CN107391969A - Intelligent apparatus software key management method - Google Patents
Intelligent apparatus software key management method Download PDFInfo
- Publication number
- CN107391969A CN107391969A CN201610326171.2A CN201610326171A CN107391969A CN 107391969 A CN107391969 A CN 107391969A CN 201610326171 A CN201610326171 A CN 201610326171A CN 107391969 A CN107391969 A CN 107391969A
- Authority
- CN
- China
- Prior art keywords
- password
- peripheral device
- substrate
- intelligent
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1015—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Selective Calling Equipment (AREA)
Abstract
The present invention discloses a kind of intelligent apparatus software key management method, includes:Start an application program;An intelligent apparatus is selected as a key apparatus;Judge whether the application program has the substrate for producing password;The substrate is transmitted to a peripheral device positioned at the same space with wireless signal, a password is produced with described substrate, sends password to peripheral device;In changing a password at interval of a period of time, repeat and carry out producing a password with described substrate;The peripheral device, using password generator, produces another password after the substrate of key apparatus is received;And password caused by peripheral equipment receiver key apparatus, compare whether password and the caused password of reception are identical, and the successful matching if identical, peripheral device performs unblock or loading customized settings.To reach security and personalized safety control and the streamlining management that enhancing intelligent apparatus uses, the convenience purpose of intelligent apparatus is lifted.
Description
Technical field
It is espespecially a kind of to pass through a software the present invention relates to a kind of intelligent apparatus software key management method
Application program is realized, performs unblock/unlocking of management different type intelligent apparatus, or loading individualizes
Setting.
Background technology
Existing intelligent apparatus has been widely deployed in various types of consumption electronic products
In, the security lock technology about intelligent apparatus, often there is the safety each untied on each device
Lock, the intelligent apparatus of different kenels may have different unlocking manners or different passwords to need to input,
It is very numerous and diverse;If habitually multiple devices oneself used are set as with individual close using user
Code, then the money of security can be caused to pacify problem.And between each device do not have one management
Medium, if it is desired to apply mechanically that user oneself is personalized to be set on each intelligent apparatus, it is necessary to
Oneself manual handle related setting, it is quite inconvenient, it is to be improved.
The content of the invention
The present invention discloses a kind of intelligent apparatus software key management method, is with a software application
Realize, the application program is arranged on personal mobile phone or various intelligent apparatus, application program
It will substitute old safety lock after software installation, as screen protection program, can effectively manage difference
Unblock/unlocking of type intelligent apparatus, or the security and operation ease of loading customized settings.
Intelligent apparatus software key management method of the present invention, including:Start an application program;
An intelligent apparatus is selected as a key apparatus;Judge whether the application program has the base for producing password
Bottom;The substrate is transmitted to a peripheral device positioned at the same space, the periphery with wireless signal
The application program is stored in device;With the substrate, a password is produced with a password generator;
The password is sent to peripheral device;A password is changed at interval of a period of time, repeats progress
A password is produced with the substrate, and sends the password to peripheral device;Wherein, peripheral device
After the substrate of key apparatus is received, using the password generator, another password is produced;And week
Side device receive key apparatus caused by password, compare reception password and caused password whether
Identical, the successful matching if identical, peripheral device performs unblock or loading customized settings.
Described judges whether application program has the step of substrate for producing password, if being judged as not having
Produce, then perform using a media access control address as substrate or the substrate of user's self-defining one.
Described peripheral device is before the substrate step of key apparatus is received, including judges that periphery fills
Whether the application program put has the substrate for producing password;If so, then execution is described another with substrate generation
One password.
The step of password that described peripheral device compares key apparatus is matched, if pairing failure,
Then peripheral device performs changes a password at regular intervals, and continues to receive the close of key apparatus
Code, the peripheral device is a time parameter at regular intervals;The interval of the key apparatus
A period of time is another time parameter.
Described peripheral device produces another password using the password generator, is described
Within the certain interval of time of key apparatus, described another password is produced.
Described password generator is the password generator changed for a random number.
