[go: up one dir, main page]

CN108171835A - A kind of intelligent lock control application process and system based on personal information Communication processing system PICA - Google Patents

A kind of intelligent lock control application process and system based on personal information Communication processing system PICA Download PDF

Info

Publication number
CN108171835A
CN108171835A CN201711435633.5A CN201711435633A CN108171835A CN 108171835 A CN108171835 A CN 108171835A CN 201711435633 A CN201711435633 A CN 201711435633A CN 108171835 A CN108171835 A CN 108171835A
Authority
CN
China
Prior art keywords
pica
key
rfid
rfid key
clients
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711435633.5A
Other languages
Chinese (zh)
Other versions
CN108171835B (en
Inventor
于成龙
孙成文
吴学强
刘艳须
侯冠楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhangjiakou Sanxin Tongda Machinery Manufacturing Co ltd
Original Assignee
Is Tianjin Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Is Tianjin Science And Technology Co Ltd filed Critical Is Tianjin Science And Technology Co Ltd
Priority to CN201711435633.5A priority Critical patent/CN108171835B/en
Publication of CN108171835A publication Critical patent/CN108171835A/en
Application granted granted Critical
Publication of CN108171835B publication Critical patent/CN108171835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention belongs to intelligent lock control method and technology fields, more particularly to a kind of intelligent lock control application process based on personal information Communication processing system PICA, simultaneously the present invention also provides a kind of intelligent lock control application system based on personal information Communication processing system PICA, the method includes:RFID key takes method, RFID key gives back method, the Raspberry Pi initial method of system login method, PICA clients adding method, PICA client ips setting method, PICA smart locks initial method, PICA clients, the present invention solves the problems, such as that the prior art can not be merged mutually and intelligent management there are personal information Communication processing system with intelligent lock control application, have realize personal information Communication processing system mutually merge with intelligent lock control application and intelligent management, safe, legitimacy by force, initialize the advantageous effects of process simplification.

