Intelligent door lock control system

A control system and smart door lock technology, applied in the security field, can solve the problems of increasing operation insecurity, fragile display screen, reducing power consumption, etc., to achieve the effects of enhancing security, reducing energy consumption, and saving structure

Inactive Publication Date: 2017-03-29
SHENZHEN OURUIBO ELECTRONICS
9 Cites 9 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0005] However, the inventors of the present invention have found that: firstly, OLED screens account for more than 80% of the display screens used in commercially available electronic smart door locks, and the hardware fixed cost of OLED screens plus peripheral drive circuits exceeds RMB 30. The energy-saving and emission-reduction policies of enterprises strongly supported by the state are contrary to the policies; secondly, the display screens are made of fragile materia...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

In summary, the intelligent door lock control system 100 provided by the embodiment of the present invention receives the operation instruction sent by the user terminal 200 by setting the communication module 30, and reads the state information of the door lock through the main control module 90 and It is sent to the user terminal for display through the communication module 30, which achieves the purpose of protec...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention relates to an intelligent door lock control system. In the intelligent door lock control system, a communication module is arranged for receiving an operation instruction sent by a user terminal and a master control module is arranged for reading the state information of a door lock and sending the state information to the user terminal through the communication module and displaying, so that the purpose of protecting the door lock is achieved; a display screen need not be arranged on the door lock; a user can read the state information of the door lock at any time and any where through a terminal (such as, a mobile phone); the menu setting and the unlocking operation for the door lock can be realized through the terminal, so that the structure is saved, the safety of the door lock is greatly increased, and meanwhile, the door lock control system can reduce the energy consumption, can lower the cost and is beneficial to energy conservation and emission reduction.

Application Domain

Technology Topic

Image

  • Intelligent door lock control system
  • Intelligent door lock control system
  • Intelligent door lock control system

Examples

  • Experimental program(1)

