusted. In this case, the length of the lan line can be freely adjusted to fit.

In case of connecting power from outside through POE method or AC-DC adapter, it is desirable to have a rechargeable battery in the door lock in case of power failure. Fortunately, the current state of power in Korea has almost no power outage, and even if the power outage is restored in a very short time, it will be enough to have a small capacity rechargeable battery in the door lock.

External Power-Large Capacity Battery for External Power

Power supply by the POE method is stable, but as the LAN line must be physically connected to the door lock, there can be installation trouble. While complementing the shortcomings of physically connecting the wires, the following shows a realistic way to reduce the cost burden when the wireless charging method is applied.

First, a small capacity battery (rechargeable battery, which is referred to as a "battery" for convenience) is built in the door lock to start the door lock for a predetermined time (eg, 10 hours, 20 hours, ..). In order to operate the communication module at all times, an external power source must be connected as described, and a large capacity external battery is provided to supply direct current (DC) current. This high capacity battery acts like an AC-DC adapter.

If you connect the AC-DC adapter, which acts as an external power source from the notebook PC, you can see that the adapter's DC power is used to charge the built-in battery while also supplying the power required to operate the notebook PC. We also know that when the adapter is unplugged, the notebook PC recognizes that the external power supply is cut off and is powered by the built-in battery. When the power of a large capacity battery that acts as an external power source (hereinafter referred to as "large capacity battery") is exhausted, the door lock is recognized as a cut-off of the external power and a sound (voice / sound) or a message (to the administrator on the mobile phone text message or door lock Indicate to charge the large capacity battery that is operated by the external power source.

The user removes the external large capacity battery that needs to be charged from the door lock, places it on the charging cradle, and charges the battery. The small capacity battery built in the door lock performs its function during charging (eg, 2 hours). When the charged large capacity battery is connected to the door lock again, the large capacity battery acts like an AC-DC adapter, thereby charging the small capacity battery inside the door lock and supplying power for operating the door lock. Connecting / disconnecting the door lock and the external large capacity battery may apply an interface similar to that of a conventional jack connecting a AC-DC adapter and a device (eg, a notebook PC, a door lock, etc.).

The circuit configuration described above is similar to the existing AC-DC adapter operation method and will not be described in detail. However, when the power of a large capacity battery acting as an external power source instead of an AC-DC adapter is consumed and falls below a certain level, the door lock should detect that the external power supply is cut off. This is an electronic device that operates only with an external power source. If a voltage below a certain level is connected, it detects that the external power source is not connected. Therefore, the existing technology can be processed. For example, connecting a 1 volt adapter to a device that requires 10 volts will not work.

Of course, the connection (eg large capacity battery connection, LAN connection of the POE method), as well as the inside of the door (that is described as an example of the apartment, not in the corridor side of the house, but of course the home). For the connection of the large capacity battery may be equipped with a cradle (such as a basket or pocket) that can be fixed to the large capacity battery of the door lock which is located inside the house. See Figure 8.

The above method has been sold separately a large capacity battery that can be connected to the external power source instead of the AC-DC adapter to extend the use time of the notebook PC, and has already been proven. In other words, if only a jack for connecting an external AC-DC adapter is provided and only the external large capacity battery is additionally provided. The advantage of the above-described method is that there is no hassle of installing a physical wire to the door lock, and only a large capacity battery and a charging cradle of the large capacity battery need to be provided. However, there is still the inconvenience of periodically recharging the large capacity battery and mounting it back to the door lock.

The POE method and the external power battery method may coexist in one door lock, and thus, both interfaces may be provided in the door lock. In this case, according to the user's choice, it is possible to connect the LAN line using the POE method, or to connect a large capacity battery for external power supply. The DC power supplied by POE and the DC power supplied by the large capacity battery for external power will operate normally even if the user supplies power in two ways at the same time.

