CN100483443C - Biological key and biological lock - Google Patents

Biological key and biological lock Download PDF

Info

Publication number
CN100483443C
CN100483443C CNB2004100707517A CN200410070751A CN100483443C CN 100483443 C CN100483443 C CN 100483443C CN B2004100707517 A CNB2004100707517 A CN B2004100707517A CN 200410070751 A CN200410070751 A CN 200410070751A CN 100483443 C CN100483443 C CN 100483443C
Authority
CN
China
Prior art keywords
biological
information
key
lock
message handler
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100707517A
Other languages
Chinese (zh)
Other versions
CN1588426A (en
Inventor
陈鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHEJIANG HUALI COMMUNICATION GROUP CO Ltd
Original Assignee
ZHEJIANG HUALI COMMUNICATION GROUP CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHEJIANG HUALI COMMUNICATION GROUP CO Ltd filed Critical ZHEJIANG HUALI COMMUNICATION GROUP CO Ltd
Priority to CNB2004100707517A priority Critical patent/CN100483443C/en
Publication of CN1588426A publication Critical patent/CN1588426A/en
Application granted granted Critical
Publication of CN100483443C publication Critical patent/CN100483443C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a biology key and its matching biology lock. The biology key is embedded with biology character information and which is transmitted to the biology lock wirelessly, the biology lock is embedded with biology character information correspondent to the information in biology key and receives the biology character information transmitted by the key, the two matches, the lock is opened, and otherwise, the lock can not be opened. The merits are: the first one is that only the authorized person can open the biology lock with biology key, the unauthorized people can not open it even that he has the biology key; the second is: each biology key is stored with a ID for signing the biology key and code and coding algorithm for coding the information. Even if the communication information between the key and the lock is intercepted, it is no easy to be decoded; the third is: a set of lock may has several biology keys for several people to use, each authorized person may uses himself biology character to open the lock.

Description

Biological key and biological lock
Technical field:
The present invention relates to a kind of biological key and with the biological lock of its coupling, it is applicable to that all locks by thing, belong to biological lockset and make the field.
Background technology:
1, various doors, gate inhibition, proof box (cabinet) lockset are though have the function of password unlocking.But exist not enough point: the one, Password Length is shorter, easy crack; The 2nd, password is difficult for memory, forgets easily; The 3rd, the mechanical code lock troublesome poeration; The 4th, the cipher inputting keyboard of the code-disc of mechanical code lock and electronic type coded lock is all exposed outside, in case destroyed by others, the owner of coded lock also is difficult to lock is opened.
2, IC-card lockset makes the door at some hotel guest-rooms at present.It is not enough point: the one, in a single day IC-card is lost, the door of having controlled oneself into not, and the people who obtains IC-card can enter; The 2nd, " keyhole " (card slot) of IC card lock is exposed outside, in case destroyed by others, the owner of lock also is difficult to lock is opened.
3, Fingerprint Lock, as common fingerprint safe (cabinet) lockset, advantage: the person's that only do not unblank fingerprint coincide with the fingerprint of input in lock, and lock just can be opened.It is not enough point: the one, the fingerprint sensor is exposed outside, in case destroyed by others, the owner of lock also is difficult to lock is opened; The 2nd, the fingerprint sensor is public, and is unhygienic.
4, iris lockset mainly is used in important gate inhibitions such as bank vault.It is not enough point: the one, the camera (or imageing sensor) of picked-up iris (or other image information) is exposed to be damaged outside easily, in case destroyed by others, the owner of lock also is difficult to lock is opened; The 2nd, system constitutes comparatively complicated, and cost is higher, is unfavorable for applying.
5, Telecontrol lock set: as common automobile door lock and respective remote control (remote-control key) and some other remote control Garage door lock.It is not enough point: in case biological key is lost, the person of picking up all can open corresponding car door or garage door with it easily; Remote signal is intercepted and captured easily and is palmed off.
Summary of the invention:
Purpose of design: a kind of " biological key and biological lock " is provided, the biomedical information acquisition technology of present maturation is applied to biological key and the biological information recognition technology is applied to lockset, by to information encryption and decryption technology and wireless communication technique etc., solve the defective that background technology exists.
