Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-dimension code electronic key implementation method based on digital signature

An electronic key and digital signature technology, applied in the field of smart locks, can solve the problems of inconvenience to change, easy to lose, not easy to recycle, etc., to achieve the effect of ensuring uniqueness and authenticity

Active Publication Date: 2015-09-23
宁波飞拓电器有限公司
View PDF5 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Because the traditional key is very inconvenient to carry, and it is prone to loss or theft
As for the existing electronic key, in some cases where other personnel are required to use the key temporarily, the corresponding smart lock can only be opened after the information is authorized first, and the fingerprint, voiceprint, etc. as the carrier of the information are not easy to extract Lending, other carriers such as passwords and pictures are not easy to recycle after lending, or it is inconvenient to change. The existing electronic keys cannot safely and effectively deal with the above situations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimension code electronic key implementation method based on digital signature
  • Two-dimension code electronic key implementation method based on digital signature
  • Two-dimension code electronic key implementation method based on digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The generation and identification scheme of the electronic key is described according to the drawings.

[0019] 1. System initialization and user electronic key generation, see figure 1 and image 3 .

[0020] The key pair (x i ,y i ), private key x i Stored in the user account software on the mobile device. When the user makes a reservation through the Internet, checks in at the front desk, transfers the house, or confirms that the user has the right to use the room, he will register through the building management system, store the user identity information in the corresponding smart lock storage unit, and pass the system Find the account's public key y i Stored in the corresponding room smart lock storage unit.

[0021] When the user account software receives the assigned private key, the software automatically initializes the key generation flag list, according to the personal information of the user account, and sets the key type as the user's long-term key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for encoding information of a user and generating a two-dimension code digital key by adopting a digital signature technique. A mobile phone and other mobile devices are taken as carriers of the two-dimension code digital key. The method comprises steps as follows: a credible key generation center allocates a unique private / public key pair for a user account and a smart lock storage unit during starting; a digital signature algorithm is adopted, that is, a private key is used for encrypting the information of the user and a public key is used for decrypting a read-in two-dimension code sequence; the information of the user is stored and read by field. Normal use of the two-dimension code key of the user can be guaranteed, the reliability and the authenticity of the source of a generated temporary two-dimension code key can be guaranteed, meanwhile, temporary two-dimension code keys received by different people can be effectively distinguished, and the flexibility and the safety of a whole two-dimension code smart lock system are unified.

Description

technical field [0001] The invention belongs to the technical field of intelligent locks, and relates to a method for processing user's identity information into a two-dimensional code electronic key, using digital signature technology to ensure the reliability of its source, and utilizing the comparison of validity fields to realize a one-time effective method of a temporary key. Background technique [0002] A two-dimensional code is a black and white graphic that uses certain specific geometric figures distributed on a plane according to certain rules to record data symbol information, and can store a certain amount of alphanumeric image content. [0003] Digital signature is the use of public key encryption technology to perform cryptographic transformation on the data unit and attach it to the data unit. By decrypting the additional data, the source and integrity of the data unit can be verified. Digital signature has the functions of identity authentication, encrypted ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00
Inventor 葛泉波杜明陈天翔管冰蕾邵岳军
Owner 宁波飞拓电器有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products