The substrate of described generation password, it is with a sequence is digital or a random number and the substrate that defines.
Described key apparatus is a smart mobile phone, and described peripheral device is an intelligent apparatus, or
One tablet PC, an intelligent watch, an intelligent television, a notebook are an intelligence
Remote control.
Described intelligent apparatus software key management method, it is when the key fills to include a step
Put with the peripheral device not in the same space, peripheral device can automatic locking or removal individualize
Setting.
Described peripheral device be at regular intervals to be same as described in the key apparatus between
Both every a period of time, i.e., time parameter is identical.
Brief description of the drawings
Fig. 1 is the schematic diagram of the various intelligent apparatus of unblock of the embodiment of the present invention.
Fig. 2 be the embodiment of the present invention intelligent home in various intelligent apparatus use state diagram.
Fig. 3 is the flow chart of the intelligent apparatus software key management method of the embodiment of the present invention.
Fig. 4 is the flow chart of the intelligent apparatus software key management method of another embodiment of the present invention.
Embodiment
It is with software application the present invention relates to a kind of intelligent apparatus software key management method
Mode, application program is arranged on personal mobile phone or various intelligent apparatus, application program installation
Old safety lock can be substituted afterwards, as screen protection program.The method of the present invention mainly uses
Conventional intelligent apparatus is pre-selected as a key (such as selection mobile phone is as key) in person;Then by
As the intelligent apparatus of key, a password can be produced, and caused password is sent with wireless signal
Go out to match to other intelligent apparatus.Period can continuous random number more new password, wait to be paired
Success.When other intelligent apparatus or equipment are in receiving password, and after successful matching, each intelligence
Device can unlock and load the personalized setting of user.Therefore the present invention can strengthen intelligent home
Security and personalized safety control and streamlining management, lift the convenience of intelligent apparatus.
Fig. 1 is the unblock schematic diagram of all types of intelligent apparatus of the embodiment of the present invention.Which includes
One mobile phone 10, one first tablet PC 20, one second tablet PC 30, an intelligent watch
40th, an intelligent television 50, a notebook 60 and an intelligent remote controller 70.Fig. 1 institutes
It is that user is selected using mobile phone 10 as a key (KEY) to show embodiment, and mobile phone 10 is an intelligence
Can mobile phone.Chain coil turn in Fig. 1 is expressed as a hypothetical world, relative to hand in the range of this
Each intelligent apparatus of machine 10 such as the first tablet PC 20, the second tablet PC 30, intelligence
Wrist-watch 40, intelligent television 50, notebook 60 and intelligent remote controller 70 etc., all in institute
State in scope and transmission signal and can wirelessly be matched with mobile phone 10, if successful matching,
Each intelligent apparatus can be made to load personalized setting after performing unblock, or phase interconnections.
Fig. 2 shows the pairing situation of each intelligent apparatus in an intelligent home, intelligent family described first
Four spaces are divided into garden, such as have four rooms, between each room because wall isolation and
It can not transmit or receive each other wireless signal.Wherein notebook 60 divides with intelligent watch 40
Not in not chummery, intelligent television 50 and intelligent remote controller 70 in same room with them, mobile phone 10 with
First tablet PC 20 is similarly to select mobile phone 10 to make with user in another room
For key.
Because notebook 60, intelligent watch 40, intelligent television 50 and intelligence are distant in Fig. 2
Control device 70 is not matched with mobile phone 10 in same room (or space), so not chummery
Notebook 60, intelligent watch 40, intelligent television 50 and intelligent remote controller 70 present and lock
State firmly, now anyone can not all use the intelligent apparatus.Only with 10 same room of mobile phone
Between the first tablet PC 20 matched, in successfully match after the first tablet PC 20 be
Unblock, and can carry out personalized setting after unlocking.So except the first described tablet PC
20 can use outer, notebook 60, intelligent watch 40, the intelligence electricity in remaining other room
It can not all be used with intelligent remote controller 70 depending on 50.
