Lock, unlocking method thereof, lock administrative center and control method thereof
A management center and lock technology, applied in the field of locks, can solve problems such as hidden dangers and inconveniences, and achieve the effects of enhancing security, enhancing confidentiality, and safe and reliable control methods.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0026] Such as figure 1 , 2 Shown, a kind of unlocking method of lockset comprises the following steps:
[0027] Step 1: Register the lock information code and user identity information code in the lock management center. Said registration can be carried out after the lock is sold. The lock information code may be a lock serial number, which is used to distinguish different locks. The user identity information code includes a user code and a control code. The user code is used to distinguish different users, and the user code may be the user name of the webpage of the lock management center or the mobile phone number of the user. The control code is used to confirm the identity of the user, and when the user code and the control code received by the lock management center are correct, it means that the authentication is passed.
[0028] Users can choose one of the following authentication methods and register at the lock management center:
[0029] Single-person authenti...
specific Embodiment approach 2
[0042] Such as image 3 , 4 As shown, the difference between this specific embodiment and the first specific embodiment lies in: storing the user's private code in the lock, and registering the user's private code in the lock management center. The user's private password also participates in the encryption operation. The user's private password cannot be obtained by others, so even if the encryption algorithm is deciphered, he cannot calculate the unlock password. The similarities between this specific embodiment and specific embodiment 1 will not be repeated, and the differences between the unlocking method of the lock in this specific embodiment and specific embodiment 1 will be described in further detail below:
[0043] A method for unlocking a lock, comprising the steps of:
[0044] Step 1: Register the lock information code, user private password and user identity information code in the lock management center, and store the user private password into the lock. The ...
specific Embodiment approach 3
[0048] This particular embodiment corresponds to the first embodiment. Such as Figure 5 As shown, a lock includes an unlocking mechanism, a keypad, a display and a built-in processor. The built-in processor includes an input module, an output module, a control module, a display code generating module and an encryption module, and the control module is built with a storage module. The keyboard is coupled with the input module, the control module is coupled with the input module, the unlocking mechanism and the display code generation module respectively, the storage module is coupled with the encryption module, and the output module is coupled between the display and the display code generation module. There is a lock information code in the storage module.
[0049] After the lock is locked once, the unlocking mechanism sends a locked signal to the control module. After receiving the locked signal, the control module controls the display code generation module to generate a ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com