A lock, a two-dimensional code identification, and a password lock power supply module that uses a mobile phone to scan a two-dimensional code corresponding function to obtain a variable password

A technology of two-dimensional code and combination lock, which is applied in the field of electronic information and shared locks, and can solve the problems of occupation and high development cost

Active Publication Date: 2021-07-06
山东创工信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Judging from the current situation, we are faced with a dilemma. If the password remains unchanged, the provided shared equipment will be occupied free of charge; if the password is not used, but Internet management is used, it means that the initial development cost is too high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lock, a two-dimensional code identification, and a password lock power supply module that uses a mobile phone to scan a two-dimensional code corresponding function to obtain a variable password
  • A lock, a two-dimensional code identification, and a password lock power supply module that uses a mobile phone to scan a two-dimensional code corresponding function to obtain a variable password
  • A lock, a two-dimensional code identification, and a password lock power supply module that uses a mobile phone to scan a two-dimensional code corresponding function to obtain a variable password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Embodiment 1: The variable combination lock is in a locked state, and what is seen from the built-in hole (13) of the two-dimensional code is blank, and the variable combination lock is in an open state, and what is seen from the built-in hole (13) of the two-dimensional code is Black, the opening and closing state of the variable combination lock (8) can be judged through the mark in the built-in hole (13) of the two-dimensional code.

[0077] Each two-dimensional code corresponds to one of the independent functions Fn, and this function exists in the memory of the variable password lock (8), which constitutes a password change function subroutine; the exact same function Fn also exists in the management server In the function library, as long as there is the same initial value, there will be the same calculation result; after the mobile phone scans the QR code, send the QR code to the background management function library through the wireless Internet to query the cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a lock that uses a mobile phone to scan the corresponding function of a two-dimensional code to obtain a variable code, a two-dimensional code mark, and a combination lock power supply module, and belongs to the technical field of electronic information and shared locks. The present invention consists of 4 cipher disks, 4 cipher knobs, two-dimensional code signs, two-dimensional code built-in holes, elastic pressing keys, keyboard conductive rubber, etc.; each two-dimensional code corresponds to an independent function Fn, and this function exists As long as there is the same initial value in the memory of the variable password lock (8) and in the function library of the background management server, the same calculation result will be obtained. Scan and send the QR code with the mobile phone to obtain the input password for unlocking. The variable password function is realized; when the wrong password is entered more than three times in a row, a warning is issued; self-charging can be completed. Scan the QR code of the lock with the mobile phone to realize the function of the logistics network, which greatly reduces the cost of the lock and the development of the lock management program in the early stage, and only needs to develop the background management program.

Description

technical field [0001] The invention relates to a lock that uses a mobile phone to scan the corresponding function of a two-dimensional code to obtain a variable code, a two-dimensional code mark, and a combination lock power supply module, and belongs to the technical field of electronic information and shared locks. Background technique [0002] The bicycle locks used by OFO shared bicycles do not directly enter the Internet of Things, but realize the interaction with the network through the people who use the shared bicycles when they scan. This method can greatly reduce the initial research and development costs and the production costs of bicycle locks. , which is a very valuable business model for companies that have just entered the sharing platform, which can greatly reduce R&D costs and facilitate promotion. However, there is a serious problem in this mode that the password of the OFO lock cannot be changed. For bicycles, since the parking position of the bicycle is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
CPCG07C9/00174G07C9/00309G07C9/00817G07C2009/00484G07C2009/0065G07C2009/00825
Inventor 陈蜀乔龙文凯郭荣
Owner 山东创工信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products