Liquid crystal by motion sensor ( LCD Operation control

One of the characteristic features of the present invention is to add a liquid crystal (LCD) to the door lock so that it can display a message to PR itself (with or without a built-in communication module), or by password authentication or RF card authentication, etc. When a person opened the door, there was a message to the person.

Liquid crystals emit light on their own, which consumes more battery capacity than other components. We know that power consumption is much higher when the LCD is kept on even in notebook PCs and smartphones. Therefore, the motion detection sensor is added to the door lock, and only when it is detected that someone approaches (eg, within 1 m) from the outside of the door, the liquid crystal is activated and the PR message can be displayed. Motion sensor is expected to consume much less power than liquid crystal. In the reality that life patterns are becoming personalized, since there is not much time for someone to stay at the door of a home (eg an apartment), the liquid crystal operation by such a motion sensor will be meaningful.

A simpler method than the motion sensor is to detect the user touching the door lock (eg keypad key contact, opening the door in the case of a door lock with a slide cover, etc.), the door lock starts to operate, and the liquid crystal also starts to operate. It is. The motion sensor has an advantage that the liquid crystal can start to operate when someone approaches a certain distance (eg 2m) from the door lock, the contact sensor is only consumed when someone (including the user) touches the door lock power consumption Although it can be minimized, there is a disadvantage in that the user does not touch the door lock but does not show the message of the liquid crystal.

When the motion sensor module or the contact sensor module is mounted and the camera (including the recording function) is embedded in the door lock itself or interlocked with the camera through an external interface module, there is another advantage that can be applied. Cameras and expensive recording equipment are very expensive and costly to install. Recently, however, many low-cost products that have a built-in memory and have a recording function have been released. When recording using the camera's own built-in memory, the memory is so small that only a short period of time (eg a few days) of recording is possible. However, when motion or contact is detected in conjunction with a motion sensor or a touch sensor, the signal is received from the control unit of the door lock, and a recording start order is issued to a camera linked to the built-in camera or an external interface module, thereby preventing any movement. Alternatively, the recording is not performed in the absence of a contact, and only when a motion or a contact is detected, thereby recording the long-term situation with less memory. Also, when you check the recording later, it is not recorded when there is no motion or contact, so you can easily search only meaningful scenes. Even if the recording is started when the motion or contact is detected, it is natural that the recording is stopped to stop the recording if the motion or contact is not detected for a predetermined time (eg 1 minute). This can be easily implemented by driving the timer from the time when the last operation or contact is detected.

9 is a representation of the addition of a motion sensor module or a touch sensor module.

[ Wi-Fi  Function or Wi-Fi bridge  Addition of function

Hereinafter, "Wi-Fi", "Wireless LAN", "Wi-Fi Wireless LAN," and the like are all used as terms of the same meaning. However, the same may be applied to existing wireless services (e.g., CDMA wireless communication, WiBro, ..) or other wireless services that will emerge in the future.

Today, operators are competitively deploying their Wi-Fi networks for load balancing of mobile networks. One example is the introduction of Wi-Fi-style home Internet phones, while the company's wireless routers (or Wi-Fi APs) are being deployed in the home. The AP allows other Wi-Fi users to use wireless Wi-Fi.

The dissemination of AP through home internet telephones has a disadvantage in that signals are weakly caught outside the home. By adding a Wi-Fi AP function to the door lock of the present invention, a road to smoothly provide Wi-Fi to users outside the home is opened. If you connect a wired LAN (wired internet) to a door lock using a POE hub, etc., and the door lock performs its own function of the Wi-Fi AP, you can use Wi-Fi at a longer distance outside the house through the door lock (ie Wi-Fi AP). have.

