WO2019109964A1 - Verrou électronique et procédé, dispositif et système de commande associés - Google Patents

Verrou électronique et procédé, dispositif et système de commande associés Download PDF

Info

Publication number
WO2019109964A1
WO2019109964A1 PCT/CN2018/119438 CN2018119438W WO2019109964A1 WO 2019109964 A1 WO2019109964 A1 WO 2019109964A1 CN 2018119438 W CN2018119438 W CN 2018119438W WO 2019109964 A1 WO2019109964 A1 WO 2019109964A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic lock
instruction
lock
electronic
unlocking
Prior art date
Application number
PCT/CN2018/119438
Other languages
English (en)
Chinese (zh)
Inventor
吕彦朋
陈彬
张东胜
Original Assignee
云丁网络技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201711273738.5A external-priority patent/CN108049721B/zh
Priority claimed from CN201721677044.3U external-priority patent/CN207503302U/zh
Application filed by 云丁网络技术(北京)有限公司 filed Critical 云丁网络技术(北京)有限公司
Publication of WO2019109964A1 publication Critical patent/WO2019109964A1/fr

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B51/00Operating or controlling locks or other fastening devices by other non-mechanical means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit

Definitions

  • the present application relates to the field of electronic lock technology, and more particularly to an electronic lock and a control method, device and system thereof.
  • the use of electronic locks still has certain defects.
  • the user can only operate the electronic lock itself to control the electronic lock, for example, by controlling the electronic lock by operating the keyboard of the electronic lock.
  • the industry's research on electronic locks is mostly smarter, the unlocking time is shorter, the temporary password is issued in a more convenient direction, but little attention is paid to how to make the temporary password issued by the administrator of the electronic lock more Quick and effective management, then, after issuing under the temporary password, if you do not want the temporary password owner to unlock for a period of time, only the temporary password in the electronic lock is deleted.
  • An electronic lock control method includes:
  • the electronic unlocking function of the electronic lock is turned off, so that the electronic lock enters an anti-lock state.
  • the above method preferably, further includes:
  • the instruction for releasing the unlocking is an instruction sent by the predetermined user
  • the electronic unlocking function of the electronic lock is restored, so that the electronic lock is unlocked.
  • the above method preferably, further includes:
  • the monitoring whether the electronic lock is opened indoors comprises:
  • the monitoring whether the electronic lock is opened indoors comprises:
  • the above method preferably, further includes:
  • the comparison result indicates that the stored key includes the key carried in the unlocking instruction, determining, according to the correspondence between the preset key and the identification identifier, the key corresponding to the key carried in the unlocking instruction Identifying whether the identifier is a predetermined identification identifier;
  • the electronic unlocking function of the electronic lock is restored to release the electronic lock from the unlocked state, and the electronic lock is controlled to be opened.
  • An electronic lock control device includes:
  • a first acquiring module configured to acquire an encrypted anti-locking instruction sent by the mobile communication terminal
  • control module configured to: decrypt the encrypted anti-lock instruction; determine whether the decrypted anti-lock instruction is an instruction sent by a predetermined user; and when the judgment result is that the anti-lock instruction is an instruction sent by a predetermined user, close the electronic lock
  • the electronic unlocking function causes the electronic lock to enter an anti-lock state.
  • the first obtaining module is further configured to: acquire an encrypted unlocking instruction sent by the mobile communication terminal;
  • the control module is further configured to: decrypt the encrypted unlocked instruction; determine whether the decrypted unlocked instruction is an instruction sent by a predetermined user; and when the determination result is that the unlocking instruction is sent to a predetermined user In the instruction, the electronic unlocking function of the electronic lock is restored, so that the electronic lock is unlocked.
  • the above device preferably, further comprises:
  • a monitoring module configured to monitor whether the electronic lock is opened indoors
  • the control module is further configured to: when the monitoring module detects that the electronic lock is opened indoors, restore an electronic unlocking function of the electronic lock, so that the electronic lock is unlocked.
  • An electronic lock control system includes:
  • a communication module configured to receive an encrypted anti-lock command sent by the mobile communication terminal
  • a processor configured to decrypt the encrypted anti-lock instruction; determine whether the decrypted anti-lock instruction is an instruction sent by a predetermined user; and when the judgment result is that the anti-lock instruction is an instruction sent by a predetermined user, close the electronic lock
  • the electronic unlocking function causes the electronic lock to enter an anti-lock state.
  • the communication module is further configured to receive an encrypted unlocking instruction sent by the mobile communication terminal;
  • the processor is further configured to: decrypt the encrypted unlocked instruction; determine whether the decrypted unlocked instruction is an instruction sent by a predetermined user; and when the determined result is that the unlocked command is sent to a predetermined user In the instruction, the electronic unlocking function of the electronic lock is restored, so that the electronic lock is unlocked.
  • the above system preferably, further comprises:
  • a sensing module configured to collect sensing information, where the sensing information is used to indicate whether the electronic lock is opened indoors
  • the processor is further configured to: determine, according to the sensing information, whether the electronic lock is opened indoors, and when it is determined that the electronic lock is opened indoors, restore an electronic unlocking function of the electronic lock, so that The electronic lock is unlocked.
  • the sensing module is disposed in the electronic lock
  • the mounting position of the sensing module is associated with a handle holder on an indoor side of the electronic lock
  • the sensing information collected by the sensing module changes.
  • the sensing module comprises:
  • a first sensing component configured to generate sensing information
  • a second sensing component configured to collect sensing information generated by the first sensing component
  • One of the first sensing component and the second sensing component is disposed on the handle holder, and another sensing component is disposed in the first preset area around the handle holder to ensure the When the first preset action occurs in the handle holder, the sensing information collected by the second sensing component changes.
  • the first sensing component is an infrared emitting sensor
  • the second sensing component is an infrared receiving sensor
  • the first inductive component is a magnet and the second inductive component is a reed switch.
  • the sensing module comprises:
  • a button is disposed in the second preset area around the handle holder to ensure that the sensing information collected by the button changes when the first preset action occurs in the handle holder.
  • the sensing module comprises:
  • a first sub-sensing module configured to collect first sensing information, where a mounting position of the first sub-sensing module is associated with a locking tongue of the electronic lock, or associated with a door body on which the electronic lock is mounted The first sensing information changes when the locking tongue is retracted into the electronic lock, or when the door body is opened;
  • a second sub-sensing module is configured to collect second sensing information, where a mounting position of the second sub-sensing module is associated with a mechanical unlocking mechanism of the electronic lock, and when the mechanical unlocking mechanism generates a second preset action The second sensing information changes.
  • the communication module comprises a Bluetooth module or an internet access module.
  • the processor is further configured to: obtain an unlocking instruction, compare the key carried in the unlocking instruction with the stored key; and include, when the comparison result represents the stored key, And determining, according to the correspondence between the preset key and the identification identifier, whether the identification identifier corresponding to the key carried in the unlocking instruction is a predetermined identification identifier; if the determination result is Yes, the electronic unlocking function of the electronic lock is restored to release the electronic lock from the unlocked state, and the electronic lock is controlled to be opened.
  • An electronic lock comprising an electronic lock control system as described above.
  • a storage medium comprising a stored program, wherein a device in which the storage medium is located is controlled to execute an electronic lock control method as described above while the program is running.
  • a computer program product when the computer program product is run on a terminal device, causes the terminal device to perform an electronic lock control method as described above.
  • an electronic lock and a control method, device and system thereof provided by the present application send an encrypted anti-locking instruction to an electronic lock through a mobile communication terminal, and the electronic lock decrypts the encrypted anti-locking instruction after receiving the encrypted anti-locking instruction. Only when the unlocked instruction obtained by the decryption is a control command sent by a predetermined user (such as an administrator), the electronic lock is controlled to enter an anti-lock state, so that the electronic lock cannot be opened by an electronic unlocking method such as a password, and the administrator simply moves through the application.
  • a predetermined user such as an administrator
