Shared equipment lock control device and control method of the device

A technology for sharing equipment and control methods, which is applied in the direction of locking portable objects, lock applications, coin-operated equipment with instrument control, etc., and can solve problems such as the transportation of accompanying beds

Active Publication Date: 2022-07-15
山东巨基智能科技有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the shared accompanying bed is not effectively managed, it is easy to lend out the shared accompanying bed in other areas and return it in this area, resulting in frequent transfer of accompanying beds

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared equipment lock control device and control method of the device
  • Shared equipment lock control device and control method of the device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] A control method comprising the following steps:

[0036] 1) When the IC card fixed on the lock tongue passes through the card reader, the card reader reads the identification information in the IC card and feeds back the read information to the controller;

[0037] 2) After receiving the identity information read in step 1), the controller compares it with the identity information stored in the controller, and sends a locking signal to the locking device after the comparison is successful;

[0038] 3) After the locking device receives the locking signal in step 2), if both the primary microswitch and the secondary microswitch are in the triggered state, the locking action will be performed to lock the lock tongue.

[0039] In the step 2), after the controller receives the identity information read by the card reader in the step 1), if it is inconsistent with the identity information stored by the controller, the controller always feeds back the unlocking instruction to...

Embodiment 2

[0041] A control method comprising the following steps:

[0042] 1) After the lock tongue triggers the micro-switch once, the micro-switch sends the trigger signal to the controller, and the controller sends the control command to the card reader after receiving the trigger signal, and the card reader is activated;

[0043] 2) The card reader activated in step 1) reads the IC card on the inserted latch, and feeds back the identity information in the read IC card to the controller;

[0044] 3) After the card reader reads the identity information of the IC card, the identity information is fed back to the controller;

[0045] 4) After the controller receives the identity information read from the card reader, it compares it with the identity information stored by itself, and sends a locking signal to the locking device after the comparison is consistent;

[0046] 5) After the locking device receives the locking signal, if the secondary micro-switch is in the triggered state, it...

Embodiment 3

[0048]A control method, wherein in step 4), after the controller receives the identity information read from the card reader, it compares it with the identity information stored by itself, and sends an unlock instruction to the locking device after the comparison is inconsistent; The locking device executes the unlocking action after receiving the unlocking instruction from the controller. In the step 5), after the secondary micro switch is in the triggered state and lasts for 1 s, the locking device executes the locking action; if the identity information fed back by the controller is inconsistent with the card reader, the second step in the step 5) After the micro switch is in the activated state and lasts for 1s, the locking device performs the locking action but the controller marks its state as unlocked; the locking device performs the locking action but the controller marks its state as unlocked If the secondary micro switch is in the triggered state again, the controlle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a shared equipment lock control device and a control method of the device, which belong to the field of shared equipment and are used for shared equipment. 1) When an IC card fixed on a lock tongue passes through a card reader, the card reader reads Take the identity information in the IC card and feed back the read information to the controller; 2) After the controller receives the identity information read in step 1), it compares it with the identity information stored in the controller, After the comparison is successful, a locking signal is sent to the locking device; 3) After the locking device receives the locking signal sent in step 2), if both the primary microswitch and the secondary microswitch are in the triggered state, the Execute the locking action to lock the tongue. In the step 2), after the controller receives the identity information read by the card reader in the step 1), if it is inconsistent with the identity information stored in the controller, the locking device does not act. It can realize the change of the borrowing and returning method of the shared escort bed, and improve the standardization of the use of the shared escort bed.

Description

technical field [0001] The invention belongs to the field of shared equipment, and in particular, particularly relates to a shared equipment lock control device and a control method of the same. Background technique [0002] With the rise of the sharing economy, shared equipment has gradually increased. For example, in the medical field, the rise of shared escort beds is one of them. Most of the traditional shared escort beds are managed manually. When family members who accompany a patient need to rent an escort bed, they need to apply to the hospital escort bed manager and pay a deposit. After the escort bed is used, it needs to be carried out by a designated person. Recover and refund deposit. It is not only time-consuming and labor-intensive, but also requires more manpower and material resources to take care of it, and there are many inconveniences. [0003] In order to solve the above problems, shared equipment manufacturers set up a rental point for shared escort be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07F17/00G07C9/00E05B73/00E05B47/06E05B47/00E05B15/10E05B15/02
CPCG07F17/0042G07C9/00944E05B73/00E05B47/0607E05B47/0002E05B15/10E05B15/0205G07C2009/00976
Inventor 刘志山房维征孟庆尚
Owner 山东巨基智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products