If Wi-Fi wireless LAN function is added as a communication module to the door lock and the door lock is connected to the AP installed in the home (or office), the door lock has a Wi-Fi bridge function, so the wireless LAN can be smoothly outside the home. Can be provided. Wireless signals from APs installed in homes weaken rapidly after passing through the main front door (usually a thick iron door). However, a wireless LAN antenna (internal or external) is added to the part exposed outside the door of the digital door lock (e.g., the numeric keypad is mounted for password input), and the door lock itself performs an AP function so that the home (or office) ) Wi-Fi signal can be delivered farther away. Recently, many wireless routers (APs) in which antennas are not exposed to the outside have been released. Therefore, it is better to apply the antenna built-in in terms of the design of the door lock.

The Wi-Fi bridge function connects two APs wirelessly. The wired internet line is connected only to the first AP, and the remaining second APs are not connected to the wired Internet, and are wirelessly bridged between the two APs. The second AP that is not connected to the wired internet works in the same way as the first AP that is connected to the wired internet, thereby extending the reach of Wi-Fi radio waves without making a wired connection. This function is also included in a commercially available universal router (AP).

For example, the wired Internet is connected to the first AP installed in the living room, and the door lock, which is the second AP, has the effect of extending the distance of the AP from the living room to the outside of the front door without being connected to the wired Internet. . Taking the case of an apartment in connection with the present invention as follows. In the state where the present invention is not applied, the Wi-Fi signal may be weakly detected in the hallway near the room 101 in which the AP is installed in the house. However, if you move away from room 101 and go to room 108, which does not have an AP installed in your house, you won't be able to catch the Wi-Fi signal. However, if the door lock proposed in the present invention is installed in the room 101 and the door lock AP function (wired Internet direct connection or WiFi bridge method) is provided, the Wi-Fi WLAN can be used smoothly in the entire hallway of the apartment. will be. For convenience, the apartment is taken as an example, but it is obvious that the same can be applied to an office environment.

The view from the outside of the house or office is as shown in Figure 10 *. Figure 10b shows when the camera or camera module is installed together. When the wired LAN is connected to the door lock as shown in FIG. 7 *, since the door lock itself has an AP function, the outdoor side portion of the door lock of FIG. 10 * serves as an AP. Even in the case of being bridged wirelessly (for example, Wi-Fi) in the form similar to that of FIG. 8, the door lock exposed to the outdoor side serves as an AP in FIG. Do. Electrically / circuitly connecting the indoor and outdoor sides of the door lock enables electrical / circuit connection between the inside of the door lock and the outside of the door lock through the perforated part of the door for installation of the door lock, as in the existing door lock. Do.

The service provider (e.g., telecommunications company) provides the Wi-Fi wireless LAN service to its other subscribers by using the customer's resources (front door, digital door lock, electricity) while providing the door lock service of the present invention to its customers. There is an advantage to this.

By adding communication functions to digital door locks and combining them with popular mobile phones, it is possible to solve the user's demand for increased security at a very low cost and to check the access of user members.

** Brief description of the main parts of the drawing **
10, 20, 30: door lock
11, 21, 31: control unit to control the overall function of the door lock
12, 22, 32: memory unit for storing various procedures and data for performing the function of the door lock
13, 23, 33: input unit accepting input for user authentication
14, 24, 34: input unit for entering messages and various data
15, 25, 35: message output unit for outputting text messages
26, 36: external interface module connected to the external input and output device by wire or wireless
27, 37: external input and output device connected to the door lock by wire or wireless
38: Communication module that can communicate with external device by wired or wireless connection

Claims (22)

