Authorization method of electronic key, storage medium and computer equipment
An electronic key and equipment technology, applied in electrical components, instruments, transmission systems, etc., can solve problems such as low security and inability to effectively detect authorization information, and achieve the effect of improving security and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] According to an embodiment of the present invention, an embodiment of an authorization method for an electronic key is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0028] figure 1 is a flowchart of an electronic key authorization method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:
[0029] Step S102, establishing a communication network between the electronic key and the electronic lock control assembly equipment;
[0030] The communication networking described above is constructed based on wireless network protocols, wherein the wireless network protocols include but not limited...
Embodiment 2
[0082] According to another aspect of the embodiments of the present invention, a storage medium is also provided, and the storage medium stores a program, wherein when the program is executed by the processor, the processor is controlled to execute any one of the electronic key authorization methods described above.
Embodiment 3
[0084] According to another aspect of the embodiments of the present invention, there is also provided a computer device, including: a memory and a processor, the memory stores a computer program; the processor is used to execute the computer program stored in the memory, and when the computer program runs, the processing The device executes the authorization method of any one of the above-mentioned electronic keys.
[0085] The serial numbers of the above embodiments of the present invention are for description only, and do not represent the advantages and disadvantages of the embodiments.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com