A kind of intelligent lock control application process based on personal information Communication processing system PICA and
System
Technical field
The invention belongs to intelligent lock control method and technology fields more particularly to one kind to be based on personal information Communication processing system
The intelligent lock control application process of PICA, while the present invention also provides a kind of intelligence based on personal information Communication processing system PICA
Lock control application system.
Background technology
At present, intelligent lock control system PICA is according to some important departments and place, there is larger amount of RFID key needs
It manages concentratedly and designs, it has merged the new concept and computer technology of management, and scientific collection has been carried out to RFID key
Middle management, it have the characteristics that conveniently, safely, management function it is powerful.It can carry out stringent pipe to the RFID key authorized
Reason, and the situation of record RFID key user that can be detailed.It is solved as much as possible because RFID key mismanagement is drawn
The various problems and event of hair.It is widely used in:Government department, military organs, warehouse, prison, Bank Danamon, traffic fortune
The places such as defeated, museum, apartment, office building, there are personal information Communication processing systems and intelligent lock control application nothing for the prior art
Method mutually merges and the problem of intelligent management.
Invention content
The present invention provides a kind of intelligent lock control application process and system based on personal information Communication processing system PICA, with
Solving to propose the prior art in above-mentioned background technology can not phase there are personal information Communication processing system and intelligent lock control application
The problem of mutual fusion and intelligent management.
Technical problem solved by the invention is realized using following technical scheme:One kind is based on personal information Communication processing
The intelligent lock control application process of system PICA, step include:
RFID key takes method:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely
Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken
Part RFID key;
RFID key gives back method:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened
RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened
Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
Further, if described unlock successively including taking upper one away RFID key, according to next RFID key
Number release next locking RFID key.
Further, basis prompting accordingly includes the corresponding indicator light prompting of the lockhole of corresponding RFID key.
Further, remaining described RFID key is included except remaining RFID key of the corresponding RFID key of opening key door
Spoon.
Further, the RFID key takes method or RFID key is given back method and further included before:
System login method:
PICA clients obtain user and input information and be sent to PICA server ends, and the user inputs information and includes user
Name, password, fingerprint, card number password;
PICA received server-sides user inputs information and carries out authentication;
If PICA server end authentications pass through, the key shape in the permission, self-defined group information, boxes for keys of user is returned
If state simultaneously lent by key, the information that cannot be borrowed again is returned;
If PICA server end authentications do not pass through, error message is returned;
PICA clients receive return information and are shown accordingly according to return information.
Further, it is further included before the system login method:
PICA client adding methods:
Automatically PICA server ends are connected after PICA client terminal start-ups;
PICA clients send the return information for waking up information and obtaining PICA server ends to PICA server ends;
If the return information of PICA server ends is normal, PICA clients to PICA server end sending device log-on messages,
The equipment log-on message includes number, type, lockhole and key binding information;
Whether there is the corresponding equipment of facility information in PICA received server-side equipment log-on messages and Test database;
If there are the corresponding equipment of facility information in database, record corresponding facility information and wait for administrator true manually
Recognize;
If there are the corresponding equipment of facility information in database, returned according to the access situation of PICA and to PICA clients logical
The return information crossed or refused;
If return information passes through, PICA clients can accordingly be operated in PICA server ends;
If return information does not pass through, PICA clients cannot accordingly be operated in PICA server ends;
Further, administrator can check that PICA client states and access situation simultaneously can manual access or refusal PICA clients
The access at end.
Further, it is further included before the PICA clients adding method:
PICA client ip setting methods:
The IP address of PICA clients and the IP address for the server to be accessed are set.
Further, it is further included before the PICA client ips setting method:
PICA smart lock initial methods:
PICA smart locks access;
The key stick of lockhole will be inserted into;
PICA client broadcasts initialization command gives key stick;
Lockhole reads key stick and numbers and initialization information is written lockhole.
It is further included before the PICA client ips setting method:
The Raspberry Pi initialization of PICA clients:
PICA system programs are written in SD card;
SD card is put into the Raspberry Pi of PICA clients;
Cable is connected to PICA clients and accesses PICA networks;
Automatically the update of PICA server ends is accessed and detected after the booting of PICA clients.
