Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization method of electronic key, storage medium and computer equipment

An electronic key and equipment technology, applied in electrical components, instruments, transmission systems, etc., can solve problems such as low security and inability to effectively detect authorization information, and achieve the effect of improving security and reliability

Active Publication Date: 2021-06-25
PETROCHINA CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an electronic key authorization method, storage medium and computer equipment, so as to at least solve the problem of using offline electronic key authorization in related technologies, which cannot Low security technical problems caused by effective detection of authorized information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method of electronic key, storage medium and computer equipment
  • Authorization method of electronic key, storage medium and computer equipment
  • Authorization method of electronic key, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] According to an embodiment of the present invention, an embodiment of an authorization method for an electronic key is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0028] figure 1 is a flowchart of an electronic key authorization method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0029] Step S102, establishing a communication network between the electronic key and the electronic lock control assembly equipment;

[0030] The communication networking described above is constructed based on wireless network protocols, wherein the wireless network protocols include but not limited...

Embodiment 2

[0082] According to another aspect of the embodiments of the present invention, a storage medium is also provided, and the storage medium stores a program, wherein when the program is executed by the processor, the processor is controlled to execute any one of the electronic key authorization methods described above.

Embodiment 3

[0084] According to another aspect of the embodiments of the present invention, there is also provided a computer device, including: a memory and a processor, the memory stores a computer program; the processor is used to execute the computer program stored in the memory, and when the computer program runs, the processing The device executes the authorization method of any one of the above-mentioned electronic keys.

[0085] The serial numbers of the above embodiments of the present invention are for description only, and do not represent the advantages and disadvantages of the embodiments.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization method of an electronic key, a storage medium and computer equipment. The method comprises the following steps that a communication network of an electronic key and electronic lock control assembly equipment is established; the electronic key sends an unlocking request based on communication networking, and the electronic lock control assembly equipment forwards the unlocking request to the server side; the server performs authentication according to the unlocking request to obtain an authentication result; according to the authentication result, the unlocking operation or the locking operation of the electronic key on the electronic lock control assembly equipment is determined. According to the method, the technical problem of low safety caused by incapability of effectively detecting authorization information due to adoption of off-line electronic key authorization in related art is solved.

Description

technical field [0001] The invention relates to the field of local area network equipment, in particular to an electronic key authorization method, storage medium and computer equipment. Background technique [0002] At present, the electronic keys used with explosion-proof passive intelligent electronic locks mostly use offline authorization and authentication methods. That is, the authorization information of the explosion-proof passive intelligent electronic lock is stored in the electronic key in advance. When the electronic key is used to unlock the lock, the key and the lock communicate and authenticate, and the lock is unlocked after the authentication is passed. This mode has two problems: first: the authorization information is pre-stored in the middle of the electronic key, and there is no way to detect whether the authorization information has expired. Second: This method requires the electronic key to be in the power-on state for a long time, which consumes a lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00H04L29/06
CPCG07C9/00571H04L63/10
Inventor 张君劼杨靖袁梁马健张韬王睿强志勇郑朝新王疆邢珂铱
Owner PETROCHINA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products