The present invention can carry out software key control management for different type intelligent apparatus, and reach
The purpose of safe handling.If user to operate with notebook 60 in not chummery,
The devices such as intelligent watch 40, intelligent television 50 and intelligent remote controller 70, then user must carry
It is considered as the mobile phone 10 of key through being chosen, mobile phone 10 is carried out to different rooms (or space) is interior
Intelligent apparatus with being placed in room is matched, when successful matching i.e. perform unblock, be afterwards
It can use, or personalized setting can be loaded.
Fig. 3 is the flow chart of intelligent apparatus software key management method of the present invention.First, step S10,
To start application program, then whether step S20, the device for judging to use are used as key.In reality
During operation, before step S20, including step S201, a certain intelligent apparatus conduct is selected by user
Key, it is to select mobile phone 10 as a key apparatus in embodiment as shown in Figure 1 and Figure 2
Explain.
When step S20 judged result is yes, a certain intelligent apparatus for representing to use at present is conduct
Key, as a key apparatus, step S30 is then carried out, judge the application journey of the key apparatus
Whether sequence has the substrate for producing password, if application program does not produce the substrate of password, is walked
Rapid S31, with media access control address (MAC Address) for substrate or self-defining substrate,
Then step S32 is carried out, sends aforementioned substrates to peripheral device.Foregoing transmission is mobile phone 10
The substrate is transmitted in a manner of wireless signal to peripheral device.Described peripheral device refers to such as figure
1st, the first tablet PC 20 shown in Fig. 2, the second tablet PC 30, intelligent watch 40,
Various types of intelligent apparatus such as intelligent television 50, notebook 60 and intelligent remote controller 70,
Being can be as the intelligent apparatus that wireless online and pairing are carried out between the mobile phone of key.If step S30
Judge that application program has the substrate for producing password, then directly perform abovementioned steps S32.Then step is performed
Rapid S33, password is produced with the substrate.Then step S34 is performed, sends the password to periphery
Device, then perform step S35, calculate one Change Password time, the foregoing Change Password time,
For example, 10 seconds, after the Change Password time is reached, repeat step S33 and S34.
Operating technology content described in above-mentioned steps S30 to step S35, primarily directed to being used
Person is selected as intelligent apparatus-mobile phone 10 of key, the operating technology of required execution.Wherein, walk
Whether rapid S30, the device for judging to use have the substrate for producing password, it is therefore intended that judge the dress used
Whether put is to be chosen for key apparatus for the first time, if, then it represents that key apparatus is without generation password
Substrate, so can then enter step S31 form key apparatus substrate.In step
In S33~S35 circulation step, mobile phone 10 it is sustainable execution at regular intervals (such as:10 seconds)
A password is changed, and this password is sent to other peripheral devices in same room or space
(for intelligent apparatus), and matched.
Wherein step S33 produces password with the substrate, is with a password generator, inputs substrate
Afterwards, plus time parameter (i.e. password change time point), a password is produced.Described password generator can
The password generator changed for a random number;Described substrate can be sequence numeral or a random number
And the substrate defined.
If the device that step S20 judges to use in Fig. 3 is not intended as key, the device used is represented
It is that must be matched with selection for the intelligent apparatus of key, the device used is unlocked whereby,
The device used is a peripheral device for key apparatus.Then step S50 is performed,
Judge whether application program has the substrate for producing password, if not producing the substrate of password, perform
Step S51, receive the substrate of key apparatus.Then step S52 is performed, receives the close of key apparatus
Code, such as (such as precedent, mobile phone have been chosen as key to used device execution reception mobile phone 10
Device) password.Then step S53 is performed, password is produced with substrate;If sentence in step S50
Disconnected application program has the substrate for producing password, then directly performs step S52 reception key apparatus
Password, perform step S53 again afterwards, password is produced with substrate.Then step S54 is performed, is compared
Whether the password of reception and caused password are identical.If it is identical to compare cryptographic results, then it represents that is matched somebody with somebody
To success, that is, step S55 is performed, load personalized setting or unblock described device;If than
To cryptographic results to differ, pairing failure is represented, then performs step S56, it is close to calculate one section of change
The code time, foregoing Change Password time, for example, 10 seconds, after the Change Password time is reached, weight
Step S52 to S54 is performed again.
