Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Lock with function of acquiring variable passwords by means of scanning functions corresponding to two-dimensional codes by mobile phones, two-dimensional code identifier and password lock power supply module

A technology of two-dimensional code and password lock, which is applied in the direction of instruments, time registers, single input port/output port registers, etc., which can solve the problems of high development cost and occupation

Active Publication Date: 2017-11-03
山东创工信息科技有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Judging from the current situation, we are faced with a dilemma. If the password remains unchanged, the provided shared equipment will be occupied free of charge; if the password is not used, but Internet management is used, it means that the initial development cost is too high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lock with function of acquiring variable passwords by means of scanning functions corresponding to two-dimensional codes by mobile phones, two-dimensional code identifier and password lock power supply module
  • Lock with function of acquiring variable passwords by means of scanning functions corresponding to two-dimensional codes by mobile phones, two-dimensional code identifier and password lock power supply module
  • Lock with function of acquiring variable passwords by means of scanning functions corresponding to two-dimensional codes by mobile phones, two-dimensional code identifier and password lock power supply module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Embodiment 1: The variable combination lock is in a locked state, and what is seen from the built-in hole (13) of the two-dimensional code is blank, and the variable combination lock is in an open state, and what is seen from the built-in hole (13) of the two-dimensional code is Black, the opening and closing state of the variable combination lock (8) can be judged through the mark in the built-in hole (13) of the two-dimensional code.

[0077] Each two-dimensional code corresponds to one of the independent functions Fn, and this function exists in the memory of the variable password lock (8), which constitutes a password change function subroutine; the exact same function Fn also exists in the management server In the function library, as long as there is the same initial value, there will be the same calculation result; after the mobile phone scans the QR code, send the QR code to the background management function library through the wireless Internet to query the cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a lock with a function of acquiring variable passwords by means of scanning functions corresponding to two-dimensional codes by mobile phones, a two-dimensional code identifier and a password lock power supply module, and belongs to the technical field of electronic information and shared locks. The lock comprises four password disks, four password knobs, the two-dimensional code identifier, two-dimensional code built-in holes, elastic push keys, keyboard conductive rubber and the like. Each two-dimensional code corresponds to the corresponding independent function Fn, the functions are stored in memories of a variable password lock (8) and function libraries of background management servers, identical operating results can be obtained as long as identical initial values are available, the two-dimensional codes can be scanned and transmitted by the mobile phones, accordingly, input passwords can be obtained, and unlocking can be carried out. The lock, the two-dimensional code identifier and the password lock power supply module have the advantages that variable password functions can be implemented; warning can be given when the passwords are continuously mistakenly inputted for more than three times; voluntary charge can be completely carried out; the two-dimensional codes of the lock can be scanned by the mobile phones, accordingly, functions of logistics nets can be implemented, the cost of the lock can be lowered to a great extent, development of early lock management programs can be reduced to a great extent, and only background management programs need to be developed.

Description

technical field [0001] The invention relates to a lock that uses a mobile phone to scan the corresponding function of a two-dimensional code to obtain a variable code, a two-dimensional code mark, and a combination lock power supply module, and belongs to the technical field of electronic information and shared locks. Background technique [0002] The bicycle locks used by OFO shared bicycles do not directly enter the Internet of Things, but realize the interaction with the network through the people who use the shared bicycles when they scan. This method can greatly reduce the initial research and development costs and the production costs of bicycle locks. , which is a very valuable business model for companies that have just entered the sharing platform, which can greatly reduce R&D costs and facilitate promotion. However, there is a serious problem in this mode that the password of the OFO lock cannot be changed. For bicycles, since the parking position of the bicycle is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/00174G07C9/00309G07C9/00817G07C2009/00484G07C2009/0065G07C2009/00825
Inventor 陈蜀乔龙文凯郭荣
Owner 山东创工信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products