Description

A kind of intelligent lock control application process based on personal information Communication processing system PICA and System
Technical field
The invention belongs to intelligent lock control method and technology fields more particularly to one kind to be based on personal information Communication processing system The intelligent lock control application process of PICA, while the present invention also provides a kind of intelligence based on personal information Communication processing system PICA Lock control application system.
Background technology
At present, intelligent lock control system PICA is according to some important departments and place, there is larger amount of RFID key needs It manages concentratedly and designs, it has merged the new concept and computer technology of management, and scientific collection has been carried out to RFID key Middle management, it have the characteristics that conveniently, safely, management function it is powerful.It can carry out stringent pipe to the RFID key authorized Reason, and the situation of record RFID key user that can be detailed.It is solved as much as possible because RFID key mismanagement is drawn The various problems and event of hair.It is widely used in:Government department, military organs, warehouse, prison, Bank Danamon, traffic fortune The places such as defeated, museum, apartment, office building, there are personal information Communication processing systems and intelligent lock control application nothing for the prior art Method mutually merges and the problem of intelligent management.
Invention content
The present invention provides a kind of intelligent lock control application process and system based on personal information Communication processing system PICA, with Solving to propose the prior art in above-mentioned background technology can not phase there are personal information Communication processing system and intelligent lock control application The problem of mutual fusion and intelligent management.
Technical problem solved by the invention is realized using following technical scheme:One kind is based on personal information Communication processing The intelligent lock control application process of system PICA, step include:
RFID key takes method:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken Part RFID key;
RFID key gives back method:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
Further, if described unlock successively including taking upper one away RFID key, according to next RFID key Number release next locking RFID key.
Further, basis prompting accordingly includes the corresponding indicator light prompting of the lockhole of corresponding RFID key.
Further, remaining described RFID key is included except remaining RFID key of the corresponding RFID key of opening key door Spoon.
Further, the RFID key takes method or RFID key is given back method and further included before:
System login method:
PICA clients obtain user and input information and be sent to PICA server ends, and the user inputs information and includes user Name, password, fingerprint, card number password;
PICA received server-sides user inputs information and carries out authentication;
If PICA server end authentications pass through, the key shape in the permission, self-defined group information, boxes for keys of user is returned If state simultaneously lent by key, the information that cannot be borrowed again is returned;
If PICA server end authentications do not pass through, error message is returned;
PICA clients receive return information and are shown accordingly according to return information.
Further, it is further included before the system login method:
PICA client adding methods:
Automatically PICA server ends are connected after PICA client terminal start-ups;
PICA clients send the return information for waking up information and obtaining PICA server ends to PICA server ends;
If the return information of PICA server ends is normal, PICA clients to PICA server end sending device log-on messages, The equipment log-on message includes number, type, lockhole and key binding information;
Whether there is the corresponding equipment of facility information in PICA received server-side equipment log-on messages and Test database;
If there are the corresponding equipment of facility information in database, record corresponding facility information and wait for administrator true manually Recognize;
If there are the corresponding equipment of facility information in database, returned according to the access situation of PICA and to PICA clients logical The return information crossed or refused;
If return information passes through, PICA clients can accordingly be operated in PICA server ends;
If return information does not pass through, PICA clients cannot accordingly be operated in PICA server ends;
Further, administrator can check that PICA client states and access situation simultaneously can manual access or refusal PICA clients The access at end.
Further, it is further included before the PICA clients adding method:
PICA client ip setting methods:
The IP address of PICA clients and the IP address for the server to be accessed are set.
Further, it is further included before the PICA client ips setting method:
PICA smart lock initial methods:
PICA smart locks access;
The key stick of lockhole will be inserted into;
PICA client broadcasts initialization command gives key stick;
Lockhole reads key stick and numbers and initialization information is written lockhole.
It is further included before the PICA client ips setting method:
The Raspberry Pi initialization of PICA clients:
PICA system programs are written in SD card;
SD card is put into the Raspberry Pi of PICA clients;
Cable is connected to PICA clients and accesses PICA networks;
Automatically the update of PICA server ends is accessed and detected after the booting of PICA clients.
