Electronic lock system and electronic lock identity theft alarm method
An electronic lock system and electronic lock technology, applied in the direction of electric alarm locks, building locks, time registers, etc., can solve the problem of not being able to collect image information of vandals in time, not sending alarm messages in time, and vandals not being able to provide effective help, etc. question
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] see Figure 1 to Figure 3 , the present invention provides a kind of described electronic lock system, and described electronic lock system comprises: electronic cat's eye 1, and described electronic cat's eye 1 comprises image acquisition module 11 and first wireless communication module 12; Electronic lock 2, described electronic lock 2 Comprise: electronic key end 21 and electronic lock end 22; Described electronic lock end 22 is connected with described electronic key end 21; Described electronic peephole 1 and described electronic lock 2 are installed on the door 4; Remote server 3 ( Not shown), described remote server is wirelessly connected with described electronic cat's eye 1; Described electronic lock 2 is suitable for sending unlock success information to described electronic cat's eye 1 when described electronic lock is opened by electronic key end 21; After the electronic cat's eye 1 receives the unlocking success information, the image information of the u...
Embodiment 2
[0055] see Figure 4 , the present invention also provides an electronic lock identity theft alarm method, the electronic lock identity theft alarm method is based on the electronic lock system described in Embodiment 1, and the electronic lock identity theft alarm method includes the following steps:
[0056] S1: When the electronic lock is opened, send a message of successful unlocking to the electronic cat's eye;
[0057] S2: The electronic cat's eye collects the image information of the unlocker, and sends the collected image information of the unlocker to the remote server;
[0058] S3: The remote server compares and verifies the collected image information of the unlocker with the image information of the target user, and sends an alarm when the comparison and verification fails.
[0059] As an example, in step S1, when the electronic lock is opened, the second wireless communication module 23 and the first wireless communication line module 12 described in Embodiment 1...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


