What Are Electronic Locks?
An electronic code lock is an electronic product that controls the operation of a circuit or a chip (access control system) through a password input to control the closing of a mechanical switch and complete the tasks of unlocking and locking.
- Electronic lock, it is also with 51 series
- The so-called smart lock is a comprehensive product combining electronic technology, integrated circuit design, a large number of electronic components, and a variety of innovative identification technologies (including computer network technology, built-in software cards, network alarms, and mechanical design of the lock body). .
- The research on electronic combination locks has begun in the 1930s, and has been applied in some special places for a long time. The amount of keys (passwords) of the electronic lock is extremely large, which can be used in conjunction with the mechanical lock, and it can avoid leaving security risks due to the imitation of the key. The electronic lock only needs to remember a set of passwords, and does not need to carry a metal key, which saves people the trouble of carrying a metal key, so it is appreciated by more and more people. After the 1980s, with the advent of electronic lock ASICs, the size of electronic locks has decreased, reliability has increased, and costs have increased. It is suitable for use in places with high security requirements, and requires a power source to provide energy. It is still limited to a certain range and difficult to popularize, so research on it has not made significant progress.
- By the 1990s, the advancement of microelectronics technology and the development of communication technology in the United States, Italy, Germany, Japan, Canada, South Korea, and Taiwan, Hong Kong, and other places in China provided technical support for password locks, thereby pushing password locks to reality. Application phase. By the beginning of the 21st century, in western countries, electronic lock technology is relatively advanced and complete. Electronic locks have been widely used in intelligent access control systems, making it safer and more reliable to implement gate management.
- In the early 90's, China began to explore the password lock. So far, with the development of electronic technology and information technology, the technical field of electronic combination locks has developed very mature. From the technical level and market recognition of the early 20th century, the most widely used is the keyboard-type electronic combination lock, which is mainly used in safes,
- With the continuous injection of high-tech into traditional locks, the security functions of locks have been fully extended and expanded. Intelligent electronic locks have become an indispensable team member in today's security-level security systems. Their status and role are that of any machinery. Locks cannot be replaced. Due to its huge market potential, many domestic and foreign companies have invested considerable human and material resources in the development and production of intelligent electronic locks. [2]
- Wired lock
- According to the way of entering passwords, it can be divided into the following categories:
- Push-button
- The keyboard (or combination button) is used to input the unlock password, which is convenient to operate. Internal control circuits often use electronic locks
- The electronic combination lock provides a variety of authentication devices. The considerations described below are not comprehensive, only examples.
- Numeric codes, passwords and pass phrases
- Digital codes are the most common form of authentication. With electronic locks, the correct code must be entered in order to lock out of use. This lock usually provides a keyboard, as well as a number of functions that respond to every sound you press. The combination length is usually 4-6 bits in length. A change in this design involves the user entering the correct password or password.
- Security token
- Another means of verifying the identity of the user is the need to scan or a security token, such as a smart card or similar "swipe", or interact with a lock token. For example, some locks have access to stored credentials on Personal Digital Processing (PDA) using infrared data transfer methods.
- Identification technology
- As biometrics have become increasingly prominent as a means of confirmation for positive identification, their use has increased in security systems. Some new electronic locks use technologies such as fingerprint scanning, retinal scanning, iris scanning, voiceprint recognition to authenticate users.
- RFID
- Radio frequency identification (RFID) is the use of an object (commonly referred to as an "RFID tag") that is suitable for or incorporated into a product, for the purpose of identification and tracking of animals or people using radio waves. Some tags can be read from a few meters away, beyond the line of sight of the line's readers. This technology is also used in modern electronic combination locks.
- Unlocking flowchart (take keyboard password lock as an example): start to connect the power, the program initializes the settings, and then choose to unlock or set the password. The unlocking process requires keyboard scanning, the password is correct, the unlock is successful, the password is wrong 3 times and an alarm is issued, If you want to change the password, enter the old password first, set the new password after the password is correct, and alert the user when the error occurs. You need to confirm the new password twice. After the confirmation, the password is changed successfully.
- In terms of security, what needs to be solved is to prevent the inductive card from being illegally copied and unlocked by abnormal means (such as dialing with tools, prying, using a strong magnet, etc.), and the lock body should have a certain resistance.
- 1. The environment in which the functions are combined
- The functional requirements should be determined according to the application, because different use environments have different functional focuses. As an electronic door lock of a financial institution's office, the functions that must be provided are: a function that must have a time limit for all key cards, a door opening record function for locks, and a hierarchical management function. Based on the basic functions, in order to adapt to future development, you can consider the expansion of the lock system (the system can manage employee offices, public channels, dedicated channels, etc.), consider the technical interface of the card system, and so on. It is necessary to monitor the door of the room in real time. The state of the door can be controlled in the event of unusual events. The best solution is to connect the door locks and consider the interfaces of other IC card systems together to achieve
- Electronic lock products
- 1.Tempered glass door lock
- Automatically store unlocking record and attendance function instead of access control (optional)
- Illegal unlock phone / mobile remote alarm (optional)
- Use both digital password and electronic induction key
- Wireless remote control function (optional)
- Auto / manual lock function
- Illegal intrusion alarm function When the door lock is locked, an alarm sound is issued when the door is forcibly opened or the lock body is broken.
- 2.Smart electronic lock
- All moving parts and force parts use stainless steel precision castings, which are compact and durable.
- Tiandi bolt function, when you lock the door, you only need to lift the handle, and when you open the door, you only need to press the handle and the bolt to retract.
- Indoor anti-lock, rotate the indoor anti-lock knob to the anti-lock position.
- Outdoor anti-lock, when the card or password is set to outdoor anti-lock, the indoor rotation handle cannot open the door. No left or right door is opened to avoid all the troubles of changing left and right door
- 3.Wireless electronic lock
- Wireless electronic lock can be used immediately, unlock and close the lock and send alarm information in real time to remotely notify the monitoring terminal.
- Real-time reporting of lock body switch status information, upload monitoring platform via vehicle host for real-time monitoring by relevant personnel.
- Automatic sealing and unsealing. The lock body can be opened and closed remotely through the host, handheld and other equipment.
- Alarm information supplementary transmission mechanism to ensure that important data is not leaked.
- Ultra-low power consumption software and hardware design, can be used for more than 5 years without charging.