  • the management of the electronic key can be quickly and effectively performed without deleting the electronic key or operating the electronic lock itself, simplifying the user operation and improving the convenience of the electronic lock.
  • the anti-lock command sent by the mobile communication terminal to the electronic lock is an encrypted anti-lock command, thereby improving the security of the electronic lock.
  • FIG. 1 is a flowchart of an implementation of an electronic lock control method provided by an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of an electronic lock control device provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram showing another structure of an electronic lock control device provided by an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of an electronic lock control system provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram showing another structure of an electronic lock control system provided by an embodiment of the present application.
  • FIG. 6 is a schematic diagram showing a mounting position of a first inductive component and a second inductive component provided by an embodiment of the present application;
  • FIG. 7 is a schematic view showing another mounting position of the first sensing component and the second sensing component provided by the embodiment of the present application.
  • FIG. 8 is a schematic view showing still another mounting position of the first sensing component and the second sensing component provided by the embodiment of the present application.
  • FIG. 1 is a flowchart of an implementation of an electronic lock control method according to an embodiment of the present disclosure.
  • Step S11 Acquire an encrypted anti-locking instruction sent by the mobile communication terminal.
  • the mobile communication terminal can be a commonly used portable communication device such as a mobile phone or a tablet.
  • An application may be pre-installed in the mobile terminal, and the mobile terminal user may trigger an anti-lock command by the application, and the application encrypts the anti-lock command and sends the anti-lock command to the electronic lock.
  • an application matching the above application of the mobile terminal is installed in the electronic lock so that the two communicate based on the application.
  • the encrypted unlocking instruction may be sent by the mobile communication terminal to the electronic lock through the Bluetooth module or the Internet access module.
  • the electronic lock and the mobile communication terminal can communicate via Bluetooth.
  • the electronic lock and the mobile communication terminal communicate via the Internet.
  • the mobile communication terminal can upload the encrypted instruction (including the encrypted anti-lock instruction or the encrypted unlock instruction, etc.) to the server corresponding to the application through the Internet, and the server forwards the encrypted instruction to the Internet through the Internet.
  • the encrypted instruction including the encrypted anti-lock instruction or the encrypted unlock instruction, etc.
  • Step S12 Decrypt the encrypted unlock command.
  • Step S13 determining whether the decrypted instruction obtained by the decryption is an instruction sent by the predetermined user; if the determination result is yes, executing step S14; otherwise, not responding to the anti-locking instruction, that is, not locking the electronic lock.
  • the identification identifier carried in the anti-lock instruction obtained by the decryption which is used to represent the identity of the user, it is determined whether the decrypted instruction obtained by the decryption is an instruction sent by the predetermined user. Specifically, it can be determined whether the identification identifier used to represent the identity of the user carried in the decrypted anti-lock instruction is a predetermined identification identifier, and if it is a predetermined identification identifier, the decryption instruction obtained by the decryption is an instruction sent by the predetermined user; otherwise, The anti-lock instruction obtained by the decryption is not an instruction sent by the predetermined user.
  • the predetermined identification identifier may be registered in advance by the above-mentioned application by the predetermined user (for example, an administrator of the electronic lock).
  • Step S14 Turn off the electronic unlocking function of the electronic lock to make the electronic lock enter the anti-lock state.
  • the electronic unlocking manner of the electronic lock may include, but is not limited to, any one of the following modes: Bluetooth unlocking, fingerprint unlocking, password unlocking, RF card unlocking, and the like.
  • Bluetooth unlocking refers to receiving an unlock command through Bluetooth, and when the unlock command is a valid command, unlocking is performed in response to the unlock command.
  • the unlock command can be transmitted by the mobile communication terminal.
  • Fingerprint unlocking refers to collecting the fingerprint input by the user through the input panel of the electronic lock. When the collected fingerprint is a valid fingerprint, unlocking is performed.
  • Password unlocking refers to collecting the password input by the user through the input panel of the electronic lock. When the collected password is a valid password, unlocking is performed.
  • the radio frequency card unlocking refers to reading the radio frequency card information by the radio frequency card reading module of the electronic lock, and unlocking when the read information is valid information.
  • the electronic lock can only be opened from the indoor, or can be opened outdoors by a preset mechanical unlocking method, wherein the preset mechanical unlocking manner can include but is not limited to the following enumeration Any of several types: unlocked by a mechanical key, or unlocked by a mechanical code dial.
  • the electronic lock control method provided by the embodiment of the present application sends an encrypted anti-locking instruction to the electronic lock through the mobile communication terminal, and after receiving the encrypted anti-locking instruction, the electronic lock decrypts the unlocked instruction, and the unlocked instruction obtained by the decryption is a predetermined user (eg, When the control command is sent by the administrator, the electronic lock is controlled to enter the anti-lock state, so that the electronic lock cannot be opened by an electronic unlocking method such as a password.
  • the administrator can disable the electronic device by sending an anti-lock command to the electronic lock through the mobile communication terminal.
  • the key enables quick and efficient management of the electronic key, simplifies the operation of the administrator and improves the convenience of the electronic lock.
  • the anti-lock command sent by the mobile communication terminal to the electronic lock is an encrypted anti-lock command, thereby improving the security of the electronic lock.
  • information indicating that the electronic lock is in the anti-lock state may also be synchronized to the mobile communication terminal.
  • the key information in the unlocking command may be compared with the stored key information. If the stored key information includes the key information in the unlocking instruction, and the key information in the unlocking instruction is within the expiration date, the state information of whether the electronic lock is locked is obtained, and if the electronic lock is in the unlocked state, the unlocking is prohibited. Operation, if the electronic lock is not in the anti-lock state, perform the unlock operation. If the stored key information does not include the key information in the unlocking instruction, or if the stored key information includes the key information in the unlocking instruction, but is not within the validity period, it is not necessary to acquire whether the electronic lock is locked. The status information may directly return the prompt information with invalid password. In addition, the alarm information may be sent to the mobile communication terminal based on the preset identification identifier to prompt the preset user (such as the administrator) that the electronic lock is illegal. operating.
  • the unlocking instruction may be an unlocking instruction sent by the mobile communication terminal via Bluetooth or the Internet, or an unlocking instruction triggered by the electronic lock receiving the fingerprint or password input by the user through the input panel of the electronic lock, or is an electronic The lock triggers the generated unlock command and the like after reading the information in the RF card.
  • the electronic lock control method may further include:
  • the temporary key may be generated by using the application software, and the validity period of the temporary key is set.
  • the temporary key may be a password randomly generated by the application software, or may be a fingerprint collected by a fingerprint collection module of the mobile communication terminal, or may be a radio frequency card information read by a radio frequency card reading module of the mobile communication terminal. .
  • the temporary key and expiration date are then encrypted and sent to the electronic lock storage via Bluetooth or the Internet.
  • Decrypting the encrypted instruction for saving the temporary key determining whether the instruction for saving the temporary key is sent by the predetermined user based on the identification identifier carried in the instruction for saving the temporary key obtained by the decryption, and if the determination result is yes, storing the above The temporary key carried in the instruction to save the temporary key, and the expiration date of the temporary key. If the result of the determination is no, the expiration date of the temporary key and the temporary key described above is not stored.
  • the storage time of the temporary key reaches the expiration date, it indicates that the temporary key is invalid, and the invalid temporary key may also be deleted.
  • the key information in the unlocking instruction may be compared with the stored key information, if the stored key information includes the key in the unlocking instruction. The information acquires the status information of whether the electronic lock is locked. If the electronic lock is in the unlocked state, the unlocking operation is prohibited. If the electronic lock is not in the locked state, the unlocking operation is performed. If the stored key information does not include the key information in the unlocking instruction, it is not necessary to obtain the state information of whether the electronic lock is locked, and the unlocking operation can be directly prohibited. That is to say, in the embodiment of the present application, the stored key information is valid key information.