In the door lock,
A door lock further comprising a display device for message output
The method of claim 1,
A door lock further comprising a keypad device for inputting a message
The method according to claim 1 or 2,
Door lock, characterized in that it further has an interface module (wired or wireless) interlocked with the external input and output device
The method according to claim 1 or 2,
Door lock, characterized in that it further has a communication module with the outside
The method according to claim 1 or 2,
A door lock, characterized in that the user is authenticated as an authorized user, the user registers a message for publication, and a message for publication is registered, and the message is displayed on the display device of the door lock.
The method according to claim 1 or 2,
The private message is registered by authenticating whether the user is an authorized user and registering a private message for a specific user. Door lock, characterized in that the private message is output
The method of claim 6,
Door lock, characterized in that notified to the promised user (eg registrant) that the private message has been delivered
The method of claim 6,
When registering the private message, the door lock characterized in that for transmitting the private message to the registered mobile phone of the user who is the target of viewing the private message
In the door lock provided with a communication module,
Door locks characterized in that the specific user notices the promised user to open the door lock for the first time
In the door lock provided with a communication module,
Identify the user through the input of the primary password, the input of biometric information or the input of the RF card,
Send the secondary password to the registered user's mobile phone,
Enter the secondary password within a predetermined time,
Door lock characterized in that it is determined whether the door lock is opened by checking the input second password
In the door lock provided with a communication module,
Identify the user through the input of the primary password, the input of biometric information or the input of the RF card,
If the secondary password is input within a predetermined time and the secondary password is not input, the secondary password is transmitted to the registered user's mobile phone.
Re-enter the second password within a predetermined time
Door lock characterized in that it is determined whether the door lock is opened by checking the input second password
In the door lock security method provided with a communication module,
(a) user identification (by checking primary password input, biometric information input or RF card input);
(b) transmitting a secondary password to a mobile phone of a registered user;
(b) receiving a second password within a predetermined time;
(c) determining whether a door lock is opened by examining the input second password;
Door lock security method characterized in that consisting of
In the door lock security method provided with a communication module,
(a) user identification (by checking primary password input, biometric information input or RF card input);
(b) receiving a second password within a predetermined time;
(c) proceeding to (e) if the secondary password is input within the predetermined time, and if not, transmitting the secondary password to the mobile phone of the registered user;
(d) waiting for input of the secondary password again within a predetermined time;
(e) determining whether a door lock is opened by examining the input second password;
Door lock security method characterized in that consisting of
In the door lock provided with a communication module,
A door lock, characterized by counting password mismatches, checking for occurrences of mismatches more than a predetermined number of times, and notifying the user of the facts (mismatch facts) by the means promised.
In the door lock security method provided with a communication module,
Door lock security method comprising the steps of counting password inconsistency, checking for inconsistency more than a predetermined number of times, and notifying the fact (inconsistency occurrence) to the promised user by the means promised.
The method of claim 14,
The door lock includes a camera module or is connected to an external camera by an interface means of the door lock,
The promise notification means is a text message of the mobile phone, the text message includes a callback URL for accessing the camera,
Remote access to the camera via the callback URL
Door lock characterized in that
16. The method of claim 15,
The door lock includes a camera module or is connected to an external camera by an interface means of the door lock,
The promise notification means is a text message of the mobile phone, the text message includes a callback URL for accessing the camera,
Door lock security method comprising the step of remote access to the camera through the callback URL included in the text message
Article 18
The method according to any one of claims 1 to 17,
The door lock is additionally provided with a motion sensor module or a contact sensor module,
When an operation or a touch is detected by the motion detection sensor module or the contact detection sensor module, the liquid crystal provided in the door lock operates.
Door lock characterized in that
The method of claim 18,
A camera module including a recording function or a camera module through an external interface is additionally provided.
The camera module is controlled to start recording when motion or contact is detected in the motion sensor module or the contact sensor module.
Door lock characterized in that
The method according to any one of claims 1 to 17,
The wired internet module provided in the door lock is configured by POE (Power Over Ethernet) method
Door lock characterized in that
The method according to any one of claims 1 to 17,
Wireless charging module is further provided in the door lock
Door lock characterized in that
The method according to any one of claims 1 to 17,
The door lock is further provided with a wireless AP function
Door lock characterized in that
KR1020100107347A 2010-10-29 2010-10-29 Security reinforced door lock with external power connection or motion detection sensor KR20120045668A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020100107347A KR20120045668A (en) 2010-10-29 2010-10-29 Security reinforced door lock with external power connection or motion detection sensor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020100107347A KR20120045668A (en) 2010-10-29 2010-10-29 Security reinforced door lock with external power connection or motion detection sensor