Meanwhile the present invention also provides a kind of intelligent lock control application system based on personal information Communication processing system PICA,
Including:RFID key takes application module and RFID key gives back application module;
The RFID key is taken application module and is used for:
RFID key takes method:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely
Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken
Part RFID key;
The RFID key is given back application module and is used for:
RFID key gives back method:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened
RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened
Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
The present invention has prominent advantageous effects:
1st, method is taken using RFID key:If selection takes at least one RFID key, compiled according to the RFID key of selection
It number unlocks successively;If selection take at least one RFID key but do not take away it is any one RFID key, if closing
Key door then all cancels the selection of RFID key;If selection takes at least one RFID key but only takes part RFID keys
Spoon if then closing key door, records the part RFID key taken;RFID key gives back method:If give back at least one
RFID key then judges key door opening and closing state:If key door is not switched on, RFID key radio frequency is opened key by any one
The corresponding RFID key for opening key door is simultaneously inserted into corresponding lockhole and locked by spoon door;If key door has been opened, remaining
RFID key in each RFID key through radio frequency read successively and corresponding lockhole is inserted into according to corresponding prompting and is locked;
If all RFID keys are locked, close key door, due to take flow be keyhole according to the selecting sequence of user according to
Secondary opening, such situation are after taking first away, and second opening, user can arbitrarily change the selection of oneself, as user selects
More keys are selected, but are not taken away, are directly closed behind the door, user is not included at this time and borrows and take key, as user selects more keys, but
It only takes part away, then at closing time, only records the key that user this time takes away, return process:PP sticks are brushed, open cabinet door, by PP sticks,
It is inserted into the lockhole that lights of indicator light, during the more stick PP, repeatedly aforesaid operations(Brush PP sticks->It is inserted into lockhole), cabinet door is closed, because
This, by the management taken and given back of client intelligent key, realizing personal information Communication processing system should with intelligent lock control
With mutual fusion and intelligent management.
2nd, the present invention takes method using the RFID key or RFID key is given back method and further included before:System login
Method:PICA clients obtain user and input information and be sent to PICA server ends, and the user inputs information and includes user
Name, password, fingerprint, card number password;PICA received server-sides user inputs information and carries out authentication;If PICA servers
End authentication passes through, and has been borrowed if then returning to the permission of user, self-defined group information, the key status on boxes for keys and key
Go out, then return to the information that cannot be borrowed again;If PICA server end authentications do not pass through, error message is returned;PICA visitors
Family end receives return information and is shown accordingly according to return information, since login process is to obtain user to input information
(User name password, fingerprint, card number password)After be sent to Server, Server carries out authentication, is verified, and returns to user
Permission, self-defined group information, the key status on boxes for keys(If key has been lent, cannot borrow again), verification is not
Pass through, return to error message, PICA is shown according to return information, therefore, passes through the individual of the PICA with authentication
Information system logs in, and improves the safety of the intelligent lock control application management based on personal information Communication processing system PICA.
3rd, the present invention uses PICA client adding methods:Automatically PICA server ends are connected after PICA client terminal start-ups;
PICA clients send the return information for waking up information and obtaining PICA server ends to PICA server ends;If PICA servers
The return information at end is normal, then PICA clients are to PICA server end sending device log-on messages, the equipment log-on message
Including number, type, lockhole and key binding information;It is in PICA received server-side equipment log-on messages and Test database
It is no to have the corresponding equipment of facility information;If there are the corresponding equipment of facility information in database, corresponding equipment letter is recorded
It ceases and waits for administrator's manual confirmation;If there are the corresponding equipment of facility information in database, according to the access situation of PICA
And the return information for passing back through or refusing to PICA clients;If return information passes through, PICA clients can be in PICA
Server end is operated accordingly;If return information does not pass through, PICA clients cannot carry out phase in PICA server ends
The operation answered;Administrator can check that PICA client states and access situation simultaneously can manual access or refusal PICA clients
Access, connect Server automatically after starting due to PICA, PICA sends Wakeup information to Server, obtains the anti-of Server
Feedforward information, if the Response of Server is normal, PICA is to Server sending device log-on messages(Including SN, type, lockhole
With key binding information).Consider that information chain is little, can once send all information, avoid repeatedly communicating, Server is obtained
After PICA information, whether there is this equipment in Test database, do not exist such as, then record these information, wait for administrator true manually
Recognize, it is such as existing, then according to the access situation of PICA, send and restore to PICA:Passed or Rejected, administrator can be
PICA equipment states and access situation are checked in the PICA List Management pages of Server, administrator can be accurate manually
Enter or refuse the access of PICA equipment, by confirming(Access)PICA equipment can appear in normal use page in Server
On face, otherwise cannot, due to the verification process by client, ensure that the legitimacy of client access.
4th, the present invention uses PICA smart lock initial methods:PICA smart locks access;The key stick of lockhole will be inserted into;
PICA client broadcasts initialization command gives key stick;Lockhole reads key stick and numbers and initialization information is written lockhole, institute
It is further included before stating PICA client ip setting methods:The Raspberry Pi initialization of PICA clients:SD is written into PICA system programs
In card;SD card is put into the Raspberry Pi of PICA clients;Cable is connected to PICA clients and accesses PICA networks;PICA visitors
Automatically the update of PICA server ends is accessed and detected after the booting of family end, and Raspberry Pi initialization connects the card reader equipped with SD card
Enter computer, perform initialization on computers, system ROM is written in SD card, SD card is put into Raspberry Pi, net is connected to PICA
Line accesses dedicated network, detection update automatically after PICA bootings(It accesses the service on Server and downloads update), lockhole is initial
Change, cable is connected to PICA, special PP sticks will be initialized and be inserted into lockhole, perform the initialization program on PC, sent to tree PICA
Order is broadcast to lockhole by initialization command, PICA, and lockhole starts to read PP sticks number, and write information into lockhole, therefore, by
In using simplified initial method, initialization flow is simplified.
The present invention be widely used in government department, military organs, warehouse, prison, Bank Danamon, communications and transportation, museum,
The places such as apartment, office building.
The present invention provides a kind of intelligent lock control application process and system based on personal information Communication processing system PICA can
There are personal information Communication processing systems to solve the prior art can not mutually merge and intelligent management with intelligent lock control application
Problem realizes the application of personal information Communication processing system and intelligent lock control and mutually merge and intelligent management, with safety
The characteristics of height, legitimacy are strong, initialization process simplification.
Description of the drawings
Fig. 1 is a kind of flow of the intelligent lock control application process based on personal information Communication processing system PICA of the present invention
Figure.
Fig. 2 is a kind of structure of the intelligent lock control application system based on personal information Communication processing system PICA of the present invention
Figure.
Specific embodiment
The present invention is described further below in conjunction with attached drawing:
In figure:
S101-RFID keys take method;
S102-RFID keys give back method;
S103- system login methods;
S104-PICA client adding methods;
S105-PICA client ip setting methods;
S106-PICA smart lock initial methods;
The Raspberry Pi initial method of S107-PICA clients;
1-RFID keys take module;
2-RFID keys give back module;
3- system login modules;
4-PICA client add modules;
5-PICA client ip setup modules;
6-PICA smart lock initialization modules;
The Raspberry Pi initialization module of 7-PICA clients.
Embodiment:
The present embodiment:As shown in Figure 1, a kind of intelligent lock control application process based on personal information Communication processing system PICA, packet
It includes:
RFID key takes method S101:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely
Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken
Part RFID key;
RFID key gives back method S102:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened
RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened
Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
Due to taking method using RFID key:If selection takes at least one RFID key, according to the RFID of selection
Key number unlocks successively;If selection take at least one RFID key but do not take away it is any one RFID key,
If closing key door, all cancel the selection of RFID key;If selection takes at least one RFID key but only takes part
RFID key if then closing key door, records the part RFID key taken;RFID key gives back method:If it gives back at least
One RFID key, then judge key door opening and closing state:If key door is not switched on, RFID key radio frequency is beaten by any one
It opens key door and the corresponding RFID key for opening key door is inserted into corresponding lockhole and is locked;If key door has been opened,
It is each in remaining RFID key that RFID key through radio frequency is read successively and corresponding lockhole is inserted into simultaneously according to corresponding prompting
Locking;If all RFID keys are locked, key door is closed, is that keyhole is suitable according to the selection of user due to taking flow
Sequence is opened successively, and such situation is after taking first away, and second opening, user can arbitrarily change the selection of oneself, such as use
Family selects more keys, but does not take away, directly closes behind the door, user is not included at this time by means of key is taken, as user's selection is more key
Spoon, but only take part away, then at closing time, only record the key that user this time takes away, return process:PP sticks are brushed, open cabinet door, it will
PP sticks, are inserted into the lockhole that lights of indicator light, during the more stick PP, repeatedly aforesaid operations(Brush PP sticks->It is inserted into lockhole), close cabinet
Door, therefore, by the management taken and given back of client intelligent key, realizes personal information Communication processing system and smart lock
Control application mutually fusion and intelligent management.
If described unlock successively including taking upper one away RFID key, according to next number solution RFID key
Except next locking RFID key.
Basis prompting accordingly includes the corresponding indicator light prompting of the lockhole of corresponding RFID key.
Remaining described RFID key is included except remaining RFID key of the corresponding RFID key of opening key door.
