Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method between electronic lock and electronic key

An electronic key and verification method technology, applied in the field of verification between electronic locks and electronic keys, can solve problems such as illegal opening of electronic locks

Inactive Publication Date: 2009-01-14
广东南方信息安全产业基地有限公司
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the authentication code is easily intercepted by the listener during the transmission process from the electronic key to the electronic lock, and the listener can illegally open the electronic lock after learning the authentication code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method between electronic lock and electronic key
  • Verification method between electronic lock and electronic key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0012] Electronic locks and keys for access control systems such as figure 1 , when the user approaches the electronic lock, the electronic lock senses the unlock request from the electronic key carried by the user, and generates a random code and sends it to the electronic key;

[0013] The electronic key signs the random code with the private key to generate an authentication code (which can be sent to the electronic lock together with the above random code);

[0014] The electronic lock verifies the authentication code with the public key, and if the generated verification result is consistent with the random code, unlocking is allowed, otherwise, unlocking is refused.

[0015] The public key can be pre-stored in the electronic lock; it can also be pre-stored in the electronic key, and the electronic key sends the public key to the electronic lock during verification.

Embodiment 2

[0017] Electronic locks and keys with remote authentication such as figure 2 . When authenticating:

[0018] The electronic key sends a remote verification request to the electronic lock through the network;

[0019] After receiving the verification request, the electronic lock generates a random code and sends it to the electronic key;

[0020] The electronic key signs the random code with the private key to generate an authentication code (which can be sent to the electronic lock together with the above random code);

[0021] The electronic lock verifies the authentication code with the public key, and if the generated verification result is consistent with the random code, unlocking is allowed, otherwise, unlocking is refused.

[0022] The public key can be pre-stored in the electronic lock; it can also be pre-stored in the electronic key, and the electronic key sends the public key to the electronic lock during verification.

[0023] The embodiments of the present inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification method between an electronic lock and an electronic key, after an identification code which is transmitted to the electronic lock by the electronic key is captured by a monitor, the monitor still can not unlock. The verification method between the electronic lock and the electronic key is arranged with a public key, a private key, a signature program and a verification program matched each other. When verificating, the electronic lock generates a random code transmitted to the electronic key; the electronic key signs the random code to generate the identification code transmitted to the electronic lock using the private key; the electronic lock uses the public key to verificate the identification code, if the generated result after verification is consistent with the random code, unlock is allowable, otherwise, unlocking is refused.

Description

technical field [0001] The invention relates to a verification method between an electronic lock and an electronic key. Background technique [0002] Electronic locks and electronic keys are widely used in access control systems, safes and other occasions that need to authenticate the person who tries to unlock the lock. Its verification usually adopts the method of user password, that is, the administrator assigns a password to each user, and stores the password in the electronic lock and electronic key; Value) is sent to the electronic lock as an authentication code, and the user identity is sent to the electronic lock at the same time; if the authentication code is consistent with the password of the user pre-stored in the electronic lock (or the generated value after calculating the password with a hash function), the lock is allowed. Otherwise refuse to unlock. The disadvantage of this method is that the authentication code is easily intercepted by the listener during...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30G07C9/00E05B49/00
Inventor 田文春郑东曦程海龙彭贤斌
Owner 广东南方信息安全产业基地有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products