Operating technology content described in above-mentioned step S50 to step S56, primarily directed to use
Other all kinds intelligent apparatus of the peripheral device in addition to as key apparatus, e.g. scheme
1st, the first tablet PC 20 in Fig. 2, the second tablet PC 30, intelligent watch 40, intelligence
Energy TV 50, notebook 60 and intelligent remote controller 70 etc., various types of intelligence dresses
Put in the operating technology performed needed for embodiment.Wherein, step S50, the device for judging to use
Application program whether have produce password substrate, it is therefore intended that judge the device used whether be
For the first time be chosen for peripheral device, if for the first time be selected, then it represents that the peripheral device without
Produce password substrate, can then enter step S51, receive key apparatus substrate be used as described in
One substrate of peripheral device.In step S52~S54 circulation step, the peripheral device can
Continuously carry out at regular intervals (such as:10 seconds) password of change, and by this caused password
It is compared with the password received from mobile phone 10 (for key apparatus), after comparison result is identical,
Successful matching is represented, the operation of customized settings or unblock can be carried out.Wherein described periphery dress
The interval time for putting Change Password is, meaning consistent with the interval time of the key apparatus Change Password
That is, to successful matching, except the substrate of key apparatus and peripheral device will unanimously in addition to, Liang Zhebian
More password institute interlude also must be consistent, that is, point is consistent in real time.
Password is produced with substrate described in wherein step S53, is to use to be same as described in step S33
Password generator, after the received substrate (or existing substrate) of input, plus time parameter (password
Change time point), produce another password.Described password generator can be the password that a random number changes
Maker;The substrate that described substrate can define for sequence numeral or a random number.
Fig. 4 is another embodiment of the present invention, and the difference with Fig. 3 embodiments is on the periphery in Fig. 4
Device timing is to use relative timing, that is, after the password for receiving mobile phone 10, one section of change of timing is close
Code time (such as 10 seconds), peripheral device must produce a new password in the interval of the time,
And matched with the password of reception.Therefore Fig. 3 step S56 is eliminated in Fig. 4, and the step of Fig. 4
S53A, it is to perform to produce password with substrate within the one Change Password time of key apparatus.
In the present embodiment, step S33 and S53A produces password with substrate, in addition to inputting substrate,
The time parameter added is that is, foregoing one Change Password time for a period of time.
As described above, the implementation operating technology of the present invention is can be arranged on various types of intelligence to fill
In putting, it can briefly be divided into two kinds of device kenels:
1. elect the intelligent apparatus of key apparatus as:After selected substrate, password, password are produced with substrate
It will be updated in a period of time;Performed via the application program in key apparatus or one are resident
Program, send password and matched with peripheral device.
2. the intelligent apparatus for the peripheral device being managed:It can be produced with the substrate of the key apparatus close
Code, by the application program or a resident executive of peripheral device, receive key apparatus transmission
Password, and whether the password for comparing reception is identical with oneself caused password, identical then successful matching.
In the embodiment of the present invention, included password generator is available for after inputting substrate, and it is close to produce one
Code.The mode for actually including but not limiting to change using random number produces password, and protection whereby is used
The privacy at family is as follows in the practice for actually producing password and pairing:
1. using the information that is chosen to be on key apparatus as the substrate for producing password, such as can be matchmaker
Body accessing to control address (MAC address), a sequence are digital (serial number) or one
Random number etc., can one substrate of self-defining.
2. after key apparatus has defined substrate, make the pairing of first time with peripheral device, periphery is allowed
Device obtains same substrate.
3. after obtaining substrate, peripheral device can produce password, at interval of password meeting after a period of time
Random number changes, and same substrate can produce identical password plus the device of same time parameter.
4. after successful matching, other devices can also do interaction in addition to unblock with key apparatus,
The customized settings of user can be loaded.
