Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal control method, terminal and system

A terminal control and terminal technology, applied in the field of communication, can solve the problems of low security, radio frequency identification signals are easily monitored by other devices, etc., to achieve the effect of improving data security, realizing automation and intelligence

Inactive Publication Date: 2017-06-13
SHENZHEN GIONEE COMM EQUIP
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the radio frequency identification signal in RFID technology is easy to be monitored by other devices, resulting in low security of the keyless entry system using RFID technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal control method, terminal and system
  • Terminal control method, terminal and system
  • Terminal control method, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0034] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a terminal control method, terminal and system, wherein the method includes: the first terminal signs the first data acquired by the first terminal according to the private key of the first terminal, and obtains the second data; the first terminal encrypts the first data and the second data according to the public key of the second terminal pre-stored by the first terminal to obtain third data; the first terminal encrypts the The third data is sent to the second terminal, so that the second terminal decrypts the third data to obtain the first data and the second data, and the second terminal based on the first data The second data is verified, and the second terminal performs an unlocking operation after the second data is verified. The embodiment of the present invention can effectively improve the data security in the process of keyless unlocking by adopting the public-private key cryptography technology to sign and encrypt the data.

Description

technical field [0001] The present invention relates to the communication field, in particular to a terminal control method, terminal and system. Background technique [0002] With the development of communication technology and intelligent technology, keyless entry system has been widely used in various fields (such as automobile field, smart home field, etc.). Chip key. The basic technology adopted by the traditional keyless entry system is radio frequency identification (Radio Frequency Identification, RFID) technology, and the keyless entry system can perform identity authentication and data transmission through the RFID technology. However, the radio frequency identification signal in RFID technology is easily monitored by other devices, resulting in low security of the keyless entry system using RFID technology. Contents of the invention [0003] Embodiments of the present invention provide a terminal control, method terminal and system, which can effectively impro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G07C9/00
CPCH04L63/0442G07C9/00309G07C9/00563H04L9/3247H04L63/061
Inventor 刘定京黄儒鸿
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products