New Sci & Tech. cipher lock and design method of key thereof
A design method and a combination lock technology, applied in the field of combination locks, can solve the problems of low number of password digits, limited password sources, and poor confidentiality.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0012] 1. The source of the password: ① Various files generated by the user through operating computer programs, such as *.doc files generated by the user with Word document editing software. ②The user collects information that exists objectively in the world to form data files, such as photos taken with a digital camera, sounds recorded with an mp3 player that can record, etc. ③Users use their imagination to write and draw any text, graphics, and symbols as passwords.
[0013] 2. The user stores the codes designed by himself in the memory for storing the codes in the lock and in the mobile storage device as the key, inserts the key into the lock, and the computer system in the lock calculates and compares the two sets of codes, and it is in line with the requirements of the user. When the predetermined requirements are met, the computer system controls the mechanical part of the lock, thereby generating the opening and closing functions.
[0014] 3. Using the handwriting inp...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com