Meanwhile the present invention also provides a kind of intelligent lock control application system based on personal information Communication processing system PICA, Including:RFID key takes application module and RFID key gives back application module;
The RFID key is taken application module and is used for:
RFID key takes method:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken Part RFID key;
The RFID key is given back application module and is used for:
RFID key gives back method:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
The present invention has prominent advantageous effects:
1st, method is taken using RFID key:If selection takes at least one RFID key, compiled according to the RFID key of selection It number unlocks successively;If selection take at least one RFID key but do not take away it is any one RFID key, if closing Key door then all cancels the selection of RFID key;If selection takes at least one RFID key but only takes part RFID keys Spoon if then closing key door, records the part RFID key taken;RFID key gives back method:If give back at least one RFID key then judges key door opening and closing state:If key door is not switched on, RFID key radio frequency is opened key by any one The corresponding RFID key for opening key door is simultaneously inserted into corresponding lockhole and locked by spoon door;If key door has been opened, remaining RFID key in each RFID key through radio frequency read successively and corresponding lockhole is inserted into according to corresponding prompting and is locked; If all RFID keys are locked, close key door, due to take flow be keyhole according to the selecting sequence of user according to Secondary opening, such situation are after taking first away, and second opening, user can arbitrarily change the selection of oneself, as user selects More keys are selected, but are not taken away, are directly closed behind the door, user is not included at this time and borrows and take key, as user selects more keys, but It only takes part away, then at closing time, only records the key that user this time takes away, return process:PP sticks are brushed, open cabinet door, by PP sticks, It is inserted into the lockhole that lights of indicator light, during the more stick PP, repeatedly aforesaid operations(Brush PP sticks->It is inserted into lockhole), cabinet door is closed, because This, by the management taken and given back of client intelligent key, realizing personal information Communication processing system should with intelligent lock control With mutual fusion and intelligent management.
2nd, the present invention takes method using the RFID key or RFID key is given back method and further included before:System login Method:PICA clients obtain user and input information and be sent to PICA server ends, and the user inputs information and includes user Name, password, fingerprint, card number password;PICA received server-sides user inputs information and carries out authentication;If PICA servers End authentication passes through, and has been borrowed if then returning to the permission of user, self-defined group information, the key status on boxes for keys and key Go out, then return to the information that cannot be borrowed again;If PICA server end authentications do not pass through, error message is returned;PICA visitors Family end receives return information and is shown accordingly according to return information, since login process is to obtain user to input information (User name password, fingerprint, card number password)After be sent to Server, Server carries out authentication, is verified, and returns to user Permission, self-defined group information, the key status on boxes for keys(If key has been lent, cannot borrow again), verification is not Pass through, return to error message, PICA is shown according to return information, therefore, passes through the individual of the PICA with authentication Information system logs in, and improves the safety of the intelligent lock control application management based on personal information Communication processing system PICA.
3rd, the present invention uses PICA client adding methods:Automatically PICA server ends are connected after PICA client terminal start-ups; PICA clients send the return information for waking up information and obtaining PICA server ends to PICA server ends;If PICA servers The return information at end is normal, then PICA clients are to PICA server end sending device log-on messages, the equipment log-on message Including number, type, lockhole and key binding information;It is in PICA received server-side equipment log-on messages and Test database It is no to have the corresponding equipment of facility information;If there are the corresponding equipment of facility information in database, corresponding equipment letter is recorded It ceases and waits for administrator's manual confirmation;If there are the corresponding equipment of facility information in database, according to the access situation of PICA And the return information for passing back through or refusing to PICA clients;If return information passes through, PICA clients can be in PICA Server end is operated accordingly;If return information does not pass through, PICA clients cannot carry out phase in PICA server ends The operation answered;Administrator can check that PICA client states and access situation simultaneously can manual access or refusal PICA clients Access, connect Server automatically after starting due to PICA, PICA sends Wakeup information to Server, obtains the anti-of Server Feedforward information, if the Response of Server is normal, PICA is to Server sending device log-on messages(Including SN, type, lockhole With key binding information).Consider that information chain is little, can once send all information, avoid repeatedly communicating, Server is obtained After PICA information, whether there is this equipment in Test database, do not exist such as, then record these information, wait for administrator true manually Recognize, it is such as existing, then according to the access situation of PICA, send and restore to PICA:Passed or Rejected, administrator can be PICA equipment states and access situation are checked in the PICA List Management pages of Server, administrator can be accurate manually Enter or refuse the access of PICA equipment, by confirming(Access)PICA equipment can appear in normal use page in Server On face, otherwise cannot, due to the verification process by client, ensure that the legitimacy of client access.