Related Child Applications (1)

Application Number Title Priority Date Filing Date
KR1020170014148A Division KR20170015955A (en) 2017-01-31 2017-01-31 A digital doorlock which performs additional authentication by user's callback

Publications (1)

Publication Number Publication Date
KR20120045668A true KR20120045668A (en) 2012-05-09

Family

ID=46265093

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020100107347A KR20120045668A (en) 2010-10-29 2010-10-29 Security reinforced door lock with external power connection or motion detection sensor

Country Status (1)

Country Link
KR (1) KR20120045668A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101490583B1 (en) * 2013-03-06 2015-02-05 주식회사 스마트시스템즈 Smart digital door lock system with a black-box functionality
KR101517832B1 (en) * 2014-07-09 2015-05-06 (주)에스엔아이 smart door rock using magvetic resonance wireless charge method
KR101674053B1 (en) 2016-06-27 2016-11-08 주식회사 에버정보기술 Apparatus and method for security entrance
KR20170047797A (en) * 2015-10-23 2017-05-08 엘지전자 주식회사 Door lock device and method of operating thereof
KR20180063585A (en) 2016-12-02 2018-06-12 국민대학교산학협력단 Smart door lock device and control method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101490583B1 (en) * 2013-03-06 2015-02-05 주식회사 스마트시스템즈 Smart digital door lock system with a black-box functionality
KR101517832B1 (en) * 2014-07-09 2015-05-06 (주)에스엔아이 smart door rock using magvetic resonance wireless charge method
KR20170047797A (en) * 2015-10-23 2017-05-08 엘지전자 주식회사 Door lock device and method of operating thereof
KR101674053B1 (en) 2016-06-27 2016-11-08 주식회사 에버정보기술 Apparatus and method for security entrance
KR20180063585A (en) 2016-12-02 2018-06-12 국민대학교산학협력단 Smart door lock device and control method

Similar Documents

Publication Publication Date Title
US9437063B2 (en) Methods and systems for multi-unit real estate management
CN103280009B (en) A kind of Multifunctional access device
US8138886B1 (en) Communication enabled active lock system
CN205670315U (en) Fingerprint lock and fingerprint lock system
US20040057567A1 (en) Entrance intercom system
CN204480357U (en) A kind of visible building talkback door lock system with safety certification
CN101770659A (en) Remote messaging and security system
US20130169815A1 (en) Equipment enclosures with remote logging, authorization and monitoring
KR100576797B1 (en) Digital door-lock system for home-automation
CN205354152U (en) Intelligent gate inhibition system
KR20120045668A (en) Security reinforced door lock with external power connection or motion detection sensor
JP2008067310A (en) Security system for multiple dwelling building
CN104891283B (en) Elevator control system combined with card password
KR20180109781A (en) A digital doorlock which performs WiFi Access Point
US20210258721A1 (en) System and method for remote intercommunication at points of entry into buildings or limited areas and for remote management and control of the entrances
CN108625723B (en) Method and system for controlling a physical object to be shared by several potential users
KR20170015955A (en) A digital doorlock which performs additional authentication by user's callback
CN105678869A (en) Entrance guard intelligent controller, entrance guard intelligent control system and entrance guard opening method thereof
CN211294016U (en) Wireless access control system of intelligent community
CN209659462U (en) A kind of recognition of face cloud intercom system based on artificial intelligence and Internet of Things
TW201331885A (en) Method for intelligent door access and community service
CN206922934U (en) A kind of cloud talkback door lock system based on SIP
JP6125184B2 (en) Facility management system and facility management method
CN213365596U (en) Building intercom host
CN205788384U (en) The access control equipment of a kind of long-range control and access control system thereof

Legal Events

Date Code Title Description
E902 Notification of reason for refusal
E601 Decision to refuse application