5. when key apparatus is away from peripheral device, as shown in Fig. 2 then in peripheral device meeting automatically
Lock and removal customized settings.
Coordinate the embodiment disclosed in Fig. 1, Fig. 2, illustrate:The executable control intelligence of the present invention
TV 50, the channel that user can load hobby do list, also can the channel most often viewed and admired of list,
By mobile phone pairing intelligent television is performed, personalized setting is loaded after successful matching.Equally
Ground, the present invention can also control music player to play the song often listened, or will see on mobile phone
Information transmission is to going sight-seeing on flat board or personal computer.
The technique effect that the present invention is reached is described as follows:
1. the present invention is using the password generator of random number, for a period of time will more new password,
It is safe to use to ensure, can be with every 10 seconds for interval time during practical operation.
2. employing wireless signal transmits password, as long as in the range of the device as key enters, match somebody with somebody
To success, can be carried with making corresponding action, such as unblock, loading personal information etc.
Rise convenience.
3. promoting the security of each intelligent apparatus and individualized keyholed back plate, lifting uses the convenience operated.
In summary, the present invention proposes a kind of intelligent apparatus software key management method, is with software
The mode of application program, application program is arranged on personal mobile phone or various intelligent apparatus, should
Old safety lock can be substituted after being installed with program, as screen protection program, to reach enhancing intelligence
The security and personalized safety control and streamlining management that energy device uses, lift intelligent apparatus
Convenience purpose.Obvious case of the present invention possesses the important document applied for a patent.So, description of the present invention
It is described, only preferred embodiment for example, when the scope protected of the present invention can not be limited,
Any local variation, amendment or increased technology, without departing from the scope of the invention protected.
Claims (10)
- A kind of 1. intelligent apparatus software key management method, it is characterised in that including:Start an application program;An intelligent apparatus is selected as a key apparatus;Judge whether the application program has the substrate for producing password;The substrate is transmitted to a peripheral device positioned at the same space, the periphery with wireless signal The application program is stored in device;With the substrate, with a password generator, a password is produced;The password is sent to the peripheral device;In changing a password at interval of a period of time, repeat carry out it is one close with substrate generation Code, and the password is sent to the peripheral device;AndWherein, the peripheral device uses the password after the substrate of the key apparatus is received Maker, produce another password;It is and close caused by key apparatus described in the peripheral equipment receiver Code, compares whether password and the caused password of reception are identical, and the successful matching if identical is described Peripheral device performs unblock or loading customized settings.
- 2. intelligent apparatus software key management method as claimed in claim 1, it is characterised in that Wherein judge whether the application program has the step of substrate for producing password, if being judged as not producing It is raw, then perform using a media access control address as substrate or the substrate of user's self-defining one.
- 3. intelligent apparatus software key management method as claimed in claim 1, it is characterised in that Wherein described peripheral device is before the substrate step of the key apparatus is received, in addition to judges institute State whether the application program of peripheral device has the substrate for producing password;If so, then perform with the base Bottom produces another password.
- 4. intelligent apparatus software key management method as claimed in claim 1, it is characterised in that The step of password that wherein described peripheral device compares the key apparatus is matched, if pairing Failure, then the peripheral device performs changes a password at regular intervals, and continues to receive institute The password of key apparatus is stated, the peripheral device is a time parameter at regular intervals;It is described The certain interval of time of key apparatus is another time parameter.
- 5. intelligent apparatus software key management method as claimed in claim 1, it is characterised in that Wherein described peripheral device produces another password using the password generator, is described In the certain interval of time of key apparatus, another password is produced.
- 6. intelligent apparatus software key management method as claimed in claim 1, it is characterised in that Wherein described password generator is the password generator changed for a random number.
- 7. intelligent apparatus software key management method as claimed in claim 1, it is characterised in that The substrate of wherein described generation password, it is the base to be defined with sequence numeral or a random number Bottom.