  • the electronic lock control method may further include:
  • the above encrypted unlocked instruction is decrypted.
  • the instruction for releasing the unlocking is an instruction sent by the predetermined user
  • the electronic unlocking function of the electronic lock is restored, so that the electronic lock is unlocked.
  • the electronic lock When the electronic lock is unlocked, the electronic lock is in a normal locked state, that is, when the user inputs the key, if the key is correct and within the validity period, the electronic lock is opened, and if the key is incorrect or not valid, the electronic opening is prohibited. lock.
  • the electronic lock is controlled by the mobile communication terminal to release the anti-lock state.
  • the electronic lock control method may further include:
  • the electronic lock is triggered to cancel the anti-lock state by the indoor door opening operation.
  • information indicating that the electronic lock is unlocked may also be synchronized to the mobile communication terminal.
  • an implementation for monitoring whether the electronic lock is opened indoors may be:
  • the electronic lock usually includes two handle holders, one of which is connected to the handle of the room, and the other of which is connected to the handle of the outside.
  • the handle of the room is pressed down, and the pressing of the indoor handle drives the handle holder of the room to rotate.
  • the rotation of the handle seat drives the locking tongue. Retracted into the interior of the electronic lock, so that the electronic lock is opened and the door can be opened.
  • the handle seat will return to the original state, and the lock tongue will extend the electronic lock, and the door body will be locked. Therefore, when it is detected that the handle holder on the indoor side of the electronic lock rotates and meets the preset condition, the user opens the door indoors. That is to say, the first preset action is: the rotation of the handle on the indoor side that meets the preset condition occurs.
  • the operation of the handle is to press down.
  • the handle is operated by pushing or pulling.
  • the action of the handle will drive the handle of the indoor side to rotate or translate, through the electronic lock.
  • the transmission, the rotation or translation of the handle will drive the lock tongue back into the electronic lock, so that the electronic lock is opened and the door can be opened.
  • the handle is restored to its original position, and the handle seat will return to its original state, causing the lock tongue to extend the electronic lock, and the door body will be locked.
  • the first preset action is: the rotation or translation of the handle on the indoor side that meets the preset condition occurs.
  • the first preset action may be: the movement of the handle on the indoor side that meets the preset condition occurs. Whether the movement of the handle seat satisfies the preset condition can be determined by whether the change of the information sensed by the sensing module set at the specific position satisfies the preset condition.
  • one implementation of monitoring whether the electronic lock is opened indoors may be:
  • the electronic lock can only be opened outdoors by a preset mechanical unlocking method when the electronic lock is in the anti-lock state, or can only be opened indoors, when it is judged that the electronic lock is not by the preset mechanical unlocking mode When turned on, it can be determined that the electronic lock is opened indoors.
  • an implementation for monitoring whether the electronic lock is opened indoors may be:
  • the electronic lock control method provided by the present application may further include:
  • the unlocking instruction may be an unlocking instruction sent by the mobile communication terminal received by the communication module (eg, the Bluetooth module or the Internet access module), and the unlocking instruction is triggered by the user after inputting the key in the mobile communication terminal.
  • the unlock command is an unlock command generated by triggering a fingerprint input by the user through an input panel of the electronic lock.
  • the unlock command is an unlock command generated by the user inputting the password through the input panel of the electronic lock.
  • the unlock command is an unlock command generated by the RF card reading module of the electronic lock after reading the information of the RF card.
  • the comparison result indicates that the stored key includes the key carried in the unlocking instruction
  • determining whether the identification identifier corresponding to the key carried in the unlocking instruction is based on the correspondence between the preset key and the identification identifier The predetermined identification number.
  • the above identification identifier is used to characterize the user.
  • the predetermined identification identifier may be an identification identifier of the administrator.
  • the correspondence between the key and the identification identifier is stored in advance, wherein the key corresponding to the identification identifier of the administrator is different from the key corresponding to the identification identifier of the non-administrator.
  • the electronic lock is triggered to cancel the anti-lock state by an electronic unlocking operation of the administrator.
  • FIG. 2 is a schematic structural diagram of an electronic lock control apparatus according to an embodiment of the present disclosure, which may include:
  • the first obtaining module 21 is configured to obtain an encrypted anti-locking instruction sent by the mobile communication terminal.
  • the mobile communication terminal can be a commonly used portable communication device such as a mobile phone or a tablet.
  • An application may be pre-installed in the mobile terminal, and the mobile terminal user may trigger an anti-lock command by the application, and the application encrypts the anti-lock command and sends the anti-lock command to the electronic lock.
  • an application matching the above application of the mobile terminal is installed in the electronic lock so that the two communicate based on the application.
  • the encrypted unlocking instruction may be sent by the mobile communication terminal to the electronic lock via Bluetooth or the Internet.
  • the electronic lock and the mobile communication terminal can communicate via Bluetooth.
  • the electronic lock and the mobile communication terminal communicate via the Internet.
  • the mobile communication terminal can upload the encrypted instruction (including the encrypted anti-lock instruction or the encrypted unlock instruction, etc.) to the server corresponding to the application through the Internet, and the server forwards the encrypted instruction to the Internet through the Internet.
  • the encrypted instruction including the encrypted anti-lock instruction or the encrypted unlock instruction, etc.
  • the control module 22 is configured to decrypt the encrypted unlock command; determine whether the decrypted unlock command is an instruction sent by a predetermined user; and when the judgment result is that the lock command is an instruction sent by a predetermined user, the electronic lock function of the electronic lock is turned off. In order to make the electronic lock enter the anti-lock state.
  • the control module 22 can determine, according to the identification identifier carried in the decryption instruction obtained by the decryption, the identifier used to represent the identity of the user, and determine whether the decrypted instruction obtained by the decryption is an instruction sent by the predetermined user. Specifically, the control module 22 may determine whether the identification identifier used to represent the identity of the user carried in the decrypted anti-lock command is a predetermined identification identifier, and if it is a predetermined identification identifier, the decryption instruction obtained by the decryption is an instruction sent by the predetermined user. Otherwise, it indicates that the decrypted instruction obtained by the decryption is not an instruction sent by the predetermined user.
  • the predetermined identification identifier may be registered in advance by the above-mentioned application by the predetermined user (for example, an administrator of the electronic lock).
  • the electronic unlocking mode of the electronic lock may include, but is not limited to, any one of the following enumerated modes: Bluetooth unlocking, fingerprint unlocking, password unlocking, RF card unlocking, and the like.
  • the electronic lock can only be opened from the indoor, or can be opened outdoors by a preset mechanical unlocking method, wherein the preset mechanical unlocking manner can include but is not limited to the following enumeration Any of several types: unlocked by a mechanical key, or unlocked by a mechanical code dial.
  • the electronic lock control device sends an encrypted anti-locking instruction to the electronic lock through the mobile communication terminal, and the electronic lock receives the encrypted anti-locking instruction and decrypts it, and only the decrypted instruction obtained by the decryption is a predetermined user (such as management)
  • the electronic lock is controlled to enter the anti-lock state, so that the electronic lock cannot be opened by an electronic unlocking method such as a password.
  • the administrator can disable the electronic key by sending an anti-lock command to the electronic lock through the mobile communication terminal. It realizes fast and effective management of the electronic key, simplifies the operation of the administrator, and improves the convenience of the electronic lock.
  • the anti-lock command sent by the mobile communication terminal to the electronic lock is an encrypted anti-lock command, thereby improving the security of the electronic lock.
  • the electronic lock control device may further include:
  • the synchronization module is configured to synchronize information indicating that the electronic lock is in an unlocked state to the mobile communication terminal after the electronic lock enters the anti-lock state.