Design proposal: must be that the licensee uses " biological key " (biological key that just has the wireless remote control function) supporting biological lock (lock that just has the wireless receiving function) could be opened 1; 2, " biological information " is meant: personal biology characteristics information such as fingerprint, eye iris, DNA, voice; 3, the biological information sensor is installed on the biological key that the user carries.So both health can be accomplished, safety can be accomplished again.Both made biological key fall into other people hand, others can not open lock with it; 4, all deposit one in every " biological key " and be used to identify identification code ID of this biological key and password and the cryptographic algorithm that information is encrypted; One cover lockset can have many " biological keys ", and licenses to a plurality of people's uses respectively; As colleague, comrade-in-arms, partner etc.; Every " biological key " can license to a plurality of people use (both: shared same the biological key of many people), as man and wife, sons and daughters, father and mother etc.; Each licensee can unblank with a plurality of biological characteristics of oneself respectively, sends corresponding information by " biological key " to lockset as any one finger in licensee's the left hand and right hand, realizes opening the purpose of the lockset that matches.The situation that can't open lockset in the time of can preventing a finger injuries or inconvenience like this takes place; The licensee uses the term of validity of " biological key " to set and to change; As the guest in hotel, after the term of validity finishes, just can not re-use biological key and open door; One " biological key " can be authorized to open the relevant lockset of many handles, and the situation that can avoid needs to carry a big string key like this takes place.Can open the door of oneself with the biological key of oneself as a people, also can open the door of the proof box (cabinet) of oneself with it; Information between biological key and the biological lock is to exchange by wireless mode, and with the identification code ID of the biological information that collected, this biological key and a random number through packing, encryption, send to biological lock again, very little with the identical possibility of information that guarantees to send to biological lock at every turn, in that the communication information between biological key and biological lock is intercepted and captured, also be not easy to be cracked like this.Whether biological lock will once receive and this identical packets of information before all will at first judging when receiving the packets of information that biological key sends at every turn, if identical then refusal is made unlocking action and require biological key to retransmit the information of once unblanking.Confirming that this packets of information of receiving is from original, and then packets of information is decrypted, separates package operation with corresponding algorithm, and user's the biological information and the identification code ID of biological key confirmed, making is the judgement that " who " unblanks to ask at that biological key of use, makes the respective response action again.She Ji purpose is in order to prevent that the information of unblanking is by counterfeit forgery like this.Biological lockset can write down the information of opening the door of all generations and can be connected the aftertreatment of carrying out recorded information with other computer system.The major control device of biological lock, parts all are hidden (or only just can touch after lock is opened), so be not easy to be destroyed.Biological key constitutes, and can combine with other personal portable electronic product (as mobile phone, wrist-watch etc.).5, enciphering and deciphering algorithm explanation: this " biological key " adopts symmetry or asymmetrical information cryptographic algorithm (comprising DES algorithm, RSA Algorithm, Pohlig-Hellman algorithm, Rabin algorithm, ElGamal algorithm or PGP algorithm etc.) identification code ID of the biological information that collected and this biological key and random number are packed and to encrypt respectively according to different application demands, sends to supporting biological lock then.The encrypted message packet that supporting biological lock adopts respective algorithms (DES algorithm, RSA Algorithm, Pohlig-Hellman algorithm, Rabin algorithm, ElGamal algorithm or PGP algorithm etc.) that biological key is sent is decrypted, unpacks.Every suit biological key and lockset have the own distinctive algorithm secret key of a cover.As adopt rivest, shamir, adelman then biological key (can many) encrypt with the algorithm PKI, and lockset is decrypted with the algorithm private key.
Technical scheme 1: the method for work of biological key and biological lock, biological information that biological key collects and the information in it together are emitted to the biological lock supporting with it after encrypting, biological lock is discerned, is judged the biological information and the information in the biological key that receive, " legal " biological lock is opened automatically, and " illegally " biological lock refusal is unblanked.
Technical scheme 2: biological key and biological lock, biological key is built-in with biological information and is wirelessly transmitted to biological lock, biological lock be built-in with biological key in the information of the biological information that compares of biological information and the emission of wireless receiving biological key, the two coincide, biological lock is opened, misfit, biological lock is not opened.
The present invention compares with background technology, the one, have only the licensee to use " biological key " supporting biological lock could be opened, uncommitted anyone had both made and takes biological key and also can't open biological lock, had both made biological key fall into thief's hand, also can't open lock with it; The 2nd, all deposit one in every " biological key " and be used to identify identification code ID of this biological key and password and the cryptographic algorithm that information is encrypted, fundamentally avoided the homogeny of biological information emission, communication information between biological key and biological lock was intercepted and captured, also be not easy to be cracked; Three is that a cover lockset can have many " biological keys ", and licenses to a plurality of people's uses respectively, and each licensee can unblank with a plurality of biological characteristics of oneself respectively; The 4th, biological lockset can write down the information of opening the door of all generations and can be connected the aftertreatment of carrying out recorded information with other computer system, guaranteed biological lockset safety, both can prevent that the information of unblanking from by counterfeit forgery, can effectively inquire about again.The 5th, biological lock is hidden in door, be not easy to be destroyed, and biological key can combine with individual's portable electronic products, not only be convenient for carrying, and convenient the use.
Description of drawings:
Fig. 1 is the block diagram of biological key.
Fig. 2 is the block diagram of biological lock.
Fig. 3 is the schematic flow sheet of biological key and biological lock.
