Remote unlocking method and system

A remote, unlocking request technology, applied in the field of remote unlocking, can solve problems that do not meet the security design principles

Inactive Publication Date: 2020-06-26
HANGZHOU TUYA INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution does not conform to the design principle of security. At the same time, if the process of issuing instructions from the cloud generates security problems, it may lead to great security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote unlocking method and system
  • Remote unlocking method and system
  • Remote unlocking method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0047] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It should be understood that the data so used may be interchanged under appropriate circumstances for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a remote unlocking method. The method comprises the steps that a control end sends an unlocking request to an electronic lock; an electronic lock generates a random password; the electronic lock encrypts the random password and sends the random password to the control end; the control end sends the encrypted random password to a server end; the server end decrypts the encrypted random password; the server end sends the random password subjected to unlocking designation and decryption to the electronic lock; when the decrypted random password passes the verification, enabling the electronic lock to execute an unlocking action. Compared with the prior art, the method has the following beneficial effects that the password is input through the panel and serves as a basic factor of cloud verification, and it is guaranteed that the unlocking password is mastered in the hand of a user. Through transformation, the original factor input by the user is protected to be random. Information encryption is completed through a key in hardware of the door lock and is transparently transmitted to the APP, and it is guaranteed that the APP cannot complete decryption and obtainsensitive information.

Description

technical field [0001] This application relates to the field of smart home, in particular, to a remote unlocking method. Background technique [0002] There is a special requirement for door locks, that is, in scenarios where the security requirements are not very high, the user does not need to enter a password to open the door. In this scenario, the user can simply open and close the door without repeatedly entering the password. [0003] At present, the main practice in the industry is to issue a simple control command to directly issue a door-opening command. After the door lock receives the door-opening command, it directly executes the process of opening the door. This solution does not conform to the design principle of security. At the same time, if the process of issuing instructions from the cloud generates security problems, it may lead to great security risks. In high-security scenarios such as door locks, the password of the door lock should be in the hands of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/00571G07C2009/00412
Inventor 刘龙威
Owner HANGZHOU TUYA INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products