4th, the present invention uses PICA smart lock initial methods:PICA smart locks access;The key stick of lockhole will be inserted into; PICA client broadcasts initialization command gives key stick;Lockhole reads key stick and numbers and initialization information is written lockhole, institute It is further included before stating PICA client ip setting methods:The Raspberry Pi initialization of PICA clients:SD is written into PICA system programs In card;SD card is put into the Raspberry Pi of PICA clients;Cable is connected to PICA clients and accesses PICA networks;PICA visitors Automatically the update of PICA server ends is accessed and detected after the booting of family end, and Raspberry Pi initialization connects the card reader equipped with SD card Enter computer, perform initialization on computers, system ROM is written in SD card, SD card is put into Raspberry Pi, net is connected to PICA Line accesses dedicated network, detection update automatically after PICA bootings(It accesses the service on Server and downloads update), lockhole is initial Change, cable is connected to PICA, special PP sticks will be initialized and be inserted into lockhole, perform the initialization program on PC, sent to tree PICA Order is broadcast to lockhole by initialization command, PICA, and lockhole starts to read PP sticks number, and write information into lockhole, therefore, by In using simplified initial method, initialization flow is simplified.
The present invention be widely used in government department, military organs, warehouse, prison, Bank Danamon, communications and transportation, museum, The places such as apartment, office building.
The present invention provides a kind of intelligent lock control application process and system based on personal information Communication processing system PICA can There are personal information Communication processing systems to solve the prior art can not mutually merge and intelligent management with intelligent lock control application Problem realizes the application of personal information Communication processing system and intelligent lock control and mutually merge and intelligent management, with safety The characteristics of height, legitimacy are strong, initialization process simplification.
Description of the drawings
Fig. 1 is a kind of flow of the intelligent lock control application process based on personal information Communication processing system PICA of the present invention Figure.
Fig. 2 is a kind of structure of the intelligent lock control application system based on personal information Communication processing system PICA of the present invention Figure.
Specific embodiment
The present invention is described further below in conjunction with attached drawing:
In figure:
S101-RFID keys take method;
S102-RFID keys give back method;
S103- system login methods;
S104-PICA client adding methods;
S105-PICA client ip setting methods;
S106-PICA smart lock initial methods;
The Raspberry Pi initial method of S107-PICA clients;
1-RFID keys take module;
2-RFID keys give back module;
3- system login modules;
4-PICA client add modules;
5-PICA client ip setup modules;
6-PICA smart lock initialization modules;
The Raspberry Pi initialization module of 7-PICA clients.
Embodiment:
The present embodiment:As shown in Figure 1, a kind of intelligent lock control application process based on personal information Communication processing system PICA, packet It includes:
RFID key takes method S101:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken Part RFID key;
RFID key gives back method S102:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
Due to taking method using RFID key:If selection takes at least one RFID key, according to the RFID of selection Key number unlocks successively;If selection take at least one RFID key but do not take away it is any one RFID key, If closing key door, all cancel the selection of RFID key;If selection takes at least one RFID key but only takes part RFID key if then closing key door, records the part RFID key taken;RFID key gives back method:If it gives back at least One RFID key, then judge key door opening and closing state:If key door is not switched on, RFID key radio frequency is beaten by any one It opens key door and the corresponding RFID key for opening key door is inserted into corresponding lockhole and is locked;If key door has been opened, It is each in remaining RFID key that RFID key through radio frequency is read successively and corresponding lockhole is inserted into simultaneously according to corresponding prompting Locking;If all RFID keys are locked, key door is closed, is that keyhole is suitable according to the selection of user due to taking flow Sequence is opened successively, and such situation is after taking first away, and second opening, user can arbitrarily change the selection of oneself, such as use Family selects more keys, but does not take away, directly closes behind the door, user is not included at this time by means of key is taken, as user's selection is more key Spoon, but only take part away, then at closing time, only record the key that user this time takes away, return process:PP sticks are brushed, open cabinet door, it will PP sticks, are inserted into the lockhole that lights of indicator light, during the more stick PP, repeatedly aforesaid operations(Brush PP sticks->It is inserted into lockhole), close cabinet Door, therefore, by the management taken and given back of client intelligent key, realizes personal information Communication processing system and smart lock Control application mutually fusion and intelligent management.