Example Embodiment

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0020] Please refer to figure 1 and figure 2 , the first embodiment of the present invention provides a smart door lock control system 100, the smart door lock control system 100 includes a lock body (not shown), a motor drive module 20, a communication module 30, at least one acquisition module (not shown in the figure), a storage module 50 , a voice prompt module 70 , a power supply module 80 , and a main control module 90 .
[0021] like figure 1 As shown, the main control module 90 is respectively connected with the motor drive module 20, the communication module 30, the acquisition module, the storage module 50, and the voice prompt module 70, and it is the control center of the entire system 100, responsible for the various functions The information collected by the module is processed, calculated, and its output is controlled. During implementation, each module can use the mature UART, SPI, and IIC analog communication interfaces between chips for information interaction and transmission.
[0022] In this embodiment, the lock body is coupled with a motor drive module 20, and the motor drive module 20 is used to drive the lock body (or lock tongue) to move so that the door lock is in a closed or open state. Hereinafter, the door lock refers to the overall functional module including the lock body, the motor drive module 20, the communication module 30, the acquisition module, the storage module 50, the sound prompt module 70, the power supply module 80, and the main control module 90 (the hardware structure is located at the same on one subject).
[0023] The communication module 30 communicates with the user terminal 200 by means of wireless communication (see figure 2 ), the user terminal 200 may be a portable mobile device such as a mobile phone or a tablet. In this embodiment, the user terminal 200 is a smart phone, which installs an exclusive application program (Application, figure 2 The mobile phone interface 30A) corresponding to the application program is shown in . In other modified implementation manners, the application program may also be an instant messaging tool, etc., and is not limited to the specific embodiment.
[0024] In this embodiment, the at least one collection module includes a plurality, specifically including a fingerprint collection module 40 , a button collection module 41 , and a radio frequency signal reading and writing card module 42 . It can be understood that, in other modified implementation manners, the at least one collection module may also only include any one or both of the fingerprint collection module 40 , key collection module 41 , and radio frequency signal reader/writer module 42 .
[0025] The fingerprint collection module 40 is used to collect the fingerprint information of the user as verification information for fingerprint unlocking. Specifically, the fingerprint collection module 40 includes a fingerprint sensor and a DSP (Digital Signal Process, digital signal processing) chip, etc. During use, the fingerprint sensor sends the collected image feature point information to the fingerprint collection algorithm DSP chip, and the DSP chip passes through The high-speed and high-efficiency algorithm filters the image feature point information, calculates and compares it, and stores it in the storage module 50 . The storage module 50 can be, for example, a FLASH storage chip, or a random access memory (random access memory, RAM), etc., and is not limited to the specific embodiment.
[0026] The key collection module 41 is used to collect key information set by the user. The radio frequency signal read/write card module 42 is used to read the radio frequency signal information of the corresponding IC card and write it into the storage module 50 . When using this IC card to unlock next time, the radio frequency signal information of the IC card can be read by the card reader module 42, and carry out the unlocking operation after matching with the storage information (such as operation instruction information) in the storage module 50, such as information If they do not match, the unlocking operation will not be performed.
[0027] When in use, the communication module 30 is connected with the user terminal 200 through wireless communication, and receives operation instructions (such as various query requests or control information) sent by the user terminal 200 . Specifically, the communication methods adopted by the communication module 30 and the user terminal 200 include wifi, bluetooth, zigbee, RF433, infrared, sound wave, light wave, radio frequency communication (2.4G) and so on.
[0028] (1) In one of the implementations, the communication module 30 and the terminal 200 are respectively provided with Bluetooth modules, which can realize short-distance communication through Bluetooth between them; Gateway and routing, and connected through server transit;
[0029] (2) In another embodiment, the communication module 30 is provided with a WIFI module, in this case, a route can be set, and the connection terminal 200 can be transferred through the server;
[0030] (3) In yet another embodiment, the communication module 30 is provided with a zigbee module, which can be provided with a host (gateway) and routing, and is connected to the terminal 200 via a server. Wherein, the host includes a zigbee module and a TCP/IP module, and the communication module 30 is connected with the host through the zigbee module, and realizes protocol conversion.
[0031]In the above embodiments, the function of the gateway is to perform protocol conversion. For example, the commonly used protocol is IEEE 802.11 wifi. When the underlying wireless communication protocol uses IEEE 802.15.4 zigbee or Z-WAVE, etc., the protocol conversion is performed through the gateway, that is, the zigbee or Z-WAVE protocol is converted to wifi protocol. On the other hand, if the wifi protocol is adopted between the two, the gateway may not be set.
[0032] The routing is used to exchange the information of the gateway or the information of the wifi protocol with the server through the TCP/IP protocol. The server is used to receive the operation instruction of the user terminal 200, transmit the operation instruction to the gateway, feed back the status information of the door lock to the user terminal 200, and store relevant data at the same time.
