Unlock instant, AI-driven research and patent intelligence for your innovation.

Portable user terminal

A user terminal and portable technology, applied in the direction of instruments, electrical components, transmission systems, etc., can solve problems that do not involve virtual key security solutions

Active Publication Date: 2020-07-28
武汉大数据产业发展有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disclosed technical solution is only a basic framework of general virtual key technology, and does not involve the security scheme of virtual key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable user terminal
  • Portable user terminal
  • Portable user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The following description is given to enable those skilled in the art to make and use the embodiments, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments should be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present disclosure. Thus, the present invention is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.

[0066] The data structures and code described in the Detailed Description section are typically stored on a computer readable storage medium, which may be any device or medium that can store code and / or data for use by a computer system. Computer-readable storage media include, but are not limited to, volatile memory, nonvolatile memory, magnetic storag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a portable user terminal. According to the technical scheme, the defects of safety, reliability, expandability, the large-scale performance, universality and flexibility of anexisting technical scheme are overcome. The main design idea is that a background system generates a virtual lock cylinder corresponding to each virtual key for each access control device, the virtuallock cylinder can only be opened and read by a combination of a corresponding virtual key and a virtual key affix, and the virtual key and the virtual key affix are generated by a background system and transmitted to a user terminal of an authorized user to be stored. The user terminal transmits the virtual key and the virtual key affix to the access control device in a specially designed mode tocomplete pairing, unlocking and detailed information comparison with the virtual lock cylinder. The whole processing process has the capabilities of tamper resistance, violent cracking resistance, information leakage resistance and counterfeiting resistance, and the flexibility and expandability of lock control are kept.

Description

[0001] This application is a divisional application of a patent with an application date of October 25, 2016, an application number of 201610932849.1, and an invention titled "Virtual Key Method and Device Using the Method, Background System, and User Terminal". technical field [0002] The invention relates to a technology for operating an access control device, in particular to a technology for safely operating an intelligent access control device with a networking function, a background system and a terminal. Background technique [0003] The technologies currently used by existing access control devices include: physical keys, password input, ID / IC card identification, RFID card identification, magnetic card identification, two-dimensional code identification, Bluetooth identification, NFC identification, biometric identification (such as face, Fingerprint, iris, palm print, etc.) etc. In addition to biometric identification, technologies such as physical keys, password ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G07C9/00
CPCH04L63/06H04L63/061H04L63/10G07C9/00174
Inventor 雷飏
Owner 武汉大数据产业发展有限公司