If described unlock successively including taking upper one away RFID key, according to next number solution RFID key Except next locking RFID key.
Basis prompting accordingly includes the corresponding indicator light prompting of the lockhole of corresponding RFID key.
Remaining described RFID key is included except remaining RFID key of the corresponding RFID key of opening key door.
The RFID key takes method S101 or RFID key is given back method S102 and further included before:
System login method S103:
PICA clients obtain user and input information and be sent to PICA server ends, and the user inputs information and includes user Name, password, fingerprint, card number password;
PICA received server-sides user inputs information and carries out authentication;
If PICA server end authentications pass through, the key shape in the permission, self-defined group information, boxes for keys of user is returned If state simultaneously lent by key, the information that cannot be borrowed again is returned;
If PICA server end authentications do not pass through, error message is returned;
PICA clients receive return information and are shown accordingly according to return information.
Due to using, the RFID key takes method or RFID key is given back method and further included before:System login side Method:PICA clients, which obtain user and input information, is simultaneously sent to PICA server ends, the user input information include user name, Password, fingerprint, card number password;PICA received server-sides user inputs information and carries out authentication;If PICA server ends Authentication passes through, and has been borrowed if then returning to the permission of user, self-defined group information, the key status on boxes for keys and key Go out, then return to the information that cannot be borrowed again;If PICA server end authentications do not pass through, error message is returned;PICA visitors Family end receives return information and is shown accordingly according to return information, since login process is to obtain user to input information (User name password, fingerprint, card number password)After be sent to Server, Server carries out authentication, is verified, and returns to user Permission, self-defined group information, the key status on boxes for keys(If key has been lent, cannot borrow again), verification is not Pass through, return to error message, PICA is shown according to return information, therefore, passes through the individual of the PICA with authentication Information system logs in, and improves the safety of the intelligent lock control application management based on personal information Communication processing system PICA.
It is further included before the system login method S103:
PICA client adding methods S104:
Automatically PICA server ends are connected after PICA client terminal start-ups;
PICA clients send the return information for waking up information and obtaining PICA server ends to PICA server ends;
If the return information of PICA server ends is normal, PICA clients to PICA server end sending device log-on messages, The equipment log-on message includes number, type, lockhole and key binding information;
Whether there is the corresponding equipment of facility information in PICA received server-side equipment log-on messages and Test database;
If there are the corresponding equipment of facility information in database, record corresponding facility information and wait for administrator true manually Recognize;
If there are the corresponding equipment of facility information in database, returned according to the access situation of PICA and to PICA clients logical The return information crossed or refused;
If return information passes through, PICA clients can accordingly be operated in PICA server ends;
If return information does not pass through, PICA clients cannot accordingly be operated in PICA server ends.
Due to using PICA client adding methods:Automatically PICA server ends are connected after PICA client terminal start-ups;PICA Client sends the return information for waking up information and obtaining PICA server ends to PICA server ends;If PICA server ends Return information is normal, then PICA clients include to PICA server end sending device log-on messages, the equipment log-on message Number, type, lockhole and key binding information;Whether have in PICA received server-side equipment log-on messages and Test database The corresponding equipment of facility information;If corresponding facility information is not recorded there are the corresponding equipment of facility information simultaneously in database Wait for administrator's manual confirmation;If there are the corresponding equipment of facility information in database, according to the access situation of PICA and to The return information that PICA clients are passed back through or refused;If return information passes through, PICA clients can be serviced in PICA Device end is operated accordingly;If return information does not pass through, PICA clients cannot carry out corresponding in PICA server ends Operation;Administrator can check PICA client states and access situation and can manual access or refusal PICA clients connect Enter, connect Server after starting due to PICA automatically, PICA sends Wakeup information to Server, obtains the feedback letter of Server Breath, if the Response of Server is normal, PICA is to Server sending device log-on messages(Including SN, type, lockhole and key Spoon binding information).Consider that information chain is little, can once send all information, avoid repeatedly communicating, Server obtains PICA letters After breath, whether there is this equipment in Test database, do not exist such as, then record these information, wait for administrator's manual confirmation, such as In the presence of then according to the access situation of PICA, PICA being given to send and is restored:Passed or Rejected, administrator can be Server's PICA equipment states and access situation are checked in the PICA List Management pages, administrator can manual access or refusal The access of PICA equipment, by confirming(Access)PICA equipment can appearing on the normal use page in Server, it is no Then cannot, due to the verification process by client, ensure that the legitimacy of client access.