[0033] In one use case, such as figure 2 As shown, the communication module 30 receives the operation instruction sent by the user through the terminal 200, the operation instruction allows one of multiple unlocking methods to unlock, and the above multiple unlocking methods correspond to multiple verification information entered by the user. In this embodiment, the unlocking methods include fingerprint unlocking, button unlocking, and radio frequency unlocking. In other modified implementations, the unlocking methods can also be other methods, such as voice unlocking, etc., and are not limited to specific embodiments.
[0034] Specifically, fingerprint unlocking refers to starting the unlocking action by identifying the fingerprint, and the verification information corresponding to the fingerprint unlocking is the fingerprint information of the user's finger; key unlocking refers to starting the unlocking action by identifying the key, and the verification information corresponding to the key unlocking is set by the user. Key sequence; radio frequency unlocking refers to starting the unlocking action by identifying radio frequency signals, and the verification information corresponding to radio frequency unlocking is the radio frequency signal in the IC (Integrated Circuit Card, integrated circuit card) card used by the user.
[0035] The unlocking method includes any one or a combination of the above-mentioned fingerprint unlocking, button unlocking, and radio frequency unlocking, that is, the user can unlock the lock by any one of fingerprints, buttons, and radio frequency, or in a combination way, for example Verify the fingerprint first, and then verify the button (or the reverse order); or verify the button first, and then verify the radio frequency signal (or the reverse order); or verify the fingerprint first, and then verify the radio frequency signal (or the reverse order); or verify first Fingerprint, then verify the key, and then verify the radio frequency signal (or the reverse order) to unlock the lock, depending on the user's preference and safe use needs.
[0036] After the main control module 90 receives the operation instruction, it verifies whether the current unlocking mode and the verification information extracted by the acquisition module are consistent with the verification information of the storage module 50 . It can be understood that, in other modified embodiments, the storage module 50 may not store the verification information. At this time, the verification information may be stored in a server (not shown in the figure). During the unlocking process, the main control module 90 sends the verification result to the server through the communication module 30, and compares it with the verification information stored in the server to verify whether the requirements set by the user are met, and perform or not perform the unlocking operation accordingly. In other modified embodiments, the storage module 50 also stores other system design information (sound, operation language) of the door lock, etc. in addition to the verification information.
[0037] Please refer to figure 1 and Figure 4 , in this embodiment, the protection system 100 (door lock part) may further include an information recording module 98, which is used to store door opening record information, etc., so that user operations, such as door opening history records, can be remotely accessed through the communication module 30 Push to the user terminal 200, so that the user understands the historical use modality of the door lock in real time, such as Figure 4 As shown, the user can query the unlocking records of the past day.
[0038] In other modified implementation manners, the information recording module 98 may also be set in the user terminal 200 instead of in the door lock. In other further modified implementations, the information recording module 98 may be integrated in the storage module 50, that is, the storage module 50 simultaneously stores the verification information and historical unlocking records of the door lock.
[0039] The voice prompt module 70 is used to prompt the user to perform an operation, for example, to prompt the user to enter a fingerprint, or perform a card swiping operation, or perform a button operation, etc., which may specifically be a buzzer or a low-power speaker. In other modified implementation manners, an alarm is issued when the current verification information does not match the verification information of the storage module. For example, the current user is a criminal who uses counterfeit fingerprint information to perform the unlocking operation, and is recognized by the main control module 90 at this time, and the voice prompt module 70 immediately sends out an alarm. It can be understood that, as an alternative embodiment, the sound prompt module 70 can also be replaced by vibration, emitting light beams and other means, or is not limited to these means or means. In addition, in practical applications, the sound prompt module 70 may further include an efficiency amplifier for amplifying the sound signal.
[0040] The power supply module 80 is used for the main control module 90, the motor drive module 20, the communication module 30, the fingerprint collection module 40, the button collection module 41, the radio frequency signal reading and writing card module 42, the storage module 50, and the voice prompt module 70 Wait for each module to supply power. Specifically, the power supply module 80 is responsible for the power input, management, and monitoring of the entire lock. It steps down the input DC6V or DC9V to DC6V and DC3.3V to supply power to each module, and monitors the system voltage in real time. If the power supply voltage is lower than the set voltage, the power supply module 80 actively outputs a monitoring signal to the main control module 90 to inform the system that the energy of the power supply battery pack is exhausted, and the battery needs to be replaced in time. On the other hand, the power supply module 80 can also monitor and protect the system overload and short circuit in real time.
[0041] In this embodiment, the protection system 100 does not include the user terminal 200 . In other modified implementation manners, the protection system 100 may also include the user terminal 200 , that is, the user terminal 200 is a functional terminal in the protection system 100 .
