Supercharge Your Innovation With Domain-Expert AI Agents!

Resource sharing device and system based on Internet security lock

A resource sharing and security lock technology, applied in the field of Internet resource sharing, can solve the problems of increasing user expenditure, poor contact, and failure to return in time, and achieve the effect of improving practicability, avoiding expenditure, and improving experience.

Inactive Publication Date: 2021-08-10
黄翔峰
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous progress of the Internet era, a large number of resource sharing devices have emerged with the support of Internet technology, and shared charging treasures are one of them. However, in the process of using the existing shared charging treasures, it is necessary to take the mobile phone to Scan the code to use, and when the mobile phone is turned off and needs to be charged, the shared power bank cannot be obtained, thereby reducing the practicability of the shared power bank, and after the shared power bank is returned, it contacts the electric shock sheet inside the casing To complete the electric shock, and in the process of frequent plugging and unplugging of the power bank, dust and dirt are likely to be generated between the charging contacts of the power bank and the electric contact piece, and then poor contact is prone to occur, making the power bank unable to charge effectively. It affects the normal use of the power bank, and after the existing power bank is taken out, it is not equipped with a reminder device when it has not been used for a long time or when the electrical appliance has been charged. Increase the user's expenditure and reduce the user's experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource sharing device and system based on Internet security lock
  • Resource sharing device and system based on Internet security lock
  • Resource sharing device and system based on Internet security lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] see Figure 1-4 , 7, a resource sharing device based on Internet security locks, including a housing 1, a limiting mechanism 4 is installed inside the housing 1, the limiting mechanism 4 includes a energized coil 41, and the energized coil 41 is adjacent to the magnetic plate 42 after being energized The magnetic pole on the surface has the same name as the magnetic pole, so that the energized coil 41 can generate repulsion to the magnetic plate 42 after being energized, and the top of the energized coil 41 inside the housing 1 is slidably connected to the magnetic plate 42, and the tops of the left and right sides of the magnetic plate 42 are fixedly connected with Spring 43, the top of magnetic plate 42 middle part is mutually rotatable and is connected with buckle 44, and the quantity of buckle 44 has two, expands to both sides at the top of magnetic plate 42, and symmetrical distribution, buckle 44 is all positioned at fixed pulley 45 and Between the telescopic pull...

Embodiment 2

[0045] see figure 1 , 2, 5, 6, a resource sharing device based on Internet security locks, including a housing 1, a connecting frame 2 is slidably connected to the top of the housing 1, a power bank 3 is slidably connected to the top of the connecting frame 2, and the limit mechanism 4 is located at The bottom of the casing 1 is close to the side of the connection frame 2, and the bottom of the connection frame 2 is provided with a groove 5, and the bottom of the connection frame 2 is equipped with a cleaning mechanism 6, which includes a receiving plate 61, and the left and right sides of the bottom of the connection frame 2 The side is elastically connected with a receiving plate 61, and the side of the receiving plate 61 away from the center of the bottom of the connecting frame 2 is meshed with a gear 62, and the left and right sides of the bottom of the connecting frame 2 are rotationally connected with an electric shock ring 63, and the transmission connection between th...

Embodiment 3

[0047] see Figure 1-8 , a resource sharing device based on Internet security locks, including a housing 1, a limit mechanism 4 is installed inside the housing 1, and the limit mechanism 4 includes a energized coil 41, and the adjacent surface of the energized coil 41 is adjacent to the magnetic plate 42 after energization The magnetic pole has the same name as the magnetic pole, so that the energized coil 41 can generate repulsion to the magnetic plate 42 after being energized. The upper part of the energized coil 41 inside the housing 1 is slidably connected to the magnetic plate 42, and the tops of the left and right sides of the magnetic plate 42 are fixedly connected to the spring 43. , the top of the middle part of the magnetic plate 42 is rotatably connected with buckles 44, and there are two buckles 44, which are spread out to both sides at the top of the magnetic plate 42 and distributed symmetrically. The buckles 44 are all located on the fixed pulley 45 and the teles...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a resource sharing device and system based on an internet security lock, and relates to the technical field of internet resource sharing. The resource sharing device based on the internet security lock comprises a shell, a limiting mechanism is installed in the shell, the limiting mechanism comprises an electrified coil, a magnetic plate is slidably connected to the upper portion of the electrified coil in the shell, springs are fixedly connected to the top ends of the left side and the right side of the magnetic plate, and a buckle is rotationally connected to the top end of the middle of the magnetic plate. According to the resource sharing device and system based on the internet security lock, when a mobile phone of a user is powered off due to power shortage, the power bank can be taken and used, abuse is avoided, the practicability of the sharing device is improved, stable power-on of the power bank during self-charging is guaranteed, normal use of the power bank is prevented from being affected, the user can be reminded to return in time, the redundant expenditure and the waste of shared resources are avoided, and the user experience is improved.

Description

technical field [0001] The invention relates to the technical field of Internet resource sharing, in particular to an Internet security lock-based resource sharing device and system thereof. Background technique [0002] With the continuous progress of the Internet era, a large number of resource sharing devices have emerged with the support of Internet technology, and shared charging treasures are one of them. However, in the process of using the existing shared charging treasures, it is necessary to take the mobile phone to Scan the code to use, and when the mobile phone is turned off and needs to be charged, the shared power bank cannot be obtained, thereby reducing the practicability of the shared power bank, and after the shared power bank is returned, it contacts the electric shock sheet inside the casing To complete the electric shock, and in the process of frequent plugging and unplugging of the power bank, dust and dirt are likely to be generated between the chargin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/86G06F21/81B08B1/02
CPCG06F21/86G06F21/81B08B1/20
Inventor 黄翔峰
Owner 黄翔峰
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More