Administrator can check that PICA client states and access situation simultaneously can manual access or refusal PICA clients Access.
It is further included before the PICA clients adding method S104:
PICA client ip setting methods S105:
The IP address of PICA clients and the IP address for the server to be accessed are set.
It is further included before the PICA client ips setting method S105:
PICA smart lock initial methods S106:
PICA smart locks access;
The key stick of lockhole will be inserted into;
PICA client broadcasts initialization command gives key stick;
Lockhole reads key stick and numbers and initialization information is written lockhole;
It is further included before the PICA client ips setting method S105:
The Raspberry Pi initialization of PICA clients:
PICA system programs are written in SD card;
SD card is put into the Raspberry Pi of PICA clients;
Cable is connected to PICA clients and accesses PICA networks;
Automatically the update of PICA server ends is accessed and detected after the booting of PICA clients.
Due to using PICA smart lock initial methods:PICA smart locks access;The key stick of lockhole will be inserted into;PICA visitors Family end broadcast initialization command gives key stick;Lockhole reads key stick and numbers and initialization information is written lockhole, the PICA It is further included before client ip setting method:The Raspberry Pi initialization of PICA clients:PICA system programs are written in SD card;It will SD card is put into the Raspberry Pi of PICA clients;Cable is connected to PICA clients and accesses PICA networks;PICA clients are opened Automatically the update of PICA server ends is accessed and detected after machine, the card reader equipped with SD card is accessed computer by Raspberry Pi initialization, Initialization is performed on computers, system ROM is written in SD card, SD card is put into Raspberry Pi, cable is connected to PICA, is accessed Dedicated network, detection update automatically after PICA bootings(It accesses the service on Server and downloads update), lockhole initialization, give PICA connects cable, will initialize special PP sticks and be inserted into lockhole, and perform the initialization program on PC, and initialization is sent to tree PICA Order is broadcast to lockhole by order, PICA, and lockhole starts to read PP sticks number, and write information into lockhole, therefore, because using Simplified initial method simplifies initialization flow.
As shown in Fig. 2, a kind of intelligent lock control application system based on personal information Communication processing system PICA, including: RFID key takes application module and RFID key gives back application module;
The RFID key is taken application module and is used for:
RFID key takes method S101:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken Part RFID key;
The RFID key is given back application module and is used for:
RFID key gives back method S102:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
Operation principle:
The present invention takes method by RFID key:If selection takes at least one RFID key, according to the RFID keys of selection Spoon number unlocks successively;If selection take at least one RFID key but do not take away it is any one RFID key, if Key door is closed, then all cancels the selection of RFID key;If selection takes at least one RFID key but only takes part RFID key if then closing key door, records the part RFID key taken;RFID key gives back method:If it gives back at least One RFID key, then judge key door opening and closing state:If key door is not switched on, RFID key radio frequency is beaten by any one It opens key door and the corresponding RFID key for opening key door is inserted into corresponding lockhole and is locked;If key door has been opened, It is each in remaining RFID key that RFID key through radio frequency is read successively and corresponding lockhole is inserted into simultaneously according to corresponding prompting Locking;If all RFID keys are locked, key door is closed, is that keyhole is suitable according to the selection of user due to taking flow Sequence is opened successively, and such situation is after taking first away, and second opening, user can arbitrarily change the selection of oneself, such as use Family selects more keys, but does not take away, directly closes behind the door, user is not included at this time by means of key is taken, as user's selection is more key Spoon, but only take part away, then at closing time, only record the key that user this time takes away, return process:PP sticks are brushed, open cabinet door, it will PP sticks, are inserted into the lockhole that lights of indicator light, during the more stick PP, repeatedly aforesaid operations(Brush PP sticks->It is inserted into lockhole), close cabinet Door, the present invention solve the prior art and can not mutually be merged with intelligent lock control application there are personal information Communication processing system and intelligence The problem of managing, with realizing, personal information Communication processing system is mutually merged with intelligent lock control application and intelligence is managed Reason, safe, legitimacy is strong, the advantageous effects of initialization process simplification.
Using technical scheme of the present invention or those skilled in the art under the inspiration of technical solution of the present invention, design Go out similar technical solution, and reach above-mentioned technique effect, be to fall into protection scope of the present invention.