The RFID key takes method S101 or RFID key is given back method S102 and further included before:
System login method S103:
PICA clients obtain user and input information and be sent to PICA server ends, and the user inputs information and includes user
Name, password, fingerprint, card number password;
PICA received server-sides user inputs information and carries out authentication;
If PICA server end authentications pass through, the key shape in the permission, self-defined group information, boxes for keys of user is returned
If state simultaneously lent by key, the information that cannot be borrowed again is returned;
If PICA server end authentications do not pass through, error message is returned;
PICA clients receive return information and are shown accordingly according to return information.
Due to using, the RFID key takes method or RFID key is given back method and further included before:System login side
Method:PICA clients, which obtain user and input information, is simultaneously sent to PICA server ends, the user input information include user name,
Password, fingerprint, card number password;PICA received server-sides user inputs information and carries out authentication;If PICA server ends
Authentication passes through, and has been borrowed if then returning to the permission of user, self-defined group information, the key status on boxes for keys and key
Go out, then return to the information that cannot be borrowed again;If PICA server end authentications do not pass through, error message is returned;PICA visitors
Family end receives return information and is shown accordingly according to return information, since login process is to obtain user to input information
(User name password, fingerprint, card number password)After be sent to Server, Server carries out authentication, is verified, and returns to user
Permission, self-defined group information, the key status on boxes for keys(If key has been lent, cannot borrow again), verification is not
Pass through, return to error message, PICA is shown according to return information, therefore, passes through the individual of the PICA with authentication
Information system logs in, and improves the safety of the intelligent lock control application management based on personal information Communication processing system PICA.
It is further included before the system login method S103:
PICA client adding methods S104:
Automatically PICA server ends are connected after PICA client terminal start-ups;
PICA clients send the return information for waking up information and obtaining PICA server ends to PICA server ends;
If the return information of PICA server ends is normal, PICA clients to PICA server end sending device log-on messages,
The equipment log-on message includes number, type, lockhole and key binding information;
Whether there is the corresponding equipment of facility information in PICA received server-side equipment log-on messages and Test database;
If there are the corresponding equipment of facility information in database, record corresponding facility information and wait for administrator true manually
Recognize;
If there are the corresponding equipment of facility information in database, returned according to the access situation of PICA and to PICA clients logical
The return information crossed or refused;
If return information passes through, PICA clients can accordingly be operated in PICA server ends;
If return information does not pass through, PICA clients cannot accordingly be operated in PICA server ends.
Due to using PICA client adding methods:Automatically PICA server ends are connected after PICA client terminal start-ups;PICA
Client sends the return information for waking up information and obtaining PICA server ends to PICA server ends;If PICA server ends
Return information is normal, then PICA clients include to PICA server end sending device log-on messages, the equipment log-on message
Number, type, lockhole and key binding information;Whether have in PICA received server-side equipment log-on messages and Test database
The corresponding equipment of facility information;If corresponding facility information is not recorded there are the corresponding equipment of facility information simultaneously in database
Wait for administrator's manual confirmation;If there are the corresponding equipment of facility information in database, according to the access situation of PICA and to
The return information that PICA clients are passed back through or refused;If return information passes through, PICA clients can be serviced in PICA
Device end is operated accordingly;If return information does not pass through, PICA clients cannot carry out corresponding in PICA server ends
Operation;Administrator can check PICA client states and access situation and can manual access or refusal PICA clients connect
Enter, connect Server after starting due to PICA automatically, PICA sends Wakeup information to Server, obtains the feedback letter of Server
Breath, if the Response of Server is normal, PICA is to Server sending device log-on messages(Including SN, type, lockhole and key
Spoon binding information).Consider that information chain is little, can once send all information, avoid repeatedly communicating, Server obtains PICA letters
After breath, whether there is this equipment in Test database, do not exist such as, then record these information, wait for administrator's manual confirmation, such as
In the presence of then according to the access situation of PICA, PICA being given to send and is restored:Passed or Rejected, administrator can be Server's
PICA equipment states and access situation are checked in the PICA List Management pages, administrator can manual access or refusal
The access of PICA equipment, by confirming(Access)PICA equipment can appearing on the normal use page in Server, it is no
Then cannot, due to the verification process by client, ensure that the legitimacy of client access.
Administrator can check that PICA client states and access situation simultaneously can manual access or refusal PICA clients
Access.
It is further included before the PICA clients adding method S104:
PICA client ip setting methods S105:
The IP address of PICA clients and the IP address for the server to be accessed are set.