[0042] As mentioned above, the user terminal 200 can be a tablet computer, a portable electronic device, a reader, etc. In this embodiment, the user terminal 200 is a smart phone, which includes a display screen 95 (see figure 2 ), the display screen 95 can be, for example, an organic laser display screen (OLED), which is used to display various types of information in the user's unlocking or input information. It can be understood that the display screen 95 can also be a liquid crystal display screen, etc., are not limited to specific embodiments.
[0043] When in use, the door lock and the user terminal 200 realize information interaction directly through wireless connection or through server forwarding, and the prompt for door lock operation is displayed by the display screen 95 of the mobile terminal 200, but the door lock itself does not have a display screen.
[0044] In one of the implementations, the user uses the protection system 100 (door lock) to perform fingerprint or card swiping or password unlocking, such as image 3 As shown, when the user clicks on the fingerprint to unlock, the user terminal 200 sends an operation command to the door lock, and the voice prompt module 70 gives a voice prompt, such as a human voice prompt "Please place your finger in the identification area", or "Please enter the password ", or "Please place the IC card in the identification area", when the user's fingerprint is collected, or the information of the IC card is read, or the password input is received and matches the verification information, the main control The module 90 controls the motor drive module 20 to drive the lock body to perform the unlocking operation, otherwise the voice prompt module 70 can issue a prompt "the password input is incorrect", "the fingerprint cannot be recognized, please re-verify", "the fingerprint cannot be recognized, please re-verify", etc., To guide the user to correct the error. It can be understood that when the unlocking is successful, the main control module 90 can send the unlocking success information to the user terminal 200 or the server through the communication module 30 for recording, and the user terminal 200 can also display "Congratulations, the unlocking is successful" etc. Prompt that the operation is successful, such as Figure 5 shown.
[0045] In another embodiment, the fingerprint collection module 40 and the button collection module 41 may not be arranged at the door lock end, but are arranged on the user terminal 200, or the user terminal 200 may have the fingerprint collection module 40 and the button collection module 41. Similar functional modules can directly read the user's fingerprint information (see Image 6 ), or display the password input area ( Figure 7 ), and send it to the door lock, the main control module 90 verifies whether it is correct, and performs/or does not perform the unlocking operation.
[0046] In yet another implementation, the user terminal 200 can read the status of the door lock in real time, such as Figure 8 As shown, the user terminal 200 reads that the current state of the door lock is an open state.
[0047] In other further modified implementation manners, the user can also edit the menu page and control page of the exclusive application program on the terminal 200 . For example, the user can perform basic settings on the door lock through the menu page on the terminal 200, including the setting of the unlocking method (such as only allowing unlocking through fingerprint recognition), etc. When multiple people need to jointly control the smart door lock, each user terminal 200 can download a dedicated application program (APP) and associate with it, that is, it can be set to realize the control of the door lock. On the other hand, in order to ensure the stability of the remote operation of the door lock and avoid conflicts in the menu settings of multiple people at the same time, the special application program should support the authority control of multiple people, setting one person as the master authority, and others as the slave authority , only the person with the master authority can make menu settings or authorize others to make menu settings, and other people can only use the unlock function or request the master authority to authorize the menu settings.
[0048] To sum up, the intelligent door lock control system 100 provided by the embodiment of the present invention receives the operation instructions sent by the user terminal 200 by setting the communication module 30, and reads the state information of the door lock through the main control module 90 and transmits it through communication. The module 30 is sent to the user terminal for display, which achieves the purpose of protecting the door lock, so that the door lock can not be provided with a display screen, and the user can read the status information of the door lock anytime and anywhere through the terminal (such as a mobile phone) 200, and The door lock can be operated through the terminal 200, so that on the one hand, the structure is saved, and the security of the door lock is greatly enhanced; on the other hand, the door lock control system 100 can reduce energy consumption and cost, and is beneficial to energy saving and emission reduction.
[0049] Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present invention, rather than to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it can still be Modifications are made to the technical solutions described in the foregoing embodiments, or equivalent replacements are made to some of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the various embodiments of the present invention.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

High-speed maglev bridge large-displacement telescopic device

ActiveCN112482210ASmall structureLarge longitudinal displacement expansion and contractionRailway tracksBridge structural detailsFastenerTrackway
Owner:CHINA RAILWAY MAGLEV TRANSPORTATION INVESTMENT CONSTR CO LTD +1

Classification and recommendation of technical efficacy words

  • Improve security
  • Small structure

Method and system for powerline networking

InactiveUS20060018328A1Improve securityEasy to changeBroadband local area networksBroadcast transmission systemsComputer network
Owner:COMCAST CABLE COMM LLC

Single fiber bundle probe differential pressure sensor

ActiveCN105021343ASmall structureHigh precisionPressure difference measurement between multiple valvesPhysicsPhotovoltaic detectors
Owner:DONGXING HUAHONG OPTICAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products