Claims (10)

1. a kind of intelligent lock control application process based on personal information Communication processing system PICA, which is characterized in that step includes:
RFID key takes method:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken Part RFID key;
RFID key gives back method:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
2. a kind of intelligent lock control application process based on personal information Communication processing system PICA according to claim 1, It is characterized in that, if described unlock successively including taking upper one away RFID key, according to next volume RFID key Number release next locking RFID key.
3. a kind of intelligent lock control application process based on personal information Communication processing system PICA according to claim 1, It is characterized in that, basis prompting accordingly includes the corresponding indicator light prompting of the lockhole of corresponding RFID key.
4. a kind of intelligent lock control application process based on personal information Communication processing system PICA according to claim 1, It is characterized in that, remaining described RFID key is included except remaining RFID key of the corresponding RFID key of opening key door.
5. a kind of intelligent lock control application process based on personal information Communication processing system PICA according to claim 1, It is characterized in that, the RFID key takes method or RFID key is given back method and further included before:
System login method:
PICA clients obtain user and input information and be sent to PICA server ends, and the user inputs information and includes user Name, password, fingerprint, card number password;
PICA received server-sides user inputs information and carries out authentication;
If PICA server end authentications pass through, the key shape in the permission, self-defined group information, boxes for keys of user is returned If state simultaneously lent by key, the information that cannot be borrowed again is returned;
If PICA server end authentications do not pass through, error message is returned;
PICA clients receive return information and are shown accordingly according to return information.
6. a kind of intelligent lock control application process based on personal information Communication processing system PICA according to claim 5, It is characterized in that, it is further included before the system login method:
PICA client adding methods:
Automatically PICA server ends are connected after PICA client terminal start-ups;
PICA clients send the return information for waking up information and obtaining PICA server ends to PICA server ends;
If the return information of PICA server ends is normal, PICA clients to PICA server end sending device log-on messages, The equipment log-on message includes number, type, lockhole and key binding information;
Whether there is the corresponding equipment of facility information in PICA received server-side equipment log-on messages and Test database;
If there are the corresponding equipment of facility information in database, record corresponding facility information and wait for administrator true manually Recognize;
If there are the corresponding equipment of facility information in database, returned according to the access situation of PICA and to PICA clients logical The return information crossed or refused;
If return information passes through, PICA clients can accordingly be operated in PICA server ends;
If return information does not pass through, PICA clients cannot accordingly be operated in PICA server ends.
7. a kind of intelligent lock control application process based on personal information Communication processing system PICA according to claim 6, It is characterized in that, administrator can check that PICA client states and access situation simultaneously can manual access or refusal PICA clients The access at end.
8. a kind of intelligent lock control application process based on personal information Communication processing system PICA according to claim 7, It is characterized in that, it is further included before the PICA clients adding method:
PICA client ip setting methods:
The IP address of PICA clients and the IP address for the server to be accessed are set.
9. a kind of intelligent lock control application process based on personal information Communication processing system PICA according to claim 8, It is characterized in that, it is further included before the PICA client ips setting method:
PICA smart lock initial methods:
PICA smart locks access;
The key stick of lockhole will be inserted into;
PICA client broadcasts initialization command gives key stick;
Lockhole reads key stick and numbers and initialization information is written lockhole;
It is further included before the PICA client ips setting method:
The Raspberry Pi initialization of PICA clients:
PICA system programs are written in SD card;
SD card is put into the Raspberry Pi of PICA clients;
Cable is connected to PICA clients and accesses PICA networks;
Automatically the update of PICA server ends is accessed and detected after the booting of PICA clients.
10. a kind of intelligent lock control application system based on personal information Communication processing system PICA, which is characterized in that including: RFID key takes application module and RFID key gives back application module;
The RFID key is taken application module and is used for:
RFID key takes method:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken Part RFID key;
The RFID key is given back application module and is used for:
RFID key gives back method:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
CN201711435633.5A 2017-12-26 2017-12-26 Intelligent lock control application method and system based on personal information communication processing system (PICA) Active CN108171835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711435633.5A CN108171835B (en) 2017-12-26 2017-12-26 Intelligent lock control application method and system based on personal information communication processing system (PICA)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711435633.5A CN108171835B (en) 2017-12-26 2017-12-26 Intelligent lock control application method and system based on personal information communication processing system (PICA)