  • the control module 22 may perform the key information in the unlock command and the stored key information. If the stored key information includes the key information in the unlocking instruction, and the key information in the unlocking instruction is within the expiration date, the state information of whether the electronic lock is locked is obtained, and if the electronic lock is in the locked state, It is forbidden to perform the unlock operation. If the electronic lock is not in the anti-lock state, the unlock operation is performed. If the stored key information does not include the key information in the unlocking instruction, or if the stored key information includes the key information in the unlocking instruction, but is not within the validity period, it is not necessary to acquire whether the electronic lock is locked. The status information may directly return the prompt information with invalid password. In addition, the alarm information may be sent to the mobile communication terminal based on the preset identification identifier to prompt the preset user (such as the administrator) that the electronic lock is illegal. operating.
  • the unlocking instruction may be an unlocking instruction sent by the mobile communication terminal via Bluetooth or the Internet, or an unlocking instruction triggered by receiving a fingerprint or a password input by the user through an input panel of the electronic lock, or reading the RF
  • the generated unlock command and the like are triggered after the information in the card.
  • the first obtaining module 21 may further acquire an instruction for saving the temporary key sent by the mobile communication terminal, where the instruction for saving the temporary key is encrypted by the application software, and the temporary key is saved.
  • the instruction In addition to carrying the temporary key, the instruction carries the identification identifier and the expiration date of the temporary key.
  • the temporary key may be generated by using the application software, and the validity period of the temporary key is set.
  • the temporary key may be a password randomly generated by the application software, or may be a fingerprint collected by a fingerprint collection module of the mobile communication terminal, or may be a radio frequency card information read by a radio frequency card reading module of the mobile communication terminal. .
  • the temporary key is then encrypted and sent to the electronic lock store via Bluetooth or the Internet.
  • the control module 22 is further configured to: decrypt the encrypted instruction for saving the temporary key, and determine, according to the identification identifier carried in the instruction for saving the temporary key obtained by the decryption, whether the instruction for saving the temporary key is sent by the predetermined user, if If the result of the determination is YES, the temporary key carried in the instruction for saving the temporary key and the expiration date of the temporary key are stored. If the result of the determination is no, the expiration date of the temporary key and the temporary key described above is not stored.
  • the control module 22 may also delete the invalid temporary key. Based on this, if the electronic lock receives the unlocking instruction carrying the key information, the control module 22 may compare the key information in the unlocking instruction with the stored key information, if the stored key information includes the unlocking instruction. The key information obtains the status information of whether the electronic lock is locked. If the electronic lock is in the unlocked state, the unlocking operation is prohibited. If the electronic lock is not in the unlocked state, the unlocking operation is performed. If the stored key information does not include the key information in the unlocking instruction, it is not necessary to obtain the state information of whether the electronic lock is locked, and the unlocking operation can be directly prohibited.
  • the stored key information is valid key information.
  • the first obtaining module 21 is further configured to obtain an encrypted unlocking instruction sent by the mobile communication terminal.
  • the control module 22 is further configured to: decrypt the encrypted unlocked instruction; determine whether the decrypted unlocked instruction is an instruction sent by a predetermined user; and when the determining result is that the unlocking instruction is sent to a predetermined user In the instruction, the electronic unlocking function of the electronic lock is turned on, so that the electronic lock is unlocked.
  • the electronic lock When the electronic lock is unlocked, the electronic lock is in a normal locked state, that is, when the user inputs the key, if the key is correct and within the validity period, the electronic lock is opened, and if the key is incorrect or not valid, the electronic opening is prohibited. lock.
  • the electronic lock is controlled by the mobile communication terminal to release the anti-lock state.
  • FIG. 3 is another schematic structural diagram of an electronic lock control device according to an embodiment of the present disclosure.
  • the method may further include:
  • a monitoring module 31 configured to monitor whether the electronic lock is opened indoors
  • the control module 22 can also be used to restore the electronic unlocking function of the electronic lock when the monitoring module 31 detects that the electronic lock is opened indoors, so that the electronic lock is unlocked.
  • the electronic lock is triggered to cancel the anti-lock state by the indoor door opening operation.
  • the synchronization module may be further configured to: after the electronic lock is unlocked, synchronize information indicating that the electronic lock is unlocked to the mobile communication terminal.
  • the monitoring module 31 can include:
  • a first monitoring unit configured to monitor whether a first preset action occurs in the handle seat on the indoor side of the electronic lock
  • the first determining unit is configured to determine that the electronic lock is opened indoors when the first monitoring unit detects that the first preset action occurs in the handle holder.
  • the monitoring module 31 can include:
  • the second monitoring unit is configured to monitor whether the locking bolt of the electronic lock is retracted into the electronic lock.
  • the third monitoring unit is configured to monitor whether the electronic lock is opened by a preset mechanical unlocking manner.
  • the determining unit is configured to: when the second monitoring unit detects that the locking tongue of the electronic lock is retracted into the electronic lock, determine whether the third monitoring unit detects that the electronic lock is opened by a preset mechanical unlocking manner.
  • a second determining unit configured to: when the third monitoring unit detects that the electronic lock is opened by a preset mechanical unlocking manner, determining that the electronic lock is opened outdoors; when the third monitoring unit does not detect the electronic lock by a preset mechanical unlocking When the mode is turned on, it is determined that the electronic lock is opened indoors.
  • the monitoring module 31 can include:
  • a second monitoring unit configured to monitor whether the door body on which the electronic lock is installed is opened
  • a third monitoring unit configured to monitor whether the electronic lock is opened by a preset mechanical unlocking manner
  • a judging unit configured to: when the second monitoring unit detects that the door body is open, determine whether the third monitoring unit detects that the electronic lock is opened by a preset mechanical unlocking manner;
  • a second determining unit configured to: when the third monitoring unit detects that the electronic lock is opened by a preset mechanical unlocking manner, determining that the electronic lock is opened outdoors; when the third monitoring unit does not detect the electronic lock by a preset mechanical unlocking When the mode is turned on, it is determined that the electronic lock is opened indoors.
  • the electronic lock control apparatus provided by the present application may further include:
  • a second acquiring module configured to acquire an unlocking instruction, where the unlocking instruction carries a key
  • the comparison module is configured to compare the key carried in the unlocking instruction with the stored key
  • the judging module is configured to determine, according to the correspondence between the preset key and the identification identifier, the identifier corresponding to the key carried in the unlocking instruction, when the key stored in the unlocking instruction is included in the key stored by the comparison result Whether the identification is a predetermined identification identifier;
  • the control module is further configured to: if the judgment result of the determining module is yes, restore the electronic unlocking function of the electronic lock, so that the electronic lock is unlocked and the electronic lock is controlled to be opened; if the judgment result of the determining module is negative, the unlocking is prohibited. It is also prohibited to restore the electronic unlock function of the electronic lock.
  • FIG. 4 is a schematic structural diagram of an electronic lock control system according to an embodiment of the present disclosure, which may include:
  • the communication module 41 is configured to receive an encrypted control command sent by the mobile communication terminal.
  • the control instruction may be: an anti-lock instruction, an unlock command, an unlock command or a lock command, and the like.
  • the mobile communication terminal can be a commonly used portable communication device such as a mobile phone or a tablet.
  • An application may be pre-installed in the mobile terminal, and the mobile terminal user may trigger a generation control instruction by the application, and the application program encrypts the control instruction and sends the control command to the electronic lock.
  • an application matching the above application of the mobile terminal is installed in the electronic lock so that the two communicate based on the application.
  • the communication module 41 can be a Bluetooth module or an internet access module.
  • the electronic lock and the mobile communication terminal can communicate via Bluetooth.
