Equipment unlocking method and device, terminal equipment and medium

A device and terminal technology, applied in the computer field, can solve problems such as high maintenance costs and cumbersome steps, and achieve the effect of reducing maintenance costs and simplifying cumbersome steps

Inactive Publication Date: 2019-01-04
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in this way, information processing and verification are performed through the server, the steps are cumbersome and the maintenance cost is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment unlocking method and device, terminal equipment and medium
  • Equipment unlocking method and device, terminal equipment and medium
  • Equipment unlocking method and device, terminal equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to simplify the cumbersome steps of information verification when verifying and unlocking the lock device through verification information, and reduce the maintenance cost of information verification for device unlocking, the embodiments of the present application provide a device unlocking method, device, terminal device and medium.

[0045] refer to Figure 1a Shown is a schematic structural diagram of a lock device provided in this application. The lock device 100 includes: a processor 110 , a memory 120 , a power supply 130 , a display unit 140 , an input unit 150 , a mechanical lock 160 and a communication module 170 .

[0046] The processor 110 is the control center of the lock device 100. It uses various interfaces and lines to connect various components, and executes various functions of the lock device 100 by running or executing software programs and / or data stored in the memory 120, thereby controlling the lock. The device is monitored as a whole.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an equipment unlocking method and device, terminal equipment and a medium and belongs to the technical field of computers. The method comprises a step of outputting a graphic authentication code generated based on a random number and a lock equipment serial number, a step of receiving verification information returned by a terminal based on a scanned graphic authenticationcode, wherein the verification information is obtained by encrypting a private key pair random number set based on a corresponding lock equipment serial number, a terminal serial number and a number of unlocking times, a step of decrypting the verification information by using a stored public key to obtain the random number, the terminal serial number and the number of unlocking times, and a stepof carrying out information verification based on the random number, the terminal serial number and the number of unlocking times included in the verification information, and executing an unlocking operation when the verification is successful. In this way, remote data processing by a server is not required, the cumbersome steps of the information verification are simplified, and the maintenancecost of equipment unlocking is reduced.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a device unlocking method, device, terminal device and medium. Background technique [0002] With the development of Internet of Things technology, in order to improve security, information verification methods are also increasing. In the prior art, the lock device is usually unlocked in a manner of verifying through a remote server. For example, after the terminal scans the static QR code of the shared bicycle, the remote server performs information verification, and the lock device unlocks based on the unlocking instruction sent by the remote server. [0003] However, in this way, information processing and verification are performed through the server, and the steps are cumbersome and the maintenance cost is relatively high. Contents of the invention [0004] The embodiments of the present application provide a device unlocking method, device, terminal devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06G07C9/00
CPCG07C9/00309G07C9/00571G07C2009/005G07C9/23H04L9/0869H04L63/06H04L63/062H04L63/067
Inventor 魏中志温作奖胡伯良
Owner BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products