Concrete embodiment:
Embodiment 1: with reference to accompanying drawing 1~3.Biological key and biological lock, biological key is built-in with biological information and is wirelessly transmitted to biological lock, biological lock be built-in with biological key in the information of the biological information that compares of biological information and the emission of wireless receiving biological key, the two coincide, biological lock is opened, misfit, biological lock is not opened.Biological key contains sensor, message handler, program data memory, wireless transceiver, power supply and the pushbutton switch of human body biological characteristics information, the biological information that the biological information sensor acquisition arrives is to message handler, the interim storage of program data memory is from the information of message handler, the information of the identification code ID of biological key is to message handler, wireless transceiver connects the information that the breath processor that is used to collect mail is sent, or receive the information that biological lock is sent, the work of pushbutton switch control biological key, power supply provides the energy for biological key; Biological lock contains message handler, program data memory, wireless transceiver, power supply, driver and bolt-lock action actuating mechanism at least, wireless transceiver receives the information that biological key is sent, or the information sent of the processor of receiving information, data in the program data memory storage lockset working routine and the course of work and various authorized users' biological information, authorize the identification code ID information of biological key; Message handler is decrypted, unpacks the packets of information that biological key sends, finish the information legitimacy is judged, after biological information identification, the identification code ID identification of biological key, effectiveness of information judges, driver is sent unlock instruction, and driver instruction rear drive bolt-lock action actuating mechanism is unblanked.Biological key is provided with positioning indicator, and biological lock is provided with keyboard, communication interface, external source interface, inner backup battery and positioning indicator.The identification code ID of biological key is recorded in the card, and then inserts in the deck of biological key.The sensor of biological information is fingerprint sensor, eye iris sensor, DNA sensor, sound transducer.The sensor of biological information, message handler, program data memory independently are respectively a device, or combination is integrated in same integrated circuit or the thick film circuit; Wireless interface transmitting-receiving device comprises rf receiver and transmitter, infrared transceiver.
Biological key principle explanation: with reference to accompanying drawing 1.Biological key is made up of following major part: 1. biological information sensor: it is one of key components of biological key, is used for gathering user's biological information.According to different application needs, this sensor can be respectively a sensor of gathering information such as fingerprint, eye iris, eyeground, DNA, sound.2. message handler (CPU or DSP): it is according to preset program, finish the biological information that sensor is gathered and carry out aftertreatment, comprise that information dataization, condition code are extracted, encryption, or carry out operations such as password setting, information repeating transmission according to the instruction that lockset is partly sent.3. program data memory: it is the parts that are used for storing working routine and process data.After the biological information sensor was gathered the information via processing that comes and sent to lockset, data-carrier store is the retention process data no longer, are obtained by other people in order to avoid biological key is lost back information.4. wireless transceiver (can be radio-frequency (RF) transceiver and antenna or infrared transceiver), receive the information that message handler (CPU or DSP) is sent, it is modulated according to certain agreement, and send to biological lock with wireless form (or in infrared mode) by antenna, or receive the information that the biological lock that transmits by antenna is sent, and carry out demodulation according to certain agreement, send message handler (CPU or DSP) then to and carry out subsequent treatment.5. power supply and power management: power supply is meant battery.Power management partly is responsible for realizing functions such as power conversion, protection, economize on electricity.6. key ID: every biological key all has unique constant and different and other a identification code ID, and it together sends to biological lock with biological information after encrypting, so that the identification of biological lockset is the information that " biological key " sent.It can be solidificated in biological key inside when biological key is produced, also can be with the way of similar mobile phone " SIM " card, and the identification code ID of biological key is recorded in " SIM " card, and then inserts in " biological key " corresponding deck.7. pushbutton switch: be used for opening or closing " biological key ".Pushbutton switch is whenever pressed once, and biological key starts and sends primary information to lockset.8. positioning indicator: refer to pilot lamp or LCD, be used to refer to the duty of biological key.
