An Electronic Lock Based on Remote Server
A remote server and electronic lock technology, applied in the field of electronic locks, can solve the problems of inconvenient use and low safety performance of electronic locks, and achieve the effects of improving convenience and safety, enhancing safety performance, and improving convenience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] like Figure 1 ~ Figure 3 As shown, this embodiment provides an electronic lock based on a remote server. The electronic lock includes: an electronic lock terminal 1, including a first controller 11, a first wireless communication module, a drive motor 12, and a mechanical lock 13. The first wireless communication module and the driving motor 12 are connected to the first controller 11, the mechanical lock 13 is connected to the driving motor 12; and the electronic key terminal 2 includes the second controller 21 and the second wireless communication module , and a subscriber identification module, the second wireless communication module and the subscriber identification module are connected to the second controller 21 . The remote server 3 is wirelessly connected to the electronic lock terminal 1 and the electronic key terminal 2; the first controller 11 has a built-in key memory for storing the unlock key set by the user, and the user identification module is used fo...
Embodiment 2
[0062] like figure 1 , 2 and Figure 4 As shown, this embodiment provides an electronic lock based on a remote server, its basic structure and operation are as in Embodiment 1, wherein, in this embodiment, the user identification module is a fingerprint identification module 24, which is used to pass the fingerprint sensor The user's fingerprint is collected.
Embodiment 3
[0064] like figure 1 , 2 and Figure 5 As shown, this embodiment provides an electronic lock based on a remote server, and its basic structure and operation are as in Embodiment 1, wherein, in this embodiment, the user identification module is a voice recognition module 25, which is used to identify the lock through a microphone. The user's voice is collected.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