It is further included before the PICA client ips setting method S105:
PICA smart lock initial methods S106:
PICA smart locks access;
The key stick of lockhole will be inserted into;
PICA client broadcasts initialization command gives key stick;
Lockhole reads key stick and numbers and initialization information is written lockhole;
It is further included before the PICA client ips setting method S105:
The Raspberry Pi initialization of PICA clients:
PICA system programs are written in SD card;
SD card is put into the Raspberry Pi of PICA clients;
Cable is connected to PICA clients and accesses PICA networks;
Automatically the update of PICA server ends is accessed and detected after the booting of PICA clients.
Due to using PICA smart lock initial methods:PICA smart locks access;The key stick of lockhole will be inserted into;PICA visitors
Family end broadcast initialization command gives key stick;Lockhole reads key stick and numbers and initialization information is written lockhole, the PICA
It is further included before client ip setting method:The Raspberry Pi initialization of PICA clients:PICA system programs are written in SD card;It will
SD card is put into the Raspberry Pi of PICA clients;Cable is connected to PICA clients and accesses PICA networks;PICA clients are opened
Automatically the update of PICA server ends is accessed and detected after machine, the card reader equipped with SD card is accessed computer by Raspberry Pi initialization,
Initialization is performed on computers, system ROM is written in SD card, SD card is put into Raspberry Pi, cable is connected to PICA, is accessed
Dedicated network, detection update automatically after PICA bootings(It accesses the service on Server and downloads update), lockhole initialization, give
PICA connects cable, will initialize special PP sticks and be inserted into lockhole, and perform the initialization program on PC, and initialization is sent to tree PICA
Order is broadcast to lockhole by order, PICA, and lockhole starts to read PP sticks number, and write information into lockhole, therefore, because using
Simplified initial method simplifies initialization flow.
As shown in Fig. 2, a kind of intelligent lock control application system based on personal information Communication processing system PICA, including:
RFID key takes application module and RFID key gives back application module;
The RFID key is taken application module and is used for:
RFID key takes method S101:
If selection takes at least one RFID key, unlocked successively according to the RFID key of selection number;
If selection take at least one RFID key but do not take away it is any one RFID key, if closing key door, entirely
Cancel the selection of RFID key in portion;
If selection takes at least one RFID key but only takes part RFID key, if closing key door, record is taken
Part RFID key;
The RFID key is given back application module and is used for:
RFID key gives back method S102:
If giving back at least one RFID key, key door opening and closing state is judged:
If key door is not switched on, the corresponding of key door and will be opened at key door by any one RFID key radio frequency is opened
RFID key is inserted into corresponding lockhole and locks;
It is each in remaining RFID key that RFID key is read and through radio frequency according to corresponding successively if key door has been opened
Prompting is inserted into corresponding lockhole and is locked;
If all RFID keys are locked, key door is closed.
Operation principle:
The present invention takes method by RFID key:If selection takes at least one RFID key, according to the RFID keys of selection
Spoon number unlocks successively;If selection take at least one RFID key but do not take away it is any one RFID key, if
Key door is closed, then all cancels the selection of RFID key;If selection takes at least one RFID key but only takes part
RFID key if then closing key door, records the part RFID key taken;RFID key gives back method:If it gives back at least
One RFID key, then judge key door opening and closing state:If key door is not switched on, RFID key radio frequency is beaten by any one
It opens key door and the corresponding RFID key for opening key door is inserted into corresponding lockhole and is locked;If key door has been opened,
It is each in remaining RFID key that RFID key through radio frequency is read successively and corresponding lockhole is inserted into simultaneously according to corresponding prompting
Locking;If all RFID keys are locked, key door is closed, is that keyhole is suitable according to the selection of user due to taking flow
Sequence is opened successively, and such situation is after taking first away, and second opening, user can arbitrarily change the selection of oneself, such as use
Family selects more keys, but does not take away, directly closes behind the door, user is not included at this time by means of key is taken, as user's selection is more key
Spoon, but only take part away, then at closing time, only record the key that user this time takes away, return process:PP sticks are brushed, open cabinet door, it will
PP sticks, are inserted into the lockhole that lights of indicator light, during the more stick PP, repeatedly aforesaid operations(Brush PP sticks->It is inserted into lockhole), close cabinet
Door, the present invention solve the prior art and can not mutually be merged with intelligent lock control application there are personal information Communication processing system and intelligence
The problem of managing, with realizing, personal information Communication processing system is mutually merged with intelligent lock control application and intelligence is managed
Reason, safe, legitimacy is strong, the advantageous effects of initialization process simplification.
Using technical scheme of the present invention or those skilled in the art under the inspiration of technical solution of the present invention, design
Go out similar technical solution, and reach above-mentioned technique effect, be to fall into protection scope of the present invention.