Encryption-based Wireless Unlocking Method

A wireless and wireless terminal technology, applied in wireless communication, instruments, electrical components, etc., can solve problems such as uncontrollable authorization, unsafe locks, hidden dangers, etc.

Active Publication Date: 2021-03-23
广州创想云科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although wireless unlocking is convenient, it also brings hidden dangers.
Attackers (those who try to attack the lock by using air packet capture technology) will capture the communication data of unlocking in the air, and then forge the unlocking authorization or replay the unlocking data to unlock, resulting in uncontrollable authorization and unsafe locks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption-based Wireless Unlocking Method
  • Encryption-based Wireless Unlocking Method
  • Encryption-based Wireless Unlocking Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0096] In the embodiment of the encryption-based wireless unlocking method of the present invention, the structural diagram of the encryption-based wireless unlocking method is as follows figure 1 shown. figure 1 In, this encryption-based wireless unlocking method comprises the steps:

[0097] Step S01 Entering the unlocking process: In this step, start to enter the unlocking process.

[0098] Step S02 submits the effective time range, scope of authority and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption-based wireless unlocking method. The encryption-based wireless unlocking method comprises the following steps of entering an unlocking process; reporting the effective unlocking time range, the authority range and the unlocking reason of a designated lock to an unlocking management platform to apply for an unlocking authority; through the unlocking managementplatform, handing the unlocking authority application to an administrator for examination and approval, who corrects an appropriate time range and an appropriate authority range to complete examination and approval; then generating authorization data via the unlocking management platform; via the unlocking management platform, delivering the authorization data to a wireless terminal, which exchanges encrypted data with the lock; encrypting the authorization data in the wireless data and transmitting the encrypted authorization data to the lock; verifying the encrypted authorization data in thelock to determine whether the encrypted authorization data are legal, if so, unlocking the lock; else, quitting the unlocking process. The encryption-based wireless unlocking method has the advantages of achieving authorization controllability and ensuring key safety, authorization safety and lock safety.

Description

technical field [0001] The invention relates to the field of unlocking, in particular to an encryption-based wireless unlocking method. Background technique [0002] For the communication room and communication box, the construction / maintenance personnel need to borrow the key to unlock the lock, and return the key after the operation is completed, which brings inconvenience to the operation, so there is a demand for unlocking through the wireless terminal, such as: directly through the mobile phone Unlock wirelessly. Construction workers only need to apply for unlocking authorization through mobile phones to unlock; after the work is completed, they can cancel the unlocking authorization through mobile phones. In this way, construction / maintenance personnel do not need to waste time in the process of borrowing and returning keys, which greatly improves work efficiency. However, although wireless unlocking is convenient, it also brings hidden dangers. Attackers (those who...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/03H04W12/04G07C9/00
CPCG07C9/00309G07C9/00571G07C2009/00412
Inventor 黄柏陈思慧邱少师
Owner 广州创想云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products