  • the electronic lock and the mobile communication terminal communicate via the Internet.
  • the mobile communication terminal can upload the encrypted control command to the server corresponding to the application through the Internet, and the server forwards the encrypted control command to the electronic lock via the Internet.
  • the processor 42 is configured to decrypt the encrypted control command, and control the electronic lock in response to the decrypted control command.
  • the communication module 41 is configured to receive an encrypted anti-lock command sent by the mobile communication terminal; correspondingly,
  • the processor 42 is configured to decrypt the encrypted unlock command; determine whether the decrypted unlock command is an instruction sent by a predetermined user; and when the judgment result is an instruction sent by the predetermined user, the electronic lock function of the electronic lock is turned off. In order to make the electronic lock enter the anti-lock state.
  • the processor 42 may determine, according to the identification identifier carried in the decryption instruction obtained by the decryption, the identifier used to represent the identity of the user, and determine whether the decrypted instruction obtained by the decryption is an instruction sent by the predetermined user. Specifically, the processor 42 may determine whether the identification identifier used to represent the identity of the user carried in the decrypted anti-lock command is a predetermined identification identifier, and if it is a predetermined identification identifier, the unlocking instruction obtained by the decryption is an instruction sent by the predetermined user. Otherwise, it indicates that the decrypted instruction obtained by the decryption is not an instruction sent by the predetermined user.
  • the predetermined identification identifier may be registered in advance by the above-mentioned application by the predetermined user (for example, an administrator of the electronic lock).
  • the electronic unlocking mode of the electronic lock may include, but is not limited to, any one of the following enumerated modes: Bluetooth unlocking, fingerprint unlocking, password unlocking, RF card unlocking, and the like.
  • the electronic lock can only be opened from the indoor, or can be opened outdoors by a preset mechanical unlocking method, wherein the preset mechanical unlocking manner can include but is not limited to the following enumeration Any of several types: unlocked by a mechanical key, or unlocked by a mechanical code dial.
  • the electronic lock control system provided by the present application can receive the encrypted control command sent by the mobile communication terminal through the communication module, the processor can decrypt the encrypted control command, and control the electronic lock in response to the decrypted control command. Thereby, the control of the electronic lock by the mobile communication terminal is realized, and a new way of controlling the electronic lock is provided, and the convenience of using the electronic lock is improved.
  • the encrypted communication anti-lock command is sent to the electronic lock through the mobile communication terminal, and the electronic lock receives the encrypted anti-lock command and decrypts it, and only controls the control command sent by the predetermined user (such as an administrator) when the decrypted anti-lock command is a control command sent by a predetermined user (such as an administrator)
  • the electronic lock enters the anti-lock state, so that the electronic lock cannot be opened by an electronic unlocking method such as a password.
  • the administrator can disable the electronic key by sending an anti-lock command to the electronic lock through the mobile communication terminal, thereby realizing a fast and effective electronic key. Management simplifies the operation of the administrator and improves the convenience of the electronic lock.
  • the anti-lock command sent by the mobile communication terminal to the electronic lock is an encrypted anti-lock command, thereby improving the security of the electronic lock.
  • the processor 42 may perform the key information in the unlock command and the stored key information. If the stored key information includes the key information in the unlocking instruction, and the key information in the unlocking instruction is within the expiration date, the state information of whether the electronic lock is locked is obtained, and if the electronic lock is in the locked state, It is forbidden to perform the unlock operation. If the electronic lock is not in the anti-lock state, the unlock operation is performed. If the stored key information does not include the key information in the unlocking instruction, or if the stored key information includes the key information in the unlocking instruction, but is not within the validity period, it is not necessary to acquire whether the electronic lock is locked. The status information may directly return the prompt information with invalid password. In addition, the alarm information may be sent to the mobile communication terminal based on the preset identification identifier to prompt the preset user (such as the administrator) that the electronic lock is illegal. operating.
  • the unlocking instruction may be an unlocking instruction sent by the mobile communication terminal via Bluetooth or the Internet, or an unlocking instruction triggered by the electronic lock receiving the fingerprint or password input by the user through the input panel of the electronic lock, or an electronic lock. After the information in the read RF card, etc., the generated unlock command is triggered.
  • the communication module 41 may further acquire an instruction for saving the temporary key sent by the mobile communication terminal, where the instruction for saving the temporary key is encrypted by the application software, and the temporary key is saved.
  • the command In addition to carrying the temporary key, the command carries the identification identifier and the expiration date of the temporary key.
  • the temporary key may be generated by using the application software, and the validity period of the temporary key is set.
  • the temporary key may be a password randomly generated by the application software, or may be a fingerprint collected by a fingerprint collection module of the mobile communication terminal, or may be a radio frequency card information read by a radio frequency card reading module of the mobile communication terminal. .
  • the temporary key is then encrypted and sent to the electronic lock store via Bluetooth or the Internet.
  • the processor 42 is further configured to: decrypt the encrypted instruction for saving the temporary key, and determine, according to the identification identifier carried in the instruction for saving the temporary key obtained by the decryption, whether the instruction for saving the temporary key is sent by the predetermined user, if If the result of the determination is YES, the temporary key carried in the instruction for saving the temporary key and the expiration date of the temporary key are stored. If the result of the determination is no, the expiration date of the temporary key and the temporary key described above is not stored.
  • the processor 42 may also delete the invalid temporary key. Based on this, if the electronic lock receives the unlocking instruction carrying the key information, the processor 42 may compare the key information in the unlocking instruction with the stored key information, if the stored key information includes the unlocking instruction. The key information obtains the status information of whether the electronic lock is locked. If the electronic lock is in the unlocked state, the unlocking operation is prohibited. If the electronic lock is not in the unlocked state, the unlocking operation is performed. If the stored key information does not include the key information in the unlocking instruction, it is not necessary to obtain the state information of whether the electronic lock is locked, and the unlocking operation can be directly prohibited. That is to say, in the embodiment of the present application, the stored key information is valid key information.
  • the communication module 41 is further configured to receive an encrypted unlocking command sent by the mobile communication terminal;
  • the processor 42 is further configured to: decrypt the encrypted unlocked instruction; determine whether the decrypted unlocked instruction is an instruction sent by the predetermined user; and when the determined result is that the unlocked instruction is an instruction sent by the predetermined user, Restore the electronic unlock function of the electronic lock to unlock the electronic lock.
  • the electronic lock When the electronic lock is unlocked, the electronic lock is in a normal locked state, that is, when the user inputs the key, if the key is correct and within the validity period, the electronic lock is opened, and if the key is incorrect or not valid, the electronic opening is prohibited. lock.
  • the electronic lock is controlled by the mobile communication terminal to release the anti-lock state.
  • the electronic lock control system provided by the present application may further include an induction module. Based on the embodiment shown in FIG. 4, another structure of the electronic lock control system provided by the embodiment of the present application is provided. The schematic diagram is shown in FIG. 5, and may further include:
  • the sensing module 51 is configured to collect sensing information, and the sensing information is used to indicate whether the electronic lock is opened indoors.
  • the sensing information collected by the sensing module 51 can be changed based on the change of the switching state of the electronic lock, that is, the sensing information collected by the sensing module 51 when the electronic lock is opened, and the sensing module 51 collects when the electronic lock is closed.
  • the sensing information is different.
  • the sensing module 51 can be mounted in the electronic lock, or mounted outside the electronic lock, or partially mounted in the electronic lock, and partially mounted outside the electronic lock. The specific installation location can be selected according to actual needs.
  • the processor 42 is further configured to control the electronic lock based on the sensing information collected by the sensing module 51.
