Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Electronic lock safety system and key distribution method thereof

A technology of security system and key distribution, which is applied in the field of electronic lock security system and key distribution, which can solve the problems of counterfeiting, failure to unlock information destruction, and no security protection for unlocking passwords.

Active Publication Date: 2020-10-23
合肥智辉空间科技有限责任公司
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The unlocking function of the mobile communication APP is based on near-field communication. Although it provides users with high convenience, it also faces two security threats. Due to the openness of the wireless channel, the unlocking information is stolen, copied, counterfeited, etc.; the second is that after the mobile communication device is lost, the unlocking information stored in the mobile communication device cannot be destroyed in time, which may pose a serious threat to the personal and property safety of the user
At present, public algorithms such as AES and RSA are used between the electronic lock and the mobile communication terminal APP to realize simple identity authentication and encryption functions, but the security capability is weak, there is no anti-tampering and anti-replay function, and the electronic lock and mobile communication equipment The saved unlock password is not protected and vulnerable to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic lock safety system and key distribution method thereof
  • Electronic lock safety system and key distribution method thereof
  • Electronic lock safety system and key distribution method thereof

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0076] The electronic lock safety system of the present invention adds safety components on the basis of the electronic lock system. It includes an electronic lock terminal, a mobile communication terminal, a business server terminal, and a secret management center terminal. The electronic lock terminal includes an electronic lock control circuit and an electronic lock safety circuit connected to each other. The electronic lock control circuit is used to execute electronic The lock switch lock action, the electronic lock safety circuit is used to execute the electronic lock safety control program; the mobile communication terminal is based on the control circuit of the mobile communication device, and executes the command sending and receiving for the electronic lock unlock APP and the safety kit control module, and the safety kit control The module is combined with the electronic lock unlocking APP; the secret management center includes a secret management control circuit, and...

specific Embodiment approach 2

[0095] The electronic lock security system of the present application differs from the first embodiment in that the service server is not deployed on Alibaba Cloud, but communicates with the secret management center and the mobile communication terminal through the security gateway.

[0096] On the one hand, the mobile communication terminal communicates with the electronic lock, and on the other hand, it communicates with the operation and maintenance management system of the electronic lock.

[0097] The electronic lock operation and maintenance management system is used to report the unlock status information and manage the security of operation and maintenance information, including the secret management center, security gateway, business server host, business server backup machine, host cipher machine; business server host, business server backup machine On the one hand, it is connected to the security gateway, and at the same time, it is connected back-to-back with the ho...

specific Embodiment approach 3

[0105] In the electronic lock security system of the present invention, the secret management center includes a secret management control circuit, and the secret management control circuit includes a security module, a secret management server, a display, and a key injection adapter, and the interfaces of the secret management server are connected with the security module and the secret management server respectively. , display, key adapter connection.

[0106] The security module includes PCI-E card and USB key.

[0107] The key management server is equipped with a PCI-E interface, a USB interface, a network interface, a VGA interface, and a CD-ROM drive. key adapter.

[0108] The key management server includes a Raid controller, which is used to implement raid5 partitions on the hard disk, and provides guarantee for reliable data storage through disk mirroring.

[0109] In a specific embodiment of the present application, the PCI-E encryption card is built into the key man...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electronic lock safety system and a key distribution method thereof. A electronic lock terminal and a mobile communication terminal generate a temporary communication key according to temporary data, and the electronic lock terminal encrypts the ID of an electronic lock security chip and the ID of an electronic lock by using a temporary communication key and a public keyof a key management center, and decrypts an encrypted private key of the mobile communication terminal to obtain a first component of the private key; and the mobile communication terminal encrypts the number of the mobile communication terminal by using the temporary communication key, sends a request for applying for the certificate and the private key of the mobile communication terminal to the electronic lock terminal, realizes forwarding between the electronic lock terminal and the key management center terminal, obtains, encrypts and stores a second component of the private key of the mobile communication terminal, and verifies the certificate of the key management center and the certificate of the mobile communication terminal. The key management center terminal generates a certificate and a private key corresponding to the number of the mobile communication end by using the private key of the key management center based on a public key of the electronic lock security chip, andsends the certificate and the encrypted private key of the mobile communication terminal to the mobile communication terminal after encryption. Secure issuing of the certificate and the private key of the mobile terminal is realized, and the security of the key is ensured.

Description

technical field [0001] The invention relates to the technical field of electronic locks, in particular to an electronic lock security system and a key distribution method thereof. Background technique [0002] At present, in the field of security technology prevention, electronic locks have overcome the shortcomings of poor security performance of mechanical combination locks and become the main force in the market. The use modes of electronic locks mainly include electronic locks not connected to the Internet and electronic locks connected to the Internet. The electronic lock is not connected to the network mode, mainly for ordinary residential users. The mobile communication terminal installs the unlock APP, and the electronic lock terminal and the mobile communication terminal establish a connection through Bluetooth. The mobile communication terminal communicates with the business server based on Bluetooth. Bind with the mobile communication terminal APP and distribute t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04L29/06H04M1/725H04W4/80H04W12/00H04W12/04
CPCG07C9/00309G07C9/00571H04L63/06H04L63/16H04W4/80H04W12/04
Inventor 李其伦
Owner 合肥智辉空间科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products