Storage terminal system of safety intelligent lock and sharing use method and device of storage terminal system
A terminal system and smart lock technology, applied in the field of Internet of Things, can solve problems such as easy imitation and counterfeiting, poor safety performance, and affecting the normal use of safe smart locks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] figure 1 It is a schematic diagram of a storage terminal system for a secure smart lock according to an embodiment of the present application.
[0070] like figure 1 As shown, the storage terminal system provided by this embodiment is used to accommodate multiple security smart locks that have not lost power and implement charging services. It includes a server 20 and a charging storage terminal 10 connected to the server through the Internet. There can be one or more terminals, and they can be arranged in different places to meet the needs of different users for safe smart locks.
[0071] The charging storage terminal includes but is not limited to a power supply unit 11, a core control module 12 and a first auxiliary cabinet 13, such as figure 2 shown. Wherein, the power supply device is electrically connected with the core control module and the first auxiliary cabinet respectively, and is used to provide the core control module and the first auxiliary cabinet wi...
Embodiment 2
[0083] Figure 6a It is a flow chart of a shared usage method in the embodiment of this application.
[0084] like Figure 6a As shown, the shared use method provided in this embodiment is applied to the storage terminal system of the previous embodiment, specifically to the server of the storage terminal system, and the shared use method includes the following steps:
[0085] S1. Obtain the request type of the shared server request.
[0086] That is, when the server receives the sharing service request sent by the user through a mobile device such as a mobile phone, it obtains the request type of the sharing service request according to the parameters of the request sent by the user, and the request type includes a lock borrowing request and a lock return request.
[0087] S2. Provide the user with a lock borrowing service according to the lock borrowing request.
[0088] When the shared service request sent by the user is a lock borrowing request, the user is provided wit...
Embodiment 3
[0110] Figure 7a It is a block diagram of a device for shared use in the embodiment of this application.
[0111] like Figure 7a As shown, the shared use device provided by this embodiment is applied to the storage terminal system of the previous embodiment, and specifically applied to the server of the storage terminal system, which can be understood as a separate server host or a functional module of the server. The shared The using device includes a request receiving module 30 , a lock borrowing service module 40 and a lock returning service module 50 .
[0112] The request receiving module is used to obtain the request type of the shared server request.
[0113] That is, when the server receives the sharing service request sent by the user through a mobile device such as a mobile phone, it obtains the request type of the sharing service request according to the parameters of the request sent by the user, and the request type includes a lock borrowing request and a lock...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


