CN111599070A - Composite networking door lock control method - Google Patents
Composite networking door lock control method Download PDFInfo
- Publication number
- CN111599070A CN111599070A CN202010352113.3A CN202010352113A CN111599070A CN 111599070 A CN111599070 A CN 111599070A CN 202010352113 A CN202010352113 A CN 202010352113A CN 111599070 A CN111599070 A CN 111599070A
- Authority
- CN
- China
- Prior art keywords
- entrance guard
- information
- lock
- user
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a composite networking door lock control method, which comprises the following steps: generating user characteristic information; correspondingly generating a group of identification codes for each group of user characteristic information, inputting the biological characteristics of the users into the master controller, and combining the biological characteristics of the users with the identification codes to form access control identification information; then, the ID number in the entrance guard identification information is separated through the identity identification and is compared with the ID number of the entrance guard identification information, and if the ID numbers are matched with the same ID number, the biological characteristics of the user in the entrance guard identification information are stored in an entrance guard lock database; when the entrance guard lock is required to be opened, the user inputs the biological information of the user at the entrance guard lock, and if the identification comparison information is the same, the entrance guard lock is opened. The invention has the advantages of simple principle, high safety and low energy consumption, and is mainly used for controlling the door lock.
Description
Technical Field
The invention relates to the technical field of intelligent door locks, in particular to a composite networking door lock control method.
Background
With the rapid development of the IOT industry, products of the Internet of things are gradually popularized, particularly, intelligent door locks are developed, the existing intelligent door locks replace traditional keys to open doors through fingerprint identification, card swiping identification and face identification, even the existing intelligent door locks can be connected with the Internet of things to carry out remote control on the intelligent locks, but when the existing intelligent locks connected with the Internet of things carry out information transmission, information is not encrypted, the existing intelligent locks are easy to be attacked by hackers to steal information of the intelligent locks, and the safety is low.
Disclosure of Invention
The invention aims to solve the technical problem of providing a composite networking door lock control method, so that the intelligent door lock has the advantages of simple principle, high safety and low energy consumption.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a composite networking lock control method, comprising:
the main controller is used for managing and controlling the general door lock;
the entrance guard lock is used for identifying entrance and exit information and unlocking and locking a door;
the antenna expansion module is used for connecting the access control lock and the master controller and transmitting information between the access control lock and the master controller, and the method comprises the following steps:
the method comprises the following steps: installing identity marks in all the entrance guard locks, wherein the ID numbers in all the identity marks are different, then inputting the user information and the doorplate number of the door corresponding to each group of entrance guard locks and the ID number of the identity mark in the entrance guard lock into the master controller, and correspondingly generating user characteristic information;
step two: correspondingly generating a group of identification codes for each group of user characteristic information, encrypting the identification codes by an encryption module in the access control lock, then wirelessly transmitting the encrypted identification codes to an antenna expansion module, transmitting the encrypted identification codes to a main controller by the antenna expansion module, and decrypting and pre-storing the encrypted identification codes by the main controller;
step three: inputting the biological characteristics of the user into the master controller, combining the biological characteristics of the user with the identification code generated by the corresponding user characteristic information to form entrance guard identification information, encrypting the entrance guard identification information and storing the encrypted entrance guard identification information in big data;
step four: the main controller sends the encrypted entrance guard identification information to the antenna expansion module through the CAN bus, the antenna expansion module sends the entrance guard identification information in a wireless signal mode, the entrance guard lock decrypts the encrypted entrance guard identification information, then the ID number in the entrance guard identification information is separated through the identity and compared with the ID number of the entrance guard lock, and if the ID numbers are matched with the same, the biological characteristics of a user in the entrance guard identification information are stored in an entrance guard lock database;
step five: when the entrance guard lock needs to be opened, the user inputs own biological information at the entrance guard lock, the entrance guard lock calls the biological characteristics of the user in the database and carries out identification and comparison with the input biological information, if the identification and comparison information is the same, the entrance guard lock is opened, if the identification and comparison information is different, the biological information is sent to the alarm system and the antenna expansion module, the biological information is uploaded to the main controller through the antenna expansion module, the main controller carries out blacklist data matching on the biological information, and the display device is informed to highlight the biological information.
