Unlock instant, AI-driven research and patent intelligence for your innovation.

Data management method and system for virtual keys

A data management system and virtual key technology, applied in the field of security, can solve the problems of inconvenient use by authorized persons, poor user experience, poor security of smart locks, etc., and achieve the effects of wide use, strong versatility and high security

Inactive Publication Date: 2017-12-01
上海奥宜电子科技有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a virtual key data management method and system to solve the problems of poor security of existing smart locks, poor user experience during authorization, and inconvenient use by authorized persons

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data management method and system for virtual keys
  • Data management method and system for virtual keys
  • Data management method and system for virtual keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions in the embodiments of the present invention will be clearly and completely described and discussed below in conjunction with the accompanying drawings of the present invention. Obviously, what is described here is only a part of the examples of the present invention, not all examples. Based on the present invention All other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0036] In order to facilitate the understanding of the embodiments of the present invention, specific embodiments will be taken as examples for further explanation below in conjunction with the accompanying drawings, and each embodiment does not constitute a limitation to the embodiments of the present invention.

[0037] This embodiment provides a data management method of a virtual key, which is mainly used to open the security device through the control of the mobile device, such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data management method and system for virtual keys. The method comprises the steps of carrying out initialization to generate a first virtual key and a second virtual key which match mutually, and respectively storing the first virtual key and the second virtual key to an initial mobile device end and a security protection device end; when the initial mobile device end needs to start the security protection device end, sending a request command comprising the first virtual key to the security protection device end for authentication and starting; and when other initial mobile device end needs to start the security protection device end, directly sending the request command comprising the first virtual key to the security protection device end by the initial mobile device end through a communication network or forwarding the request command to an authorized mobile device end through a cloud server and then sending the request command to the security protection device end for authentication and starting, through the authorized mobile device end, wherein the initial mobile device end and the other mobile device end directly carry out communication with the security protection device end through Bluetooth. According to the method and the system, a special application does not need to be installed at the authorized end, and the security protection end is not demanded by any network access demand / networking power supply demand.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a data management method and system for a virtual key. Background technique [0002] With the rapid development of science and technology, existing door locks have begun to be intelligent, such as networking through the electronic lock itself, and obtaining authorization based on the Internet to control the opening of the door lock. However, existing smart door locks generally need to be connected to the Internet through Bluetooth, 433 gateways, etc., and then communicate with cloud devices. When users use it, they need to log in to the cloud server through an account to obtain authorization, and then obtain an authorization code to open the electronic lock. [0003] This kind of smart lock has the following disadvantages: [0004] 1. Poor safety. Since the authorization opening method of this kind of door lock depends entirely on the cloud server authorization, that is, all...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W4/00G07C9/00
CPCG07C9/00309H04L63/0428H04L63/08H04L63/0869H04L67/10H04W4/80
Inventor 余朝东张杰军
Owner 上海奥宜电子科技有限公司