New Sci & Tech. cipher lock and design method of key thereof

A design method and a combination lock technology, applied in the field of combination locks, can solve the problems of low number of password digits, limited password sources, and poor confidentiality.

Inactive Publication Date: 2007-07-18
姜仁忠
View PDF0 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above-mentioned various locks select and set passwords within the range specified by the manufacturer. The disadvantages are that the sources of passwords are too limited, the number of passwords is not high, and the security is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] 1. The source of the password: ① Various files generated by the user through operating computer programs, such as *.doc files generated by the user with Word document editing software. ②The user collects information that exists objectively in the world to form data files, such as photos taken with a digital camera, sounds recorded with an mp3 player that can record, etc. ③Users use their imagination to write and draw any text, graphics, and symbols as passwords.

[0013] 2. The user stores the codes designed by himself in the memory for storing the codes in the lock and in the mobile storage device as the key, inserts the key into the lock, and the computer system in the lock calculates and compares the two sets of codes, and it is in line with the requirements of the user. When the predetermined requirements are met, the computer system controls the mechanical part of the lock, thereby generating the opening and closing functions.

[0014] 3. Using the handwriting inp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention belongs to the field of cipher lock technology, and is especially hi-tech cipher lock and key design method. The hi-tech cipher lock and key design method has user designed cipher stored in a mobile memory and thus expanded cipher source, high reliability and high security. At the same time, the method adopts hand writing input device as the cipher input device and the user can give full play to his imaginative power to create hard-to-unravel cipher.

Description

technical field [0001] The invention belongs to the field of combination locks which can prevent life and property safety. Background technique [0002] At present, the smart combination locks used in people's lives include: combination electronic locks, magnetic card locks, fingerprint locks, face recognition locks, etc. [0003] Fingerprint locks use fingerprints as passwords, and it is unavoidable to touch and take some items without using hands in life. It is impossible to control people with ulterior motives who steal fingerprints and copy fingerprints. [0004] Lip prints are used as passwords in sci-fi movies, the principle is the same as that of fingerprint locks, and it is easy to be obtained by others. [0005] Face recognition locks, using human facial features as passwords, have already leaked their secrets. Tell others that the user's facial features are the key, and the user shows his face to others every day. Sooner or later, the information will be easily ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): E05B49/00E05B19/00
Inventor 姜仁忠
Owner 姜仁忠
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products