  • the processor 42 may determine, according to the sensing information collected by the sensing module 51, whether the electronic lock is opened indoors, and when it is determined that the electronic lock is opened indoors, restore the electronic unlocking function of the electronic lock to enable the electronic lock Unlocked.
  • the processor 42 can determine whether the electronic lock is opened indoors according to the change of the sensing information collected by the sensing module.
  • the electronic lock is triggered to cancel the anti-lock state by the indoor door opening operation.
  • the electronic lock control system provided in this embodiment adds a sensing module, so that the processor 42 can control the electronic lock according to the sensing information, and provides a method for automatically controlling the electronic lock, thereby further improving the convenience of the electronic lock. .
  • the processor 42 is further configured to: after the electronic lock is unlocked, synchronize information indicating that the electronic lock is unlocked to the mobile communication terminal by using the communication module.
  • the sensing module 51 can be disposed in the electronic lock; specifically,
  • the mounting position of the sensing module 51 is associated with the handle holder on the indoor side of the electronic lock.
  • the sensing information collected by the sensing module 51 changes. That is to say, the change of the sensing information collected by the sensing module 51 can represent the action of the handle seat located on the indoor side of the electronic lock, and the action of the handle is caused by the action of the indoor handle, therefore,
  • the sensing information collected by the sensing module 51 can characterize whether the electronic lock is opened from the room.
  • the processor 42 determines whether the electronic lock is turned on indoors based on the sensing information
  • the processor 42 can be used to monitor the change of the sensing information collected by the sensing module 51, and the sensing information collected by the sensing module 51.
  • the change condition satisfies the preset condition, it is determined that the electronic lock is opened indoors.
  • the sensing module 51 can include:
  • a first sensing component configured to generate sensing information
  • a second sensing component configured to collect sensing information generated by the first sensing component
  • One of the first sensing component and the second sensing component is disposed on the handle holder on the indoor side, and the other sensing component is disposed in the first preset area around the handle holder to ensure indoor When the first preset action of the handle on one side occurs, the sensing information collected by the second sensing component changes.
  • the first sensing component may be an infrared emitting sensor for emitting infrared rays
  • the second sensing component is an infrared receiving sensor for receiving infrared rays emitted by the infrared emitting sensor.
  • the intensity of the infrared ray received by the second sensing component is different from the intensity of the infrared ray received by the second sensing component when the electronic lock is closed, so that when the electronic lock is opened, the second sensing component outputs a signal.
  • the strength, when the electronic lock is closed, the intensity of the signal output by the second inductive component is different.
  • the processor 42 can determine whether the electronic lock is open according to the intensity change of the signal output by the second sensing component. Specifically, the processor 42 can monitor the amount of change in the signal strength output by the second inductive component. When the amount of change in the signal strength output by the second inductive component is greater than a preset threshold, the electronic lock is determined to be turned on. Otherwise, the determination is performed. The electronic lock is not open.
  • the first sensing component may be a magnet for generating a magnetic field
  • the second sensing component is a reed switch for changing the switching state of the magnetic field under the action of the magnetic field. When the magnetic field is described, the switch state is restored.
  • some reeds are reed switches of normally open mode. When a magnet is close, the reed switch will be closed. When the magnet is far away, the reed switch will return to the normally open mode; otherwise, the reeds are normally closed. For the reed switch, the reed switch will open when there is a magnet close to it, and the reed switch will return to the normally closed mode when the magnet is far away.
  • the switch state of the reed switch is different from that of the reed switch when the electronic lock is closed.
  • the sensing information of the reed switch output is the amount of switching, which is used to characterize the switching state of the reed switch.
  • the state of the reed switch has changed, and the output of the switch has changed, indicating that the switch state of the electronic lock has changed.
  • the processor 42 can determine whether the electronic lock is opened according to a preset correspondence between the reed switch state and the electronic lock switch state.
  • the electronic lock can be opened when the reed switch is opened, and the electronic lock is closed when the reed switch is closed.
  • the electronic lock is closed when the reed switch is opened, and the electronic lock is opened when the reed switch is closed.
  • the sensing module 51 can include:
  • the button is disposed in the second preset area around the handle holder on the indoor side to ensure that the sensing information collected by the button changes when the first preset action occurs in the handle holder.
  • the sensing information collected by the button is status information of the button, and the status information is used to indicate whether the button is pressed.
  • the processor 42 can determine whether the electronic lock is opened according to the correspondence between the preset button state information and the state of the electronic lock switch.
  • the electronic lock can be opened when the button is pressed in advance, and the electronic lock is turned off when the button is not pressed.
  • the electronic lock can be turned off when the button is pressed in advance, and the electronic lock is turned on when the button is not pressed.
  • the sensing module 51 can include:
  • the first sub-sensing module is configured to collect the first sensing information, the installation position of the first sub-sensing module is associated with the locking tongue of the electronic lock, or is associated with the door body on which the electronic lock is installed; when the locking tongue is retracted The first sensing information changes within the electronic lock or when the door is opened;
  • the second sub-sensing module is configured to collect the second sensing information, and the installation position of the second sub-sensing module is associated with a preset mechanical unlocking mechanism of the electronic lock, and when the preset mechanical unlocking mechanism generates a second preset When the action is performed, the second sensing information changes.
  • the preset mechanical unlocking mechanism may be a keyhole; if the electronic lock is unlocked by the mechanical code dial, the preset mechanical unlocking mechanism may be a mechanical code dial.
  • the processor 42 determines, based on the sensing information, whether the electronic lock is opened indoors, the processor 42 may specifically be used,
  • the processor 42 monitors the change of the first sensing information and the change of the second sensing information; when the change of the first sensing information satisfies the first preset condition, determining that the electronic lock is opened, and determining the second sensing information Whether the change condition satisfies the second preset condition, and if the change of the second sensing information satisfies the second preset condition, it is determined that the electronic lock is opened in a preset mechanical unlocking manner, that is, is opened outdoors, if the second sensing information is The change condition does not satisfy the second preset condition, and it is determined that the electronic lock is opened indoors.
  • the first sub-sensing module can include:
  • a first sensing component configured to generate sensing information
  • a second sensing component configured to collect sensing information generated by the first sensing component
  • the installation position of the first sub-sensing module is associated with the locking tongue of the electronic lock
  • one of the first sensing component and the second sensing component is disposed on one end of the locking tongue located in the electronic lock, and the other sensing
  • the component is mounted in the electronic lock at a position opposite to the sensing component disposed on the bolt; or the first sensing component and the second sensing component are disposed on two sides perpendicular to the locking tongue, that is, the first sensing component and the second component
  • the connecting line of the sensing component is perpendicular or nearly perpendicular to the moving direction of the locking tongue.
  • the locking tongue When the locking tongue is retracted into the electronic lock, the locking tongue is located between the first sensing component and the second sensing component, and when the locking tongue protrudes from the electronic locking, the locking tongue The middle sensing component and the second sensing component are removed to ensure that the sensing information collected by the second sensing component changes when the locking tongue moves.
  • the second sensing component can collect the sensing information generated by the first sensing component to ensure that the sensing information collected by the second sensing component changes when the door body is opened.
  • the first sensing component may be an infrared emitting sensor for emitting infrared rays
  • the second sensing component is an infrared receiving sensor for receiving infrared rays emitted by the infrared emitting sensor.
  • the first inductive component may be a magnet for generating a magnetic field
  • the second inductive component is a reed switch for changing its own switching state under the action of the magnetic field, and returning to the switching state upon leaving the magnetic field.
  • the first sensing component and the second sensing component are installed at different positions.
  • the first sensing component and the second sensing component may move relative to each other.
  • the sensing information collected by the two sensing components changes, so that the electronic lock can be determined to be opened according to the change of the sensing information.
  • the first sub-sensing module may include:
  • the button, the sensing information collected by the button is state information of the button, and the state information is used to indicate whether the button is pressed.
  • the button can be mounted on the door frame, or mounted on the side of the door, or mounted on the end of the bolt located inside the electronic lock, as long as the electronic lock is opened or the door is opened, the state of the button can be changed.
  • the second sub-sensing module may include a third inductive component and a fourth inductive component.
  • a third sensing component configured to generate sensing information
  • a fourth sensing component configured to collect sensing information generated by the third sensing component
  • the predetermined mechanical unlocking mechanism is a locking hole
  • one of the third sensing component and the fourth sensing component is disposed on the locking hole wall, and the other sensing component is disposed in the second pre-around of the locking hole wall.
  • the sensing information collected by the fourth sensing component changes, so that the locking hole can be judged according to the change.
  • the mechanical key is unlocked. Otherwise, the instructions are not unlocked by a mechanical key.
  • the preset mechanical unlocking mechanism is a mechanical code dial
  • one of the third sensing component and the fourth sensing component is disposed on the password dial, and the other sensing component is disposed on the third preset around the password dial.
  • the sensing information collected by the fourth sensing component changes, so that the password dial can be judged according to the change.
  • the mechanical password dial is unlocked. Otherwise, the instructions are not unlocked via the mechanical code dial.
  • the password dial when the password is turned on by the mechanical password dial, the password dial is set to be multiple, and a plurality of second sub-sensing modules can be set, and each second sub-sensing module monitors a password dial, and when all the password dials are detected, When it is determined, unlock the lock by the mechanical code dial.
  • the third inductive component may be an infrared emitting sensor for emitting infrared rays
  • the fourth inductive component is an infrared receiving sensor for receiving infrared rays emitted by the infrared emitting sensor.
  • the third sensing component may be a magnet for generating a magnetic field
  • the fourth sensing component is a reed switch for changing the switching state of the magnetic field under the action of the magnetic field. When the magnetic field is described, the switch state is restored.
  • FIG. 6 is a schematic view showing a mounting position of the first inductive component 61 and the second inductive component 62 provided by the present application.
  • Electronic locks typically include a handle and a handle holder that is attached to the handle.
  • the handle base When the handle is pressed down, the handle base will rotate with the pressing of the handle. Through the transmission device in the electronic lock, the rotation of the handle will drive the lock tongue back into the electronic lock, so that the electronic lock is opened and the door is opened. Can be opened.
  • the handle seat When the door is closed, if the handle is restored to the original position, the handle seat will return to the original state, and the lock tongue will extend the electronic lock, and the door will be locked.
  • the first sensing member 61 is mounted on the handle holder on the indoor side of the electronic lock, and the second sensing member 62 is in the electronic lock.
  • the sensing information sensed by the second sensing component 62 is the strongest.
  • the handle base rotates, and the first sensing component also rotates correspondingly with the rotation of the handle holder, so that the first sensing component 61 and the second sensing component 62 Moving away from each other, the sensing information sensed by the second sensing component 62 is weakened, or the sensing information is not sensed, so that the door body can be judged to be opened.
  • FIG. 7 is a schematic diagram showing another mounting position of the first sensing component 61 and the second sensing component 62 provided by the embodiment of the present application.
  • the first inductive component 61 is mounted on one end of the bolt located inside the electronic lock, and the second inductive component 62 is fixedly mounted in the electronic lock opposite the first inductive component 61.
  • the lock tongue retracts the inside of the electronic lock, the first sensing component 61 and the second sensing component 62 are close to each other, so that the sensing information sensed by the second sensing component 62 is enhanced, and when the intensity of the sensed sensing information is increased to a certain value,
  • the door body is opened; when the lock tongue extends out of the electronic lock, the first sensing component 61 and the second sensing component 62 are away from each other, so that the sensing information sensed by the second sensing component 62 is weakened, and the intensity of the sensed information is sensed. When it is weakened to a certain value, the door is closed.
  • FIG. 8 is a schematic diagram showing still another mounting position of the first sensing component 61 and the second sensing component 62 provided by the present application.
  • the first inductive component 61 is mounted on the door body and the second inductive component 62 is mounted on the door frame.
  • the first sensing component 61 and the second sensing component 62 are close to each other; when the door body on which the electronic lock is mounted is opened, the first sensing component 61 and the second sensing component 62 are distant from each other, so that The sensing information sensed by the two sensing components 62 is weakened, or the sensing information is not sensed, so that the door body is opened.
  • the processor 42 is further configured to: obtain an unlock command, compare the key carried in the unlock command with the stored key; and include unlocking when the comparison result indicates that the stored key is included
  • the key carried in the command is based on the correspondence between the preset key and the identification identifier, it is determined whether the identification identifier corresponding to the key carried in the unlocking instruction is a predetermined identification identifier; if the determination result is yes, the electronic lock is restored.
  • the electronic unlock function enables the electronic lock to unlock the lock state and control the electronic lock to open. If the judgment result is no, the electronic lock is prohibited from being turned on, and the electronic unlocking function of the electronic lock is prohibited from being restored.
  • the unlocking instruction may be an unlocking instruction sent by the mobile communication terminal received by the communication module (eg, the Bluetooth module or the Internet access module), and the unlocking instruction is triggered by the user after inputting the key in the mobile communication terminal.
  • the unlock command is an unlock command generated by triggering a fingerprint input by the user through an input panel of the electronic lock.
  • the unlock command is an unlock command generated by the user inputting the password through the input panel of the electronic lock.
  • the unlock command is an unlock command generated by the RF card reading module of the electronic lock after reading the information of the RF card.
  • the electronic lock is triggered to cancel the anti-lock state by an electronic unlocking operation of the administrator.
  • the application also provides an electronic lock having an electronic lock control system as disclosed in the above embodiments.
  • the electronic lock control device includes a processor and a memory, and the first acquisition module and the control module are stored as a program unit in a memory, and the processor executes the program unit stored in the memory to implement The corresponding function.
  • the processor contains a kernel, and the kernel removes the corresponding program unit from the memory.
  • the kernel can be set to one or more, and the electronic lock can be controlled by adjusting the kernel parameters.
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory (flash RAM), the memory including at least one Memory chip.
  • RAM random access memory
  • ROM read only memory
  • flash RAM flash memory
  • Embodiments of the present invention provide a storage medium on which a program is stored, and the electronic lock control method is implemented when the program is executed by a processor.
  • the embodiment of the invention provides a processor for running a program, wherein the electronic lock control method is executed when the program is running.
  • An embodiment of the present invention provides a device, including a processor, a memory, and a program stored on the memory and executable on the processor.
  • the processor implements the following steps when executing the program:
  • the electronic unlocking function of the electronic lock is turned off, so that the electronic lock enters an anti-lock state.
  • the instruction for releasing the unlocking is an instruction sent by the predetermined user
  • the electronic unlocking function of the electronic lock is restored, so that the electronic lock is unlocked.
  • the devices in this document can be servers, PCs, PADs, mobile phones, and the like.
  • the present application also provides a computer program product, when executed on a data processing device, adapted to perform a process of initializing the method steps as follows:
  • the electronic unlocking function of the electronic lock is turned off, so that the electronic lock enters an anti-lock state.
  • the instruction for releasing the unlocking is an instruction sent by the predetermined user
  • the electronic unlocking function of the electronic lock is restored, so that the electronic lock is unlocked.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.

