Unlock instant, AI-driven research and patent intelligence for your innovation.

Control method of using locking device of mobile phone

A technology of locking device and control method, which is applied in the direction of safety device, selection device, remote measurement/remote control selection device, etc., can solve problems such as difficulties in ensuring safety, and achieve the effect of improving safety

Inactive Publication Date: 2006-11-01
LG ELECTRONICS (CHINA) R&D CENT CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for conventional locking devices that use passwords, the passwords used are generally fixed, so it is difficult to ensure security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method of using locking device of mobile phone
  • Control method of using locking device of mobile phone
  • Control method of using locking device of mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Refer below Figure 1 to Figure 3 Next, the method of controlling the locking device of the present invention configured as above will be described in detail.

[0013] First, refer to figure 1 and figure 2 The authentication procedure applied to the mobile phone of the present invention will be described.

[0014] After the base station (BS: Base Station) 1 generates a number in a random form (RAND—seed value), it generates authentication request information (Authentication Challenge Message) including the number, and sends the mobile station (MS: Mobile Station, for example: mobile phone) 2 transmission.

[0015] Then, the above-mentioned base station 1 and mobile station 2 calculate an authentication value (AUTHR—digital signature), and transmit the authentication value (AUTHR) calculated by the mobile station 2 to the base station 1 .

[0016] At this time, the above-mentioned base station 1 compares the authentication value (AUTHR) calculated by itself with the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a control method using a locking device of a mobile phone, which applies the authentication steps of the mobile phone to the locking device, and controls the driving of the locking device through a new password all the time. The present invention is realized through the following processes: the first process, constructing the interface between the mobile phone and the locking device, and judging whether the user has input the authentication operation key; the second process, generating authentication request information including a random number in the mobile phone, and sending it to the locking device After the transmission, the authentication value is calculated respectively; in the 3rd process, after the authentication value generated in the mobile phone is transmitted to the locking device, the locking device compares the authentication value calculated by itself with the authentication value received from the mobile phone, according to Is it consistent to decide whether to release the locked state.

Description

technical field [0001] The present invention relates to the technology of controlling the driving of the locking device by using the authentication function of the terminal, in particular, it relates to a locking device using a mobile phone which applies the authentication steps of the mobile phone to the locking device and always controls the driving of the locking device through a new password. The control method of the device. Background technique [0002] In general, as a locking device applied to access control devices such as entrances and gates, there are expensive locking devices that use biometrics such as fingerprint recognition or retinal recognition, and as popular locking devices, there are locking devices that use combination locks. and a locking device utilizing a key. [0003] Like the above-mentioned locking device using a combination lock, the locking device using a password has the advantages of not losing the key and not needing to carry it, and has been...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32H04Q9/00H04M1/725
CPCH04Q9/00H04W12/06
Inventor 崔映吉
Owner LG ELECTRONICS (CHINA) R&D CENT CO LTD