Lock intelligent management system
Position: Home> Product>Lock intelligent management system

Intelligent lock control system

2025-02-21 09:17:02
0
Intelligent lock control system
详细介绍:
Changes in locks

Lock: "A seal that can only be opened with a key" ("Cihai"). The development of locks has accompanied the development of Chinese culture for thousands of years, and almost accompanied the birth of private ownership; locks have played a vital role in our food, clothing, housing and transportation.

Ancient times:

Guang locks, Citi locks, jewelry locks, torture locks; simple structure and easy to open;

19th century:

Various shapes, different types in different places; many locks and keys are inconvenient to manage; technical unlocking is very easy;

21st century:

Internet, Internet of Things, Bluetooth and other technical applications; fingerprint, face and other biometric authentication; integrated wiring is required, high maintenance cost and low encryption level;

Lock management

Whether in life or work, multiple management methods often intersect and penetrate each other, which has a great impact on management efficiency!

Keys:

Various numbers, such as file cabinets, filing cabinets, etc.; registration and numbering; significant phenomenon of false claim, copying, and loss; once the key is lost, the lock needs to be replaced; manual registration has the risk of omission and alteration;

Password:

Applicable to managing a small number of high importance; passwords are easy to be copied and cracked; when the number of management is too large, it is easy to be confused;

Identity authentication:

Card swiping, fingerprint, face recognition, etc. are mainly used for the management of core areas such as main channels and confidential spaces; due to the complex construction and high maintenance costs, it is almost difficult to centrally manage the locks in a space; at the same time, the encryption level is low and it is very easy to be cracked by network attacks

System Overview

System Definition:

Kaijilong Lock Intelligent Management and Control System is based on multi-dimensional Internet of Things technology and loaded with commercial secret level security management measures. It integrates authority management, task authorization, event recording, location information and other functions. It is a comprehensive platform based on intelligent lock management to achieve convenient, efficient and scientific management of people, objects and space.

Construction goals:

Safety: biometrics, information security, management security

Convenience: task authorization, on-demand authorization, permission operation

Efficiency: one key for multiple locks, one key for multiple people, unified platform

Traceability: switch records, information feedback, alarm linkage


image.png


System functions

Data collection and storage: location data, status data, operation data

Remote control: task data issuance, remote killing, disabling and other instructions, electronic fence setting, temporary control

Data presentation and alarm: real-time monitoring, electronic fence, data integrity management, alarm linkage, data query management

Decision support and system management: system settings, software upgrades, log queries, report management

Technical advantages

Communication method: 2G network transmission does not require networking, short construction period, low cost, end-to-end communication management is safer and more convenient

Power supply method: The key uses a rechargeable lithium battery, which is energy-saving and environmentally friendly. The lock is powered by the key and does not require separate power supply

Authentication method: Biometric authentication (fingerprint) is safer and more convenient. Password authentication (identity binding)

Application security

Full-time, full-process, fully autonomous security management

Deployment method: 1. Localized deployment to eliminate hosting risks 2. Connect to security system and alarm immediately

Information security: Commercial confidentiality level 1. Active information security engine 2. Dynamic identity security engine

Lock security: 1. Passive design with built-in security chip 2. Anti-riot idling

Key safety: 1. Alarm when exceeding the set usage range 2. Remote kill, self-destruct, disable, self-lock

Performance comparison

//cdn.myxypt.com/39bb5cfc/21/04/2f12214cb985cf4a367d9b38e6ab92d848262508.png


System Features

Integrity: Management is carried out using the WEB platform and the mobile terminal platform, following the principle of a database management, which guarantees the integrity of the system to a certain extent.

Unity: People, locks and keys must be verified in the system through verification means, keys and locks are verified through verification codes, and people are verified through biometrics.

Module independence: Each functional unit module is independent of each other. Each functional unit module can be designed for the correlation of the application layer according to the needs, and each functional unit module can be flexibly combined.

Authority classification: Authority classification follows the principle of top-down. The superior can assign all its own functional permissions and data permissions to the subordinate, and the superior can view the data of this level and all subordinates.

Security: System data must be encrypted throughout the process, and the encrypted objects include the data itself and the communication channel.

Accuracy: The key and the server communicate to ensure the accuracy and integrity of data transmission.

Scalability: The system has horizontal and vertical scalability. For example, security alarm system, environmental monitoring system, etc.

Reliability: Distributed control system, each small system is independent of each other to avoid affecting the normal operation of the entire system due to abnormality of a certain device in the system.

Security system

Content security: source encryption, signature mechanism, asymmetric encryption and decryption

Hard security capabilities: security chip, server cipher machine, security T card

System security: server dual-machine hot standby, Linux system, distributed deployment

Network security: port control, firewall protection, regional protection, multi-level protection

User rights: account, password control, role, permission management, identity security, fingerprint recognition

Security architecture

Remote control of equipment, remote command of personnel, remote issuance of tasks, remote viewing of records

Key management center, business handling center, data storage center, situation awareness center

Built-in security chip, fingerprint identity recognition, wide area communication capability, real-time location service

Built-in security chip, "mobile" power supply, comprehensive state perception, anti-riot idling design

Distributed management, real-time monitoring, flexible and convenient, transparent information, traceability

Application areas

image.png


管理流程

image.png



业务流程

//cdn.myxypt.com/39bb5cfc/21/04/59c3a9aea31ecbe7b5ca58336db4aed30aa2e5ed.png



作业流程

image.png

Open/Close Lock: After using the key to verify the identity and the lock operation authority, the lock can be opened and closed to carry out on-site operations

Tag: Lock and tag the energy switch to prevent other personnel from operating the switch by mistake during the operation and causing personal accidents

Patrol: After using the key to verify the identity and patrol operation authority, an operation record is formed as a patrol event mark


便捷管理


image.png


可视化管理

//cdn.myxypt.com/39bb5cfc/21/04/46713e39628c02404b6c6920af32d764fd5b9631.png




标签

0
Prev: None

近期浏览:

CONTACT

Telephone:0769-82836677

Phone:189-2656-2355

Email:825505427@qq.com

Address:Factory Building A-B, Nanxiong Industrial Zone, Sukeng Village, Changping Town, Dongguan City