The specific embodiment
Referring to Fig. 1, the utility model unlock key management machine hardware components mainly is divided into following module: 1, identification module (radio frequency card reading module/finger print detecting module), 2, key position detects and alarm module (infrared transmission module, infrared receiving module, the infrared human body induction, audible alarm), 3, data storage and clock module (29C040,12C887), 4, man-machine interface (liquid crystal display, keyboard), 5, communication module (CAN bus, the RS232/485 communication), 6, unblanking, (unlocking mechanism drives driver module, illumination), 7, power module (Switching Power Supply, charge management module, standby electric power).Each module is finished the key management function under the control of central controller (CPU).Wherein the function of each module and basic realization principle are as follows:
1. identification module
The function of identification module is to judge whether to allow its access unlock key by the identification to operating personnel's identity.Identification module can be matched and be " radio frequency card reading module (radio frequency card) " or " optical fingerprint sensor module ".
When adopting the radio frequency card reading module, the key management machine adopts the card number management mode, have in every radio frequency card unique ID number (unique ID numbering be by card production firm guaranteed), CPU control radio frequency card reading module cycle detection card information during stand-by state, when radio frequency card card reading module when the radio frequency card reading module is read ID number of card and searched for the data of registered ID storage area in the data storage module, be registered then CPU control lock driver module for this ID number and open the key management cabin door if detect.
ID number registration is by keyboard the key management machine to be forwarded on the registering functional item, again by keyboard input manager password, the key management machine promptly enters ID sign indicating number registering functional behind the password confirming, with the close radio frequency card reading module of radio-frequency card to be registered, CPU shows this code value after the ID sign indicating number is read on LCD, choose the authority of this card by keyboard according to the prompting in the liquid crystal display, deposit this code value in the data storage module registered ID storage area by acknowledgement key, can stick into the row registration to many at every turn.Register 100 cards at most.If the key management machine links by communication module and host computer, the input function of log-on message can be realized by host computer, can increase name, sex, position ... typing etc. information.
When adopting the fingerprint sensor module, the key management machine adopts the finger print information management mode, and its management principle and radio-frequency card are similar, but because the big therefore fingerprint identification module of the information content of finger print data has some autonomous computing and storage capacity.
2. key position detects and alarm module
Position detecting module is made up of infrared transmission module, infrared receiving module, infrared human body induction, audible alarm etc.Main effect is to detect the user access information of key is detected.In position all be equipped with one group of infrared detection diode for each key, infrared transmitting tube sends the optical signalling that frequency is 1KHZ, and the infrared light that sends is right against infrared receiving tube, the signal of telecommunication of infrared receiving tube output 1KHZ, if the infrared receiving tube output signal of telecommunication is " 0 " when having obstruction to intercept between infrared transmitting tube and the receiving tube, CPU by the output signal to infrared receiving module detect can judge key have a situation (kind, numbering).(resemblance that cooperates three class keys, the key-placing seat adopts placing structure, all kinds of keys can only be inserted on the corresponding keyhole seat).CPU can be recorded in the type of key of access time of key and use the interblock in the data memory module when the user carries out access to unlock key.CPU judges according to predefined ID sign indicating number rights of using whether the type of key and the quantity of user's use is legal when rights management is arranged, and control audible alarm and liquid crystal display are pointed out under the criminal manipulation situation.
Infrared position probing mainly contains following characteristics: 1, antijamming capability is stronger, and 2, infrared light linearity degree is better, position probing is accurate 3, cheap.
Another kind of criminal manipulation is correctly not shut the hatch door of key management machine, adopt the infrared human body inductive pick-up to detect herein, when after key is carried out access, not detecting human body information in 0.5 meter scope, point out by audible alarm and LCD.The infrared human body inductor is not worked when the hatch door closed condition.
3. data are stored and the clock module
Data storage is the storage medium of information such as all record data, ID sign indicating number registration information data, employing be the Flash memory W29C040 of 512Kbyte, the Flash memory has power down not lose and advantage such as storage speed is fast.The accessing operation of W29C040 is to finish under the control of 77E58.Adopt pop down mode record, when memory was full, Ji Lu information was deleted the earliest.When storing, data adopted software approach such as data redundancy backup and data power loss recovery to guarantee the reliability of data.
The clock module of key management machine adopts the DS12C887 real-time timepiece chip, the characteristics that this chip has when walking automatically and outage moves, when walking automatically: in the time of can walking automatically under the intervention that does not need CPU, benefit is to save the CPU working time, and CPU only need read clock data and get final product.The outage operation: under the complete powering-off state of key management machine, the state when lithium battery of chip internal keeps away for the chip internal circuit supply.Usually the key management machine only need can use by the good time of keyboard to set up when using for the first time.Adjustment to the time also can be carried out rights management, when having only CPU to detect the card of corresponding authority by the radio frequency card reading module, the time adjusting function just can be by opening.
When in being furnished with host computer and station, being furnished with gprs system, can carry out periodic time adjustment by the processing of CPU.
4. man-machine interface
Adopt big screen LCD (160*80), be with demonstration backlight, full menu user interface.Be furnished with the soft-touch type film key, simple and quick, on supervisor, just can directly browse service recorder to unlock key.
5. communication module
Communication module is a physical basis of realizing the exchanges data of key management machine and host computer, in the station, there is under the condition of electromagnetic system the key management machine to realize that networking operates, can uses the function of some other the terminal on the CAN network by CAN bus and upper machine communication and each Terminal Type.Do not having to pass through RS232/RS485 communication and upper machine communication exchanges data under the situation of electromagnetic system.
Key management machine and host computer can be operated by host computer after setting up communication, realize the function that some are friendly, careful more.For example can disposablely read the operation note of key management machine storage by host computer when the browsing management compressor operation log, form the inquiry form of all kinds of kinds of types, functions such as user friendly data query, management also can realize the functions such as printing of form.
6. the driver module of unblanking
The hatch door of key management machine adopts electromagnetic lock to carry out locking, under the control of CPU electromagnetic lock is controlled.Because need big drive current therefore need increase a current driving circuit between CPU and electromagnetic lock when electromagnetic lock is opened, and invade CPU for the high voltage that drives electromagnetic lock, the photoelectricity isolation has been passed through in the connection between them.
Lighting circuit is that the user operated at night for convenience, and illuminator is lighted when hatch door is opened, and extinguishes when hatch door is closed.That lighting circuit adopts is efficient, environmental protection, energy-conservation led designs.
7. power module
Referring to Fig. 2, the normal input service voltage range of key management machine is a 100-260V AC/DC self adaptation.Inside is furnished with small-sized closed lead-acid battery as reserve battery, when externally fed interrupts suddenly immediately and change to the in-line power mode, can keep key management machine operate as normal in 48 hours at in-line power, and can be to supervisor switch (door) 100 times in the scope at this moment.
Liquid crystal display displays dump energy when using reserve battery, key management office's make and break lock function and other power consumption parts when dump energy is not enough, and enable voice is reported to the police and LCD MODULE prompting electric weight deficiency.Have two kinds of processing methods this moment, and the one, supervisor thoroughly cuts out, the 2nd, power to supervisor again.
The major function of this use novel key supervisor is that the mode of occupation to mechanical release key, electric unlock key, leapfrog key writes down and manages.The noncontact RF IC card as identification and mandate instrument, is supported the setting of authority flexible configurations as identification.Lend/give back type, date and the time of key by infrared motion detection technology accurate recording user.The information of record can inquire about, show by LCDs, also data can be saved in the host computer database simultaneously.Upper computer software carries out higher management to record data, can generate polytype data statistics and inquiry form, and host computer also is responsible for finishing the typing file work to information such as user identity, authorities.
The utility model also has some other distortion or improvement.If those skilled in the art are subjected to the change or the improvement of the conspicuous unsubstantiality that inspiration of the present utility model makes, all belong to the protection domain of the utility model claims.