The user information comprises at least two of user name, user gender, user age, user contact information, user identity number and user photo.
The house number is formed by combining a building number, a floor number and a door room number corresponding to the house door.
Every group the antenna expansion module corresponds and is connected with several groups of adjacent entrance guard locks, and through low consumption 2.4G network connection, specific connection mode is in wiFi connection, bluetooth connection, zigBee connection between antenna expansion module and the entrance guard lock.
The main controller is provided with a CAN bus interface, each group of the antenna extension modules is provided with a high-speed CAN bus interface, and the CAN bus interface of the main controller is connected with the high-speed CAN bus interface of the antenna extension module to transmit data.
The encryption algorithm of the access control lock and the master controller is a HASH encryption algorithm.
The user biological characteristics and biological information comprise one or more of fingerprint information, face information, access card information and password digital information.
The alarm system comprises a security system and/or a public security system.
The invention has the beneficial effects that:
1. the method has simple working principle and high safety, and can effectively prevent the leakage of user information and the password of the access lock;
2. the method comprises the entrance guard lock, the main controller and the antenna expansion module, wherein the main controller is in wired connection with the antenna expansion module through a CAN + bus, and the antenna expansion module is in wireless real-time communication with the entrance guard lock through a unique low-power-consumption 2.4g protocol of a palm door physical association, so that the power consumption of the entrance guard lock CAN be effectively reduced, and the cruising ability of a battery in the entrance guard lock CAN be effectively improved
3. The alarm system can alarm abnormal information input, illegal invasion and the like, is convenient for monitoring personnel to remove in time, and has a fire-fighting linkage function.
Drawings
FIG. 1 is a schematic diagram of the first to fourth steps of the present invention;
FIG. 2 is a schematic structural diagram of step five of the present invention.
Detailed Description
The following further describes embodiments of the present invention with reference to the drawings. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example one
Referring to fig. 1-2, a method for controlling a composite networking door lock includes:
the main controller is used for managing and controlling the general door lock;
the entrance guard lock is used for identifying entrance and exit information and unlocking and locking a door;
the antenna expansion module is used for connecting the access control lock and the master controller and transmitting information between the access control lock and the master controller, and the method comprises the following steps:
the method comprises the following steps: installing identity marks in all the entrance guard locks, wherein the ID numbers in all the identity marks are different, then inputting the user information and the doorplate number of the door corresponding to each group of entrance guard locks and the ID number of the identity mark in the entrance guard lock into the master controller, and correspondingly generating user characteristic information;
step two: correspondingly generating a group of identification codes for each group of user characteristic information, encrypting the identification codes by an encryption module in the access control lock, then wirelessly transmitting the encrypted identification codes to an antenna expansion module, transmitting the encrypted identification codes to a main controller by the antenna expansion module, and decrypting and pre-storing the encrypted identification codes by the main controller;
step three: inputting the biological characteristics of the user into the master controller, combining the biological characteristics of the user with the identification code generated by the corresponding user characteristic information to form entrance guard identification information, encrypting the entrance guard identification information and storing the encrypted entrance guard identification information in big data;
step four: the main controller sends the encrypted entrance guard identification information to the antenna expansion module through the CAN bus, the antenna expansion module sends the entrance guard identification information in a wireless signal mode, the entrance guard lock decrypts the encrypted entrance guard identification information, then the ID number in the entrance guard identification information is separated through the identity and compared with the ID number of the entrance guard lock, and if the ID numbers are matched with the same, the biological characteristics of a user in the entrance guard identification information are stored in an entrance guard lock database;
step five: when the entrance guard lock needs to be opened, the user inputs own biological information at the entrance guard lock, the entrance guard lock calls the biological characteristics of the user in the database and carries out identification and comparison with the input biological information, if the identification and comparison information is the same, the entrance guard lock is opened, if the identification and comparison information is different, the biological information is sent to the alarm system and the antenna expansion module, the biological information is uploaded to the main controller through the antenna expansion module, the main controller carries out blacklist data matching on the biological information, and the display device is informed to highlight the biological information.
