Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mutual-aid lock system using asymmetric encryption technology and its control method

An asymmetric encryption and control method technology, which is applied in the field of mutual-aid lock system and its control, can solve problems such as difficulty for administrators to allocate safe deposit boxes, waste, and locks that cannot provide reliable security mechanisms.

Inactive Publication Date: 2015-12-16
吴俊杰
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First of all, using this kind of safe deposit box is prone to disputes: since the safe deposit box is locked, it cannot be guaranteed that only the recipient B can open the box, and disputes are inevitable in principle
[0005] Secondly, this kind of key will not be invalidated automatically, and there is a risk of the key being copied: when A hands over the key to others; or when B transfers the safe deposit box to others, there is this risk, and the new user often needs to replace the lock and re- Distributing keys, etc., causing great waste and inconvenience
[0006] Third, after the key is distributed, this safe deposit box is fixed to be used by B. Even if B is currently not in use, it is difficult for the administrator to allocate a safe deposit box for others
[0007] Fourth, traditional locks cannot provide a reliable and credible confidentiality mechanism: for example, when people transfer confidential items, they often need to add a seal to the safe: the safe prevents random access, and the seal is used for verification and can only be opened by the recipient
Traditional locks can no longer meet these requirements, so a new lock system is urgently needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mutual-aid lock system using asymmetric encryption technology and its control method
  • A mutual-aid lock system using asymmetric encryption technology and its control method
  • A mutual-aid lock system using asymmetric encryption technology and its control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] See figure 1 , figure 2 , image 3 and Figure 4 , this embodiment shows a mutual-aid lock system with single lock and single control, and it is a mode that does not consider privacy:

[0071] The lock system includes a key generation device 1, which can be a computer, a control panel 2 arranged on the door 5, a key input device 3, and an electromechanical lock 4 for locking or opening the door 5; the control panel 2 includes a CPU controller 21 and its accessories. Memory; Key generating device 1 generates two keys in pairs, unlocking key and adding lock key; The output end of key input device 3 is connected to CPU controller 21; CPU controller 21 controls electromechanical lock 4 to lock or open door 5; Electromechanical The lock 4 is installed on the door 5 . The present embodiment is a single lock and single control, that is, an electromechanical lock 4 . The door 5 where the electromechanical place 4 is installed is provided with a handle 51; the handle 51 is...

Embodiment 2

[0080] See Figure 5 and Figure 6 , the principle of this embodiment is the same as that of Embodiment 1. What is shown is a system with multiple locks and single control. There is a handle 51; the handle 51 is controlled by the CPU controller 21, and is in different positions when the door 5 is locked or opened; its core process is similar to the single-control single-lock of embodiment 1, but when locked, the recorded data increases the lock number . When unlocking, use the unlock key in turn to try to open those locks that are in the locked state.

[0081] Its control method comprises the following steps:

[0082] Step 1: The system generates a key: the key generating device 1 randomly generates one or more pairs of locking keys for locking and unlocking keys for unlocking; Personal express delivery, put the items in two doors, lock the two doors with the same encryption, and the consignee uses the same decryption lock to open the two doors, that is, as long as the enc...

Embodiment 3

[0088] See Figure 7 and Figure 8 , the principle of this embodiment is the same as that of Embodiment 1, and the system shown is a single-lock and single-control system, and it is also a privacy protection mode. The difference is that the door 5 is provided with a handle 51 and a cabinet door reset mechanism (such as a spring), so that the door 5 can be automatically closed without external force; at the same time, the position of the handle 51 is always fixed, so unrelated personnel cannot know the cabinet from the outside. Whether there is something in it; its control method includes the following steps:

[0089] Step 1: the system generates a key: the key generating device 1 randomly generates a paired locking key for locking and an unlocking key for unlocking;

[0090] Step 2: use the key: a, the CPU controller 21 is in the mode of waiting for the input key;

[0091] b. The user inputs and confirms the key through the key input device 3, and the system judges the key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mutual assistance type lock system adopting an asymmetric encryption technology and a control method of the mutual assistance type lock system. The mutual assistance type lock system comprises a key generation device, a control panel, a key input device and one or more electromechanical locks, wherein the key generation device generates a locking key and an unlocking key in pairs; the control panel comprises a CPU (central processing unit) controller and an affiliated storage device thereof; the output end of the key input device is connected with the CPU controller; the CPU controller controls the electromechanical locks to be locked or unlocked; the electromechanical locks are arranged on various openable doors. According to the brand-new lock system provided by the invention, a set of lock can be locked and unlocked by one or more groups of different keys in pairs; in a pair of keys, one key is used for locking while the other key is used for unlocking, and a group comprises the two keys which are used in pairs; representation and carrier forms of the keys can be but not limited to cipher texts, bi-dimensional codes, keys, magnetic cards, IC (integrated circuit) cards and the like. By the flexible adoption of an asymmetric encryption algorithm, the mutual assistance type lock system has the characteristics of credibility, cracking prevention, repudiation prevention and the like and is safe and reliable.

Description

technical field [0001] The invention relates to a mutual-aid lock system adopting asymmetric encryption technology and a control method thereof. Background technique [0002] A conventional lock is a (set) key or password corresponding to a lock. When using this lock, the same set of keys or passwords are used for locking and unlocking. Usually, if A passes the storage of this lock When the box delivers items to B, both parties need to keep the same set of keys (passwords), such as common milk boxes and newspaper boxes. [0003] Though this lockset is widely used, there is following defective: [0004] First of all, using this kind of safe deposit box is prone to disputes: since the safe deposit box is locked, it cannot be guaranteed that only recipient B can open the box, and disputes are inevitable in principle. [0005] Secondly, this kind of key will not be invalidated automatically, and there is a risk of the key being copied: when A hands over the key to others; or w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
Inventor 吴俊杰孙伟吴嘉会吴嘉祯
Owner 吴俊杰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products