Biological lock principle explanation: with reference to accompanying drawing 2.Biological lock is made up of following major part level: 1. wireless transceiver (can be radio-frequency (RF) transceiver and antenna or infrared transceiver): receive the information that biological key is sent, it is carried out demodulation according to certain agreement, send message handler (CPU or DSP) then to and carry out subsequent treatment; Or the information sent of the processor of receiving information (CPU or DSP), it is modulated according to certain agreement and sends to biological key by antenna with wireless form (by infrared mode).2. message handler (CPU or DSP): it is according to preset program, finish the packets of information that biological key is sent be decrypted, unpack, to the judgement of information method, biological information identification, the identification code ID of biological key, effectiveness of information judge, unlock instruction sends, and work such as lockset setting, status information processing.3. program data memory: be used for storing data in the lockset working routine and the course of work, and various authorized users' biological information, authorize information such as biological key ID.4. driver module (device): when message handler (CPU or DSP) receives unblank request and the corresponding information that biological key is sent, and to make be just to send unlocking signal to driver module after the effectively legal judgement, driver module to this signal amplify, conversion etc. handles the corresponding bolt-lock action actuating mechanism of rear drive, thereby realizes unlocking action.5. bolt-lock action actuating mechanism: be meant and under the control of electrical information, carry out mechanical action that the device of the purpose that realizes unblanking is as electromagnetic switch, solenoid valve, motor etc.6. keyboard: be used to carry out artificial information input.Keyboard is arranged on the public can not touch position (as the inboard of door), or only just can touch place (as the inside of proof box or automobile) when lockset is in open mode.7. positioning indicator: refer to pilot lamp or LCD, light-emitting diode display etc., be used to refer to the duty and the various information indicating of lockset.8. communication interface: be used for carrying out the interface of information communication, as USB interface, RS232 interface, 1394 interfaces, RS422 interface, RS485 interface etc. with other computer system.9. built-in power and power management: built-in power refers to battery, accumulate pond, storage battery etc., is required when guarding against the externally fed system to break down; Power management partly is responsible for realizing functions such as power conversion, protection, economize on electricity.10. external power source interface: be meant that lockset obtains the interface of power supply from the lockset outside.
Embodiment 2: with reference to accompanying drawing 3 and 4.The method of work of biological key and biological lock, 1. the biological information that collects of biological key and the information in it together are emitted to the biological lock supporting with it after encrypting, biological lock is discerned, is judged the biological information and the information in the biological key that receive, " legal " biological lock is opened automatically, and " illegally " biological lock refusal is unblanked.2. the biological information that collects of biological key and in it unique constant and identification code ID of being different from other through together being emitted to the biological lock supporting after the encryption automatically with it, biological lock is decrypted the biological information that receives, unpack, after finishing to the judgement of information legitimacy, biological information identification, identification code ID identification, effectiveness of information judgement, send unlock instruction, lockset is opened, otherwise refusal is unblanked.3. biological key adopts cryptographic algorithm and algorithm secret key that the biological information of being gathered and biological key identification code and a random number are carried out sending to supporting lockset through wireless transceiver again behind the packaging ciphering; The packets of information that its use cryptographic algorithm of biological lock and algorithm secret key are received wireless transceiver is decrypted and unpacks, judge packets of information before being not used after, again the authorized user's that stored in the biological information received and the data-carrier store biological information is compared, if after judging the user and being the user who is authorized to, then carry out unlocking action, otherwise refusal is unblanked.Described cryptographic algorithm comprises symmetry algorithm and asymmetric arithmetic.
The workflow of unblanking: with biological characteristic is that people's fingerprint is an example, as follows to the procedure declaration of unblanking:
1, the preliminary work before using: before unblanking, by the physical characteristics collecting recording process, with licensee's physical characteristics collecting and be stored in the storer (both biological information storehouses among Fig. 2) in the lockset; Licensee's biological characteristic can be a plurality of, as the fingerprint of any one finger among the right-hand man etc.; If one has many biological keys to lockset, then every biological key has a unique difference and other identification code ID, and the identification code ID of the biological key that all are authorized to also is stored in the storer of lockset; Battery has been installed in the biological key; Lockset external power supply (or internal electric source) is ready.2, unblank: unblank process as shown in Figure 3.1. the user presses power knob switch on the biological key with hand, and with a finger by being placed on the fingerprint sensor.2. biological key is gathered user's finger print information automatically, and from biological key storer or SIM card, take out the sign ID of this biological key, message handler in the biological key produces a random number simultaneously, by information package, cryptographic algorithm above-mentioned three kinds of information package is also encrypted then; 3. the packets of information crossed of packaging ciphering by the transceiver modulation after, send through sky alignment lockset; 4. the lockset that is in " preparation " state receives the packets of information that biological key is sent; 5. the message handler in the lockset is decrypted, unpacks with corresponding decipherment algorithm and key pair information bag, (random number is meant the random number that randomizer takes place therefrom to decomposite the identification code ID of finger print information, biological key and random number, be the notion of a logic in CPU, produce) by software; 6. lockset by random number that this is received be stored in the lockset, the numeral of once having used in the past compares, and does the conclusion whether this information of receiving once was used; If 7. this information was used before being (both meaned may by the information that others copys), then lockset is sent out the order of receipts " retransmission of information " to biological key by transceiver.Biological key repeats from the 2nd) later action of step; If 8. this information be before from original, then all authorized users' finger print information is compared in the finger print information that will newly receive of lockset and the biological information storehouse, whether make this user is " legal " user's conclusion; If 9. judge it is " illegally " user, then the lockset refusal opens the door, and is standby to writing down for information about simultaneously; If 10. judge it is " legal " user, then the lockset processor provides the control signal of opening the door, and