Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Seal lock and encryption identification method, device and system based on same

A verification method and a technology of verification codes, which are applied in the field of seal locks and encryption verification methods based on seal locks, devices and systems, can solve trade disputes, endanger enterprises, institutions/personal property, cargo safety, and cannot verify seals Lock authenticity and other issues, to achieve a wide range of application prospects, to avoid trade disputes and litigation, property or facility security effects

Inactive Publication Date: 2012-11-21
刘玉来
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor found that the prior art has the following disadvantages: the identification code of the seal lock in the prior art is exposed on the surface of the seal lock body, and anyone can easily read it before or after sealing Coding and its coding style, with the advancement and popularization of science and technology and production technology, the production, imitation and purchase of seal locks are extremely easy, which cannot effectively guarantee the safety of property and goods of individuals or enterprises and institutions
Moreover, after the delivery of goods in cross-regional and cross-border trade, the receiver cannot verify the authenticity of the seal lock, which greatly endangers the property and goods safety of enterprises, institutions / individuals, and causes unnecessary trade disputes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Seal lock and encryption identification method, device and system based on same
  • Seal lock and encryption identification method, device and system based on same
  • Seal lock and encryption identification method, device and system based on same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Embodiment 1 of the present invention provides a seal lock.

[0049] The seal lock of Embodiment 1 of the present invention has a lock body, and the lock body of the seal lock is provided with a seal lock code in an exposed state and a verification code in a hidden state corresponding to the seal lock code, and the above-mentioned code is in a hidden state The verification code needs to be obtained by physically destroying the seal lock. It should be noted that the seal lock provided by Embodiment 1 of the present invention is formed by improving the structure of high-security seals, steel wire seals, draw-tight seals, iron sheet seals, padlock seals or other types of seals in the prior art. The high-security seal is taken as an example for illustration below, and those skilled in the art can understand that the improvement methods described below for the structure or structure of the high-security seal can also be applied to other types of seals mentioned above.

[00...

Embodiment 2

[0062] Embodiment 2 of the present invention provides an encryption verification method based on a seal lock. It should be noted that the lock body of the above-mentioned seal lock is provided with a seal lock code in an exposed state and a verification code in a hidden state corresponding to the above-mentioned seal lock code. Obtained by physically destroying the Zhi Lock.

[0063] Figure 4 It is a flow chart of the encryption verification method in Embodiment 2 of the present invention. This method is suitable for authenticating servers such as Figure 4 As shown, the method includes the following steps:

[0064] Step S401, receiving the first code of the seal lock sent by the sealer terminal of the seal lock, where the first code of the seal lock corresponds to the first verification code;

[0065] Step S402, receiving a verification request including a second verification code sent by the unsealing terminal of the seal lock;

[0066] Step S403, when the second verif...

Embodiment 3

[0080] The purpose of Embodiment 3 of the present invention is to provide an encryption verification method and encryption verification system based on a seal lock, to protect the confidential places / outdoor facilities and property / goods transportation safety of the person who applies the seal lock, and to protect the unsealed person In addition, during the delivery and transportation of the goods, the consignor, the consignee and the person who has unsealed and verified the seal lock applied by the consignor and applied a new seal lock during the transportation of the goods The intermediary party shall promptly know the identity of the unsealed person, unsealed time, unsealed reason, as well as the code and application time of the re-applied new seal lock when the goods are not unsealed by the consignee during the delivery and transportation process, and form a cargo transportation The point-to-point or seamless connection of the process is delivered safely, clearly dividing t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a seal lock and encryption identification method, device and system based on the same. The seal lock is provided with a lock body, wherein the lock body is provided with a seal lock code in an exposed state and a verification code in a hidden state, wherein the verification code corresponds to the seal lock code and is obtained by physically damaging the seal lock. Because the verification code in the hidden state is arranged on the lock body of the seal lock, the verification code is not easy to be acquired and can be obtained by physically damaging the lock body, but the lock body of the seal lock is not recovered after physically damaged, and is easy to expose a trace of being maliciously unsealed by an illegal unsealing person, which is beneficial to the immediate finding and prevention of abnormal unsealing behavior, increases the difficulty of copying and counterfeiting the seal lock by the illegal unsealing person, improves the safety ofgoods, property or facilities during the seal or transportation, thus the seal lock can being widely applied to interregional and transnational trades.

Description

technical field [0001] The present invention relates to a seal lock, in particular to a seal lock and an encryption verification method, device and system based on the seal lock. Background technique [0002] Seal lock (Seal) consists of two parts, the lock rod and the lock head, and the code is printed on the lock head. When in use, the lock bar is inserted into the lock end after passing through the lock hole, and the lock bar and the lock end are closed so that they cannot be opened again. Sealing locks are widely used in outdoor facilities, property, confidential places, and cross-regional / transnational trade cargo delivery processes due to their non-reusable characteristics and the need to physically destroy the seal lock body after use. And it is used to protect the property and cargo security of individuals or enterprises (such as financial escort, material delivery, outdoor facilities that need protection, confidential places that need protection, cross-regional / tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): E05B39/04H04L9/32
Inventor 刘玉来
Owner 刘玉来
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products