Digital cipher lock with secure secondary authorization unlocking function

A coded lock and digital technology, applied in the field of digital coded locks, can solve problems such as inappropriateness, potential safety hazards, limited parameters, etc., and achieve the effect of improving security, high security, and eliminating super passwords

Inactive Publication Date: 2006-12-13
黄涛
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantage is: due to the limited parameters involved in the operation, the digital password lock with the same encryption algorithm can be opened by the "super password" with the same encryption algorithm "override device" operation
Another shortcoming of this technology is: there is no mechanism for verifying and authenticating the identity of the party who requires to generate the "super password", and anyone who has access to the digital combination lock can generate random numbers, and then requires possession of an "overridden device" (overridden device). ) to generate a "super password" to obtain the authorization to open the digital combination lock, thus leaving a security risk
Therefore, this technology is also only suitable for the use environment where digital combination locks are distributed in a small area and managed centrally, such as hotel room safes.
It is not suitable for the management of after-sales service of digital combination locks distributed in a wide range

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital cipher lock with secure secondary authorization unlocking function
  • Digital cipher lock with secure secondary authorization unlocking function
  • Digital cipher lock with secure secondary authorization unlocking function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Now in conjunction with accompanying drawing, technical solution and embodiment are further described:

[0022] figure 1 , Schematic diagram of the feedback shift register.

[0023] Shift register sequences are used in cryptography and coding theory. Since the beginning of the electronic age, sequence ciphers based on shift registers have been widely used in encryption operations in military cryptography. A feedback shift register consists of two parts: the shift register and the feedback function. A shift register is a sequence of bits. Each time a bit is needed, all bits in the shift register are shifted to the right (left) by one bit, and the new leftmost (right) bit is calculated based on other bits in the shift register. The feedback function performs logic operations with certain bits in the shift register (these bits are called tap sequences) in a certain way to form the new leftmost (right) bit of the shift cycle.

[0024] figure 2 , The schematic diagram ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a digit code lock technique and relative system. Wherein, it uses the digit encrypt technique to solve the problem of second authorization unlocking when the user forgets the unlock code. It is characterized in that: the code generator software of personal computer and the code lock embedded system with relative algorism form said invention; when unlocking, the code generate software uses digit encrypt technique on one group of digit code that stored in the digit lock embedded system to generate code; the code lock embedded system also uses the same digit encrypt technique to calculate the same code to generate another code; then inputting the code of code generate software into digit lock embedded system, and the embedded system compares the input code with itself code, if they are same, authorizing it and unlocking the digit lock; or else, rejecting. The invention has better safety, high anti-impact ability and easy management.

Description

technical field [0001] The invention belongs to the category of digital coded locks, and uses digital code technology to solve the problem of the safe second authorized opening of digital coded locks. Background technique [0002] Digital combination locks have been widely used in file cabinets, safe deposit boxes, temporary lockers, etc. because they are easy to use without keys. However, due to password forgetting, password confusion or other reasons, such as hotel guests accidentally locking the hotel's digital code lock safe deposit box when they leave, the digital code lock cannot be opened. Need a kind of method to make the user (as forgetting, the owner of the file cabinet who confuses the password, the hotel manager etc.) with legal authorization can open the digital combination lock in this case. Traditional solutions include the following: the manufacturer of the digital combination lock will reserve a "super password", the so-called "back door", and use the "supe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): E05B49/00
Inventor 黄涛
Owner 黄涛
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products