Abstract

L'invention concerne un verrou électronique et un procédé, un dispositif et un système de commande associés. Une instruction de contre-verrouillage chiffrée est envoyée à un verrou électronique au moyen d'un terminal de communication mobile ; et après réception de l'instruction de contre-verrouillage chiffrée, le verrou électronique déchiffre l'instruction de contre-verrouillage chiffrée ; uniquement lorsque l'instruction de contre-verrouillage déchiffrée est envoyée par un utilisateur prédéfini, le verrou électronique est ordonné d'entrer dans un état de contre-verrouillage et le verrou électronique ne peut pas être ouvert à l'aide d'un procédé de déverrouillage électronique tel qu'un mot de passe. Au moyen du procédé, tant qu'un administrateur envoie une instruction de contre-verrouillage au verrou électronique par l'intermédiaire du terminal de communication mobile, une clé électronique peut être gérée rapidement et efficacement, les opérations de l'administrateur sont simplifiées et la commodité du verrou électronique est améliorée. L'instruction de contre-verrouillage envoyée par le terminal de communication mobile au verrou électronique est une instruction de contre-verrouillage chiffrée, ce qui permet d'améliorer la sécurité du verrou électronique.
PCT/CN2018/119438 2017-12-06 2018-12-06 Verrou électronique et procédé, dispositif et système de commande associés WO2019109964A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201711273738.5A CN108049721B (zh) 2017-12-06 2017-12-06 电子锁及其控制方法、装置及系统
CN201721677044.3U CN207503302U (zh) 2017-12-06 2017-12-06 电子锁及其控制系统
CN201711273738.5 2017-12-06
CN201721677044.3 2017-12-06

Publications (1)

Publication Number Publication Date
WO2019109964A1 true WO2019109964A1 (fr) 2019-06-13

Family

ID=66750814

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/119438 WO2019109964A1 (fr) 2017-12-06 2018-12-06 Verrou électronique et procédé, dispositif et système de commande associés

Country Status (1)

Country Link
WO (1) WO2019109964A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE2250109A1 (en) * 2022-02-04 2023-08-05 Assa Abloy Ab Controlling power state of a lock assembly

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104790766A (zh) * 2015-03-20 2015-07-22 云丁网络技术(北京)有限公司 一种智能门锁系统及其锁状态和开锁合法性识别方法
CN204946137U (zh) * 2015-09-15 2016-01-06 劳海鹏 通过移动终端判断智能锁反锁状态及控制其解反锁的系统
US20160260271A1 (en) * 2015-03-03 2016-09-08 Acsys Ip Holding Inc. Systems and methods for redundant access control systems based on mobile devices
CN107038777A (zh) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 一种基于智能门锁系统的安全通信方法及其智能门锁系统
CN108049721A (zh) * 2017-12-06 2018-05-18 云丁网络技术(北京)有限公司 电子锁及其控制方法、装置及系统
CN207503302U (zh) * 2017-12-06 2018-06-15 云丁网络技术(北京)有限公司 电子锁及其控制系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160260271A1 (en) * 2015-03-03 2016-09-08 Acsys Ip Holding Inc. Systems and methods for redundant access control systems based on mobile devices
CN104790766A (zh) * 2015-03-20 2015-07-22 云丁网络技术(北京)有限公司 一种智能门锁系统及其锁状态和开锁合法性识别方法
CN204946137U (zh) * 2015-09-15 2016-01-06 劳海鹏 通过移动终端判断智能锁反锁状态及控制其解反锁的系统
CN107038777A (zh) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 一种基于智能门锁系统的安全通信方法及其智能门锁系统
CN108049721A (zh) * 2017-12-06 2018-05-18 云丁网络技术(北京)有限公司 电子锁及其控制方法、装置及系统
CN207503302U (zh) * 2017-12-06 2018-06-15 云丁网络技术(北京)有限公司 电子锁及其控制系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE2250109A1 (en) * 2022-02-04 2023-08-05 Assa Abloy Ab Controlling power state of a lock assembly

Similar Documents

Publication Publication Date Title
CN108049721B (zh) 电子锁及其控制方法、装置及系统
US11348390B2 (en) Padlock device, systems including a padlock device, and methods of operating therefor
Aldawira et al. Door security system for home monitoring based on ESp32
US9359794B2 (en) Method for operating an intelligent door knob
TWI602048B (zh) 使用者認證裝置
US9725927B1 (en) System for intelligent door knob (handle)
KR101714873B1 (ko) 컨텍스트 기반 데이터 액세스 제어
US9563794B2 (en) Method for upgrading RFID readers in situ
US6628198B2 (en) Security system for preventing a personal computer from being stolen or used by unauthorized people
US20070046424A1 (en) Device authentication using a unidirectional protocol
JP2013217142A (ja) 状態制御システム、及び状態制御方法
US11017621B1 (en) Mobile digital locking technology
WO2019109964A1 (fr) Verrou électronique et procédé, dispositif et système de commande associés
CN114430846A (zh) 移动数字锁定技术
US20210096821A1 (en) Dynamic generation of device identifiers
WO2019218328A1 (fr) Procédé de communication sans fil avec un verrou de porte intelligent, verrou de porte intelligent, passerelle, et dispositif de communication
CN112446984A (zh) 智能门锁控制方法及装置
JP2015233263A (ja) 認証システム及び認証方法
CN113850938B (zh) 智能门锁控制方法、装置、存储介质及电子设备
CN106815904B (zh) 门禁控制方法、装置及门禁设备、系统
KR20240027751A (ko) 보안 키리스 시스템을 위한 시스템 및 방법
CN101196775A (zh) 计算机电源控制系统及方法
TW201800652A (zh) 具有自動解鎖功能的門禁系統及其解鎖方法
JP2007217903A (ja) キーと解錠装置と鍵装置とキー用プログラムと解錠装置用プログラム
US20090259774A1 (en) Identity-distinguishable sensing method and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18886357

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18886357

Country of ref document: EP

Kind code of ref document: A1