Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Electronic key management method and device

An electronic key and management method technology, applied to instruments, time registers, individual input/output registers, etc., can solve the problems of reduced security of electronic keys, inability to use visitor authorization, and inability to access owners, etc. The effect of improving safety

Active Publication Date: 2018-05-22
SHENZHEN ZTE NETVIEW TECH
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the visitor's mobile terminal is offline after being authorized, the authorization obtained by the visitor cannot be used and thus cannot access the owner; there is also a situation that when the visitor's mobile terminal is offline after being authorized, the owner will not be able to revoke it Authorization of electronic keys
This will lead to a reduction in the security of the electronic key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic key management method and device
  • Electronic key management method and device
  • Electronic key management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0075] Please see figure 1 , The first embodiment of the electronic key management device of the present invention is used to manage electronic keys of offline mobile terminals. The electronic key management method includes the following steps:

[0076] Step S100: Obtain authorization information from the authorization platform, the authorization information includes the electronic key corresponding to the door lock number and the expiration date; wherein the visitor's mobile terminal is connected to the authorization platform through the network and applies for the electronic key. After the authorization platform passes, the corresponding electronic key will be issued to open the door lock with the corresponding number. The use period can be set according to needs, such as 10s, 60s, 3 minutes, or 10 minutes.

[0077...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are an electronic key management method and device used for managing an electronic key of an offline mobile terminal. The electronic key management method comprises the following steps: acquiring authorisation information from an authorisation platform, the authorisation information comprising an electronic key and usage time limit of a corresponding door lock serial number; when using the authorisation information, determining whether the authorisation information is within the usage time limit; and if the authorisation information is within the usage time limit, issuing the electronic key to a door lock. The present invention has the effect of increasing the security of an electronic key.

Description

Technical field [0001] The invention relates to the field of electronic key management, in particular to an electronic key management method and device. Background technique [0002] With the development of the Internet of Things, smart door locks have begun to be widely used. When the visitor wants to open the smart door lock, he can remotely apply to the owner for the electronic key to open the door lock through the network, and the owner can authorize the visitor to use the electronic key as needed. When the owner wishes to revoke the authorization of the electronic key, he can also revoke the authorization of the electronic key remotely via the network. [0003] However, when the visitor's mobile terminal is offline after being authorized, the authorization obtained by the visitor cannot be used and thus cannot access the owner; there is also a situation that when the visitor's mobile terminal is offline after being authorized, the owner cannot revoke Authorization of electro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/00G07C9/00571G07C9/00309G07C2009/00341G07C2209/08
Inventor 王志芳
Owner SHENZHEN ZTE NETVIEW TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products