Example two
In the method, the user information comprises at least two of user name, user gender, user age, user contact information, user identity number and user photo.
The house number is composed of building number, floor number and door number.
Every group antenna expansion module corresponds and is connected with several groups of adjacent entrance guard locks, through low consumption 2.4G network connection between antenna expansion module and the entrance guard lock, and concrete connection mode is in wiFi connection, bluetooth connection, zigBee connection.
The main controller is provided with a CAN bus interface, each group of antenna extension modules is provided with a high-speed CAN bus interface, and the CAN bus interface of the main controller is connected with the high-speed CAN bus interface of the antenna extension modules to transmit data.
The encryption algorithm of the access lock and the master controller is a HASH encryption algorithm.
The user biological characteristics and biological information comprise one or more of fingerprint information, face information, access card information and password digital information.
The alarm system comprises a security system and/or a public security system.
EXAMPLE III
The method of the invention also comprises a method for controlling the door lock of the entrance guard
The method comprises the following steps: installing identity marks in entrance guard locks where a building and a gate are located, wherein ID numbers in all the identity marks are different, then inputting building number information of a door corresponding to each group of entrance guard locks and the ID numbers of the identity marks in the entrance guard locks into a main controller, and correspondingly generating entrance guard door information;
step two: correspondingly generating a group of identification codes for each group of entrance guard door information, encrypting the identification codes by an encryption module in the entrance guard lock, then wirelessly transmitting the encrypted identification codes to an antenna expansion module, transmitting the encrypted identification codes to a master controller by the antenna expansion module, and decrypting and pre-storing the encrypted identification codes by the master controller;
step three: entering entrance guard information into the master controller, combining the entrance guard information with an identification code generated by corresponding entrance guard room information to form entrance guard identification information, encrypting the entrance guard identification information and storing the encrypted entrance guard identification information into big data;
step four: the main controller sends the encrypted entrance guard identification information to the antenna expansion module through the CAN bus, the antenna expansion module sends the entrance guard identification information in a wireless signal mode, the entrance guard lock decrypts the encrypted entrance guard identification information, then the ID number in the entrance guard identification information is separated through the identity and compared with the ID number of the entrance guard lock, and if the ID numbers are matched with the same number, entrance guard information in the entrance guard identification information is stored in an entrance guard lock database;
step five: when the entrance guard lock is opened to needs, the entrance guard is through at entrance guard lock input biological information, entrance guard's information in the entrance guard lock transfer database and with the biological information of input discernment contrast, if discernment contrast information is the same, then open the entrance guard lock, if discernment contrast information is inequality, then send this biological information alarm system and antenna expansion module, reach the master controller on uploading this biological information through antenna expansion module, the master controller carries out blacklist data matching to this biological information, and inform display device salient this biological information.
Example four
The invention has the beneficial effects that:
1. the method has simple working principle and high safety, and can effectively prevent the leakage of user information and the password of the access lock;
2. the method comprises the entrance guard lock, the main controller and the antenna expansion module, wherein the main controller is in wired connection with the antenna expansion module through a CAN + bus, and the antenna expansion module is in wireless real-time communication with the entrance guard lock through a unique low-power-consumption 2.4g protocol of a palm door physical association, so that the power consumption of the entrance guard lock CAN be effectively reduced, and the cruising ability of a battery in the entrance guard lock CAN be effectively improved
3. The alarm system can alarm abnormal information input, illegal invasion and the like, is convenient for monitoring personnel to remove in time, and has a fire-fighting linkage function.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the described embodiments. It will be apparent to those skilled in the art that various changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, and the scope of protection is still within the scope of the invention.
Claims (8)
1. A composite networking door lock control method is characterized by comprising the following steps:
the main controller is used for managing and controlling the general door lock;
the entrance guard lock is used for identifying entrance and exit information and unlocking and locking a door;
the antenna expansion module is used for connecting the access control lock and the master controller and transmitting information between the access control lock and the master controller, and is characterized by comprising the following steps:
the method comprises the following steps: installing identity marks in all the entrance guard locks, wherein the ID numbers in all the identity marks are different, then inputting the user information and the doorplate number of the door corresponding to each group of entrance guard locks and the ID number of the identity mark in the entrance guard lock into the master controller, and correspondingly generating user characteristic information;
step two: correspondingly generating a group of identification codes for each group of user characteristic information, encrypting the identification codes by an encryption module in the access control lock, then wirelessly transmitting the encrypted identification codes to an antenna expansion module, transmitting the encrypted identification codes to a main controller by the antenna expansion module, and decrypting and pre-storing the encrypted identification codes by the main controller;
step three: inputting the biological characteristics of the user into the master controller, combining the biological characteristics of the user with the identification code generated by the corresponding user characteristic information to form entrance guard identification information, encrypting the entrance guard identification information and storing the encrypted entrance guard identification information in big data;
step four: the main controller sends the encrypted entrance guard identification information to the antenna expansion module through the CAN bus, the antenna expansion module sends the entrance guard identification information in a wireless signal mode, the entrance guard lock decrypts the encrypted entrance guard identification information, then the ID number in the entrance guard identification information is separated through the identity and compared with the ID number of the entrance guard lock, and if the ID numbers are matched with the same, the biological characteristics of a user in the entrance guard identification information are stored in an entrance guard lock database;
step five: when the entrance guard lock needs to be opened, the user inputs own biological information at the entrance guard lock, the entrance guard lock calls the biological characteristics of the user in the database and carries out identification and comparison with the input biological information, if the identification and comparison information is the same, the entrance guard lock is opened, if the identification and comparison information is different, the biological information is sent to the alarm system and the antenna expansion module, the biological information is uploaded to the main controller through the antenna expansion module, the main controller carries out blacklist data matching on the biological information, and the display device is informed to highlight the biological information.
2. The composite networking lock control method according to claim 1, wherein: the user information comprises at least two of user name, user gender, user age, user contact information, user identity number and user photo.
3. The composite networking lock control method according to claim 1, wherein: the house number is formed by combining a building number, a floor number and a door room number corresponding to the house door.
4. The composite networking lock control method according to claim 1, wherein: every group the antenna expansion module corresponds and is connected with several groups of adjacent entrance guard locks, and through low consumption 2.4G network connection, specific connection mode is in wiFi connection, bluetooth connection, zigBee connection between antenna expansion module and the entrance guard lock.
5. The composite networking lock control method according to claim 1, wherein: the main controller is provided with a CAN bus interface, each group of the antenna extension modules is provided with a high-speed CAN bus interface, and the CAN bus interface of the main controller is connected with the high-speed CAN bus interface of the antenna extension module to transmit data.
6. The composite networking lock control method according to claim 1, wherein: the encryption algorithm of the access control lock and the master controller is a HASH encryption algorithm.
7. The composite networking lock control method according to claim 1, wherein: the user biological characteristics and biological information comprise one or more of fingerprint information, face information, access card information and password digital information.
8. The composite networking lock control method according to claim 1, wherein: the alarm system comprises a security system and/or a public security system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010352113.3A CN111599070A (en) | 2020-04-28 | 2020-04-28 | Composite networking door lock control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010352113.3A CN111599070A (en) | 2020-04-28 | 2020-04-28 | Composite networking door lock control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111599070A true CN111599070A (en) | 2020-08-28 |
Family
ID=72187709
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010352113.3A Pending CN111599070A (en) | 2020-04-28 | 2020-04-28 | Composite networking door lock control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111599070A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100060414A1 (en) * | 2006-07-07 | 2010-03-11 | Doo Man Im | Electric door lock device |
CN101833802A (en) * | 2010-04-02 | 2010-09-15 | 杭州英杰电子有限公司 | Large real-time wireless networking door control system powered by dry battery |
CN201622628U (en) * | 2010-03-10 | 2010-11-03 | 初昊阳 | Biological identification-compatible access control equipment |
CN203276380U (en) * | 2013-04-23 | 2013-11-06 | 江苏富士通通信技术有限公司 | Distributed door access authentication system based on palm veins |
CN105631987A (en) * | 2015-02-12 | 2016-06-01 | 北京神器科技有限公司 | Bluetooth access control unlocking method, device and system |
-
2020
- 2020-04-28 CN CN202010352113.3A patent/CN111599070A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100060414A1 (en) * | 2006-07-07 | 2010-03-11 | Doo Man Im | Electric door lock device |
CN201622628U (en) * | 2010-03-10 | 2010-11-03 | 初昊阳 | Biological identification-compatible access control equipment |
CN101833802A (en) * | 2010-04-02 | 2010-09-15 | 杭州英杰电子有限公司 | Large real-time wireless networking door control system powered by dry battery |
CN203276380U (en) * | 2013-04-23 | 2013-11-06 | 江苏富士通通信技术有限公司 | Distributed door access authentication system based on palm veins |
CN105631987A (en) * | 2015-02-12 | 2016-06-01 | 北京神器科技有限公司 | Bluetooth access control unlocking method, device and system |
Non-Patent Citations (1)
Title |
---|
邓春红: "《网络安全原理与实务》", 30 June 2014, 北京理工大学出版社 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105118127B (en) | A kind of guest system and control method thereof | |
EP2348490B1 (en) | Access control system | |
KR100943683B1 (en) | Method for ensuring data transmission security, communication system and communication device | |
CN104167029A (en) | Intelligent lock and operation method thereof | |
CN104050742A (en) | Intelligent door and control method and system thereof | |
CN104052817A (en) | Intelligent door and intelligent door control method and system | |
CN104282061B (en) | Unlocking method for safety intelligent lock system | |
CN104282058B (en) | The method for unlocking of the safety intelligent lock system of band video monitoring based on bluetooth | |
CN101333892B (en) | Safety processing method of RFID system for door lock | |
US10984620B2 (en) | Access control device, access control system and access control method using the same | |
CN104299300B (en) | The unblanking and close locking method of safety intelligent lock system based on NFC | |
CN107989514A (en) | There is the safety box of dynamic password | |
CN105261100A (en) | Entrance guard unlocking method and system | |
CN109035515A (en) | The control method and door-locking system of smart lock | |
CN109300201A (en) | A kind of intelligent and safe lock and its encryption system and encryption method | |
CN103996233A (en) | Fingerprint machine cabinet lock based on bluetooth and control method | |
CN109166216A (en) | A kind of control method and device of smart bluetooth door lock | |
WO2016036070A1 (en) | Reverse trace-preventing wireless recognition secure entry method and secure entry system using same | |
CN106875532B (en) | A kind of intelligent door lock and control equipment and system and remotely control method for unlocking | |
CN104282059A (en) | Bluetooth-based safety intelligent lock system with video monitoring function and unlocking and locking methods | |
CN112037383B (en) | Intelligent door lock and authority judgment method and application system thereof | |
CN111599070A (en) | Composite networking door lock control method | |
CN113593088A (en) | Intelligent unlocking method, intelligent lock, mobile terminal and server | |
CN210864848U (en) | Bluetooth intelligent lock device and system of electronic box | |
JP4117520B2 (en) | Electronic lock control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200828 |