- 8. intelligent apparatus software key management method as claimed in claim 1, it is characterised in that Wherein described key apparatus can be a smart mobile phone, and described peripheral device is an intelligent apparatus, Or for a tablet PC, an intelligent watch, an intelligent television, a notebook or it is one Intelligent remote controller.
- 9. intelligent apparatus software key management method as claimed in claim 1, it is characterised in that Include a step be when the key apparatus and the peripheral device be not in the same space, it is described Peripheral device can automatic locking or removal customized settings.
- 10. intelligent apparatus software key management method as claimed in claim 4, it is characterised in that Wherein described peripheral device be at regular intervals to be same as described in the key apparatus between Both every a period of time, i.e., time parameter is identical.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610326171.2A CN107391969B (en) | 2016-05-17 | 2016-05-17 | Intelligent device software key management method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610326171.2A CN107391969B (en) | 2016-05-17 | 2016-05-17 | Intelligent device software key management method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN107391969A true CN107391969A (en) | 2017-11-24 |
| CN107391969B CN107391969B (en) | 2020-06-12 |
Family
ID=60338498
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610326171.2A Active CN107391969B (en) | 2016-05-17 | 2016-05-17 | Intelligent device software key management method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107391969B (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6047258A (en) * | 1997-08-11 | 2000-04-04 | Trimble Navigation Limited | Renting/leasing instrument options using satellite positioning system |
| CN103266816A (en) * | 2013-04-11 | 2013-08-28 | 陈茂荣 | Lock management system |
| CN104167029A (en) * | 2013-05-20 | 2014-11-26 | 陈罡 | Intelligent lock and operation method thereof |
-
2016
- 2016-05-17 CN CN201610326171.2A patent/CN107391969B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6047258A (en) * | 1997-08-11 | 2000-04-04 | Trimble Navigation Limited | Renting/leasing instrument options using satellite positioning system |
| CN103266816A (en) * | 2013-04-11 | 2013-08-28 | 陈茂荣 | Lock management system |
| CN104167029A (en) * | 2013-05-20 | 2014-11-26 | 陈罡 | Intelligent lock and operation method thereof |
Also Published As
| Publication number | Publication date |
|---|---|
| CN107391969B (en) | 2020-06-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3158541B1 (en) | Electronic access control device and access control method | |
| CN106163887B (en) | Electronic key device, system and method for wireless control of locking system and transmission of control authority | |
| US9106271B2 (en) | System for programming a lock comprising contactless NFC communication means | |
| EP2804153A1 (en) | Electronic lock, locking system, method of operating an electronic lock, computer program product | |
| US20220035900A1 (en) | Enhanced Authentication for IMD Communication | |
| US20020024420A1 (en) | Key for selectively allowing access to an enclosure | |
| CN104167029A (en) | Intelligent lock and operation method thereof | |
| CN104052817A (en) | Intelligent door and intelligent door control method and system | |
| CN110163995A (en) | Remote control electric lock system and its encipher-decipher method | |
| CN106465119A (en) | Method for the secure access to a field device | |
| CN105938634A (en) | Secure keypad code entry | |
| CN109891852A (en) | For providing the device and method of the trust domain of user configuration | |
| KR200478030Y1 (en) | A Remote Lock System using Wireless Communications | |
| CN106157409A (en) | Communication means between intelligent terminal and gate inhibition and device | |
| CN107391969A (en) | Intelligent apparatus software key management method | |
| CN105972762B (en) | Remote controller and control method and device thereof | |
| CN110298947B (en) | Unlocking method and electronic lock | |
| KR101996890B1 (en) | Control system and method for locking device | |
| TW202325968A (en) | Method for operating a lock device | |
| JP2013209821A (en) | Electric lock system | |
| JP6956378B2 (en) | Electric lock control system | |
| EP3905082B1 (en) | Remote control system | |
| KR20140007527A (en) | Digital door lock system for preventing password disclosure via nfc functional device and operating method thereof | |
| TWI638081B (en) | Remote control electronic lock system and encrypting/decrypting method | |
| CN106339611A (en) | Remote unlocking method and intelligent terminal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |