Waterproof and rustproof
Range Of Premium Products
GPS real-time positioning monitoring
Anti-tamper alarm
Remote unlock
Industry pain points
Logistics intelligent lock + intelligent monitoring system to escort you
Are you worried anymore
Goods stolen?
Bring your own goods?
Exchange goods?
Accident on the way of dangerous goods?
Traditional Seal
Easy to copy, easy to cheat, easy to replace
There are blind spots, no accountability on the way
Manual locking and scissor locks are time-consuming and labor-intensive
Manual management of lead seal numbers is prone to errors
One-time use, high cost of use
Full manual management, high management cost
Logistics smart lock
Eliminate imitation, data encryption, ensure security
Real-time positioning monitoring, intelligent supervision
Hang and go, convenient and hassle-free
Automatically record data, accurate and efficient
Reusable, no consumables
System management, saving a lot of labor costs
Logistics Smart Lock
Logistics Monitoring and management system
System topology
Working princple & Work process
Through Bluetooth or NB-iot communication, the key and password corresponding to the lock are obtained, and the unlocking or resetting action is performed.
Bluetooth version
Single press button to wake up the key.
The key broadcasts normally for 45 seconds, waiting for the APP to actively connect with the key.
After the APP is connected with the key, the background identifies the key identity.
After judging that the key identity is normal, receive the passive lock identity ID at any time.
The key gets the passive lock ID and sends it to the background.
The background sends the password and secret key of the corresponding lock to the key.
After the key obtains the secret key, the key is encrypted and communicated with the lock to unlock.
After the lock is opened, the lock feeds back the unlocking result to the key.
The key to the unlocking result is fed back to the background.
Save the corresponding unlocking records in the background.
Nb-lot communication version
Single press the button to wake up the key.
Changan button for 3 seconds to open the communication module.
After the module is powered on, it automatically searches the network and connects with the background.
After connecting with the background, identify the identity of the key.
After judging that the key identity is normal, receive the passive lock identity ID at any time.
The key obtains the passive lock ID and sends it to the background.
The background sends the password and secret key of the corresponding lock to the key.
After the key is obtained, the key is encrypted and communicated with the lock to unlock.
After the lock is opened, the lock reports the unlocking result to the key.
The key feeds back the unlocking result to the background.
The corresponding unlocking records are saved in the background.
Logistics Lock application scenario