Publications (2)

Publication Number Publication Date
CN108171835A true CN108171835A (en) 2018-06-15
CN108171835B CN108171835B (en) 2021-05-07

Family

ID=62521720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711435633.5A Active CN108171835B (en) 2017-12-26 2017-12-26 Intelligent lock control application method and system based on personal information communication processing system (PICA)

Country Status (1)

Country Link
CN (1) CN108171835B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112286462A (en) * 2020-10-30 2021-01-29 广东科徕尼智能科技有限公司 Log management method and system of intelligent lock, intelligent lock and storage device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859415A (en) * 2010-06-29 2010-10-13 高鹏 Human-computer interaction intelligent key management system and management method thereof
CN102213041A (en) * 2010-04-07 2011-10-12 浙江理工大学 Centralized key management system based on pressure-sensitivity fingerprint identification and use method
CN203882364U (en) * 2014-06-07 2014-10-15 上海奕铄科技有限公司 Key management box and key management system
CN205577713U (en) * 2016-04-08 2016-09-14 国网安徽省电力公司宣城供电公司 Intelligent key management box system
US9526010B2 (en) * 2015-05-14 2016-12-20 Yuan-Chou Chung System for controlling key access using an internet-connected key box device
CN107369233A (en) * 2017-07-13 2017-11-21 云雀科技成都有限责任公司 Application system is unlocked using the electric power of internet
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102213041A (en) * 2010-04-07 2011-10-12 浙江理工大学 Centralized key management system based on pressure-sensitivity fingerprint identification and use method
CN101859415A (en) * 2010-06-29 2010-10-13 高鹏 Human-computer interaction intelligent key management system and management method thereof
CN203882364U (en) * 2014-06-07 2014-10-15 上海奕铄科技有限公司 Key management box and key management system
US9526010B2 (en) * 2015-05-14 2016-12-20 Yuan-Chou Chung System for controlling key access using an internet-connected key box device
CN205577713U (en) * 2016-04-08 2016-09-14 国网安徽省电力公司宣城供电公司 Intelligent key management box system
CN107424339A (en) * 2017-04-19 2017-12-01 宁波瑞奥物联技术股份有限公司 A kind of intelligent key management system and method
CN107369233A (en) * 2017-07-13 2017-11-21 云雀科技成都有限责任公司 Application system is unlocked using the electric power of internet

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112286462A (en) * 2020-10-30 2021-01-29 广东科徕尼智能科技有限公司 Log management method and system of intelligent lock, intelligent lock and storage device

Also Published As

Publication number Publication date
CN108171835B (en) 2021-05-07

Similar Documents

Publication Publication Date Title
CN110213246B (en) Wide-area multi-factor identity authentication system
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
CN103136820A (en) Remote access control system based on terminal fingerprint identification
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
CN108961475B (en) Access control deployment method and access control deployment server
CN103489233A (en) Electronic door control system with dynamic password
CN106652135A (en) Access control method and system based on cloud technology and two-dimensional code technology
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN109831463B (en) Intelligent terminal safety protection system for login verification of operating system
CN103544746A (en) Electronic access control system of dynamic bar code
CN106504375A (en) Fingerprint lock management method
CN108205834A (en) Access control management method and access control system
CN105991734A (en) Cloud platform management method and system
CN108712389A (en) A kind of intelligent lock system
CN106127888B (en) Intelligent lock operation method and smart lock operating system
CN105574968A (en) Intelligent building visitor system
CN103825863B (en) A kind of accounts management method and device
CN106101054A (en) The single-point logging method of a kind of multisystem and centralized management system
CN106899581A (en) A kind of guard method and gate control system based on cloud account
CN109660514A (en) A kind of implementation method of smart machine system, smart machine control method and system
CN109495514A (en) Role access control system and method based on edge terminal
CN108920919A (en) Control method, device and system of interactive intelligent equipment
CN109215204A (en) A kind of intelligent door lock security system based on ether mill
CN109120609A (en) Social information based on block chain reports method and apparatus
CN108737251A (en) Control method for door lock, device, system, guest room application based on instant messaging

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210421

Address after: 075000 No.6, industrial Street Lane 1, shangyingtun village, xuanpingbao Township, Wanquan District, Zhangjiakou City, Hebei Province

Applicant after: Zhangjiakou meikamande Machinery Manufacturing Co.,Ltd.

Address before: 300400, Tianjin, Beichen District, Tianjin high-end equipment manufacturing industry park road, No. 88

Applicant before: TIANJIN TAIWONA TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240321

Address after: 075000 No. 5, Tengfei Middle Road, Wanquan Economic Development Zone, Zhangjiakou City, Hebei Province

Patentee after: ZHANGJIAKOU SANXIN TONGDA MACHINERY MANUFACTURING Co.,Ltd.

Country or region after: Zhong Guo

Address before: No. 6, Industrial Street, Lane 1, Shangyingtun Village, Xuanpingbao Township, Wanquan District, Zhangjiakou City, Hebei Province, 075000

Patentee before: Zhangjiakou meikamande Machinery Manufacturing Co.,Ltd.

Country or region before: Zhong Guo

TR01 Transfer of patent right