Security box management and control system as well as management and control method
A management and control system and security technology, which is applied in the application of safes, locks, building locks, etc., can solve the problems of unsafe control of security boxes, achieve the effects of convenient management and control, simple structure, and improved security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] The safety box management and control system of this embodiment is as follows: figure 1 As shown, it includes: upper management terminal, handset, safe box and password input device.
[0044] The upper management terminal mainly includes a computer and upper management software running on the computer, which may also include a data storage server. The data storage server is used to store data, and it conducts two-way communication with the upper management terminal. The upper management terminal can obtain the required data from the data storage server, and can also transmit the data to the data storage server for storage. The data storage server is generally a dedicated server computer; for relatively small financial institutions, the data storage server can also share a computer host with the upper management terminal. It can also be considered that the upper-layer management terminal has a database associated with the upper-layer management software, and the databa...
Embodiment 2
[0079] The difference between this specific embodiment and the first embodiment is that the computer lock of the security box also includes a backup system. Because the security box may often encounter falling and falling situations during on-site operation, the computer lock can also be opened through the backup system in the case of failure to open the box normally, so as to ensure that the use will not be seriously affected, and the reliability of the computer lock and the security box will be improved. .
[0080] The functional block diagram of the backup system is as follows: Figure 5 As shown, it includes: computer lock backup processor, second lock pin drive unit and computer lock backup interface. The spare interface of the computer lock is used to connect with the spare interface on the hand-held device, receive forced unlocking data and obtain power supply from the hand-held device.
[0081] Of course, before the upper-level management terminal needs to send the f...
Embodiment 3
[0083] Such as Image 6 As shown, the difference between this embodiment and Embodiment 1 and Embodiment 2 is that a radio frequency reader is also included. The principle of radio frequency reader is as follows: Figure 7 As shown, its core is a microprocessor. In order to show the difference, it is called a radio frequency reader processor here. In addition, it also includes a wireless transmission module, a storage unit, a clock circuit and a power supply electrically connected to it. This section In order to distinguish them, they are referred to as the first wireless transmission module of the RF reader, the storage unit of the RF reader, the clock circuit of the RF reader, and the power supply of the RF reader. In addition, the radio frequency reader in this specific embodiment also includes a 485 bus, which is used to connect multiple radio frequency readers in series and electrically connect with the upper management terminal. The first wireless transmission module o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 