Changes in locks
Lock: "A seal that can only be opened with a key" ("Cihai"). The development of locks has accompanied the development of Chinese culture for thousands of years, and almost accompanied the birth of private ownership; locks have played a vital role in our food, clothing, housing and transportation.
Ancient times:
Guang locks, Citi locks, jewelry locks, torture locks; simple structure and easy to open;
19th century:
Various shapes, different types in different places; many locks and keys are inconvenient to manage; technical unlocking is very easy;
21st century:
Internet, Internet of Things, Bluetooth and other technical applications; fingerprint, face and other biometric authentication; integrated wiring is required, high maintenance cost and low encryption level;
Lock management
Whether in life or work, multiple management methods often intersect and penetrate each other, which has a great impact on management efficiency!
Keys:
Various numbers, such as file cabinets, filing cabinets, etc.; registration and numbering; significant phenomenon of false claim, copying, and loss; once the key is lost, the lock needs to be replaced; manual registration has the risk of omission and alteration;
Password:
Applicable to managing a small number of high importance; passwords are easy to be copied and cracked; when the number of management is too large, it is easy to be confused;
Identity authentication:
Card swiping, fingerprint, face recognition, etc. are mainly used for the management of core areas such as main channels and confidential spaces; due to the complex construction and high maintenance costs, it is almost difficult to centrally manage the locks in a space; at the same time, the encryption level is low and it is very easy to be cracked by network attacks
System Overview
System Definition:
Kaijilong Lock Intelligent Management and Control System is based on multi-dimensional Internet of Things technology and loaded with commercial secret level security management measures. It integrates authority management, task authorization, event recording, location information and other functions. It is a comprehensive platform based on intelligent lock management to achieve convenient, efficient and scientific management of people, objects and space.
Construction goals:
Safety: biometrics, information security, management security
Convenience: task authorization, on-demand authorization, permission operation
Efficiency: one key for multiple locks, one key for multiple people, unified platform
Traceability: switch records, information feedback, alarm linkage

System functions
Data collection and storage: location data, status data, operation data
Remote control: task data issuance, remote killing, disabling and other instructions, electronic fence setting, temporary control
Data presentation and alarm: real-time monitoring, electronic fence, data integrity management, alarm linkage, data query management
Decision support and system management: system settings, software upgrades, log queries, report management
Technical advantages
Communication method: 2G network transmission does not require networking, short construction period, low cost, end-to-end communication management is safer and more convenient
Power supply method: The key uses a rechargeable lithium battery, which is energy-saving and environmentally friendly. The lock is powered by the key and does not require separate power supply
Authentication method: Biometric authentication (fingerprint) is safer and more convenient. Password authentication (identity binding)
Application security
Full-time, full-process, fully autonomous security management
Deployment method: 1. Localized deployment to eliminate hosting risks 2. Connect to security system and alarm immediately
Information security: Commercial confidentiality level 1. Active information security engine 2. Dynamic identity security engine
Lock security: 1. Passive design with built-in security chip 2. Anti-riot idling
Key safety: 1. Alarm when exceeding the set usage range 2. Remote kill, self-destruct, disable, self-lock
Performance comparison

System Features
Integrity: Management is carried out using the WEB platform and the mobile terminal platform, following the principle of a database management, which guarantees the integrity of the system to a certain extent.
Unity: People, locks and keys must be verified in the system through verification means, keys and locks are verified through verification codes, and people are verified through biometrics.
Module independence: Each functional unit module is independent of each other. Each functional unit module can be designed for the correlation of the application layer according to the needs, and each functional unit module can be flexibly combined.
Authority classification: Authority classification follows the principle of top-down. The superior can assign all its own functional permissions and data permissions to the subordinate, and the superior can view the data of this level and all subordinates.
Security: System data must be encrypted throughout the process, and the encrypted objects include the data itself and the communication channel.
Accuracy: The key and the server communicate to ensure the accuracy and integrity of data transmission.
Scalability: The system has horizontal and vertical scalability. For example, security alarm system, environmental monitoring system, etc.
Reliability: Distributed control system, each small system is independent of each other to avoid affecting the normal operation of the entire system due to abnormality of a certain device in the system.
Security system
Content security: source encryption, signature mechanism, asymmetric encryption and decryption
Hard security capabilities: security chip, server cipher machine, security T card
System security: server dual-machine hot standby, Linux system, distributed deployment
Network security: port control, firewall protection, regional protection, multi-level protection
User rights: account, password control, role, permission management, identity security, fingerprint recognition
Security architecture
Remote control of equipment, remote command of personnel, remote issuance of tasks, remote viewing of records
Key management center, business handling center, data storage center, situation awareness center
Built-in security chip, fingerprint identity recognition, wide area communication capability, real-time location service
Built-in security chip, "mobile" power supply, comprehensive state perception, anti-riot idling design
Distributed management, real-time monitoring, flexible and convenient, transparent information, traceability
Application areas

管理流程

业务流程

作业流程

Open/Close Lock: After using the key to verify the identity and the lock operation authority, the lock can be opened and closed to carry out on-site operations
Tag: Lock and tag the energy switch to prevent other personnel from operating the switch by mistake during the operation and causing personal accidents
Patrol: After using the key to verify the identity and patrol operation authority, an operation record is formed as a patrol event mark
便捷管理

可视化管理
