Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key management system and method

A management system and key technology, applied in the key management system and management field, can solve the problems of high investment, high cost, inapplicable application scenarios, etc., and achieve the effects of low storage consumption, simplified number of digits, and high security.

Inactive Publication Date: 2018-10-09
浙江浙民达实业有限公司
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the pre-registered secret key cannot be flexibly modified, transferred and securely shared, it is also not suitable for application scenarios that require temporary verification
[0005] Therefore, it is necessary to provide a new key management system and management method, which can safely and effectively solve the verification problem of temporary customers, and solve the problem of high investment and high cost of similar network equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management system and method
  • Key management system and method
  • Key management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] figure 1 The structure diagram of the key management system in the present invention is shown, which includes:

[0059] A management terminal, which is used to randomly generate a unique code; in this embodiment, the management terminal includes but is not limited to various access control systems, such as fingerprint locks, digital password locks, etc.;

[0060] A secret key generation terminal, which is used to receive the code, perform encryption calculation according to the code, generate a secret key and output it; in this embodiment, the secret key generation terminal may be equipped with Windows, Java, Android, or Web, etc. The operating platform of the computer, including but not limited to smart mobile terminals such as mobile phones and tablet computers, and fixed terminals such as local PCs, as long as the codes can be obtained and encrypted calculations can be performed;

[0061] After the secret key is generated, the management terminal is further configured...

Embodiment 2

[0078] Figure 4-5 Shown is a flow chart of the steps of the key management method of the present invention, which includes:

[0079] S1. Randomly generate a unique code through the management terminal;

[0080] S2, encrypting and calculating the code through a secret key generation terminal, generating a secret key and outputting;

[0081] S3. After the secret key is generated, the management terminal parses the secret key information, and performs an unlocking / locking operation according to the parsing result.

[0082] Specifically, the step S1 includes the following steps:

[0083] S11, the user inputs login information, enters the management interface of the management terminal, and inputs a user instruction;

[0084] S12. The management terminal randomly generates the code according to a user instruction.

[0085] The step S2 includes the following steps:

[0086] S21, the user inputs the obtained code in the secret key generation terminal;

[0087] S22, the user se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key management system and method. The key management system comprises a management terminal and a key generation terminal, wherein the management terminal is used for randomly generating a unique code; the key generation terminal is used for receiving the code, performing encryption calculation according to the code, generating a key and outputting the key; after the keyis generated, the management terminal is further used for receiving the key, parsing information of the key and carrying out an unlocking operation / a lock maintaining operation according to a parsingresult. The key management system combines a random code technology on the basis of the traditional digital input verification, initiates a Sudoku digital encryption technology, a terminal matching technology and the like, realizes the functions such as off-line encryption, remote acquisition and off-line verification and reduces the cost at the same time.

Description

technical field [0001] The invention relates to the field of intelligent password management, in particular to a secret key management system and a management method. Background technique [0002] With the development and popularization of smart home, more and more devices begin to pay attention to the design of human-machine exchange mode and customer experience, and people also begin to put forward higher requirements for the humanized design, safety and convenience of equipment. At present, the smart lock and access control industries have made substantial progress in verification mode, unlocking method, networking method, and interface UI. The verification modes mainly include iris recognition, face recognition, body motion recognition, fingerprint recognition, password verification, card verification, network recognition, etc. [0003] The above verification modes all have a good intelligent experience and high security check, and can effectively identify legitimate us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32G07C9/00
CPCH04L9/0869G07C9/00H04L9/0819H04L9/0891H04L9/3226
Inventor 朱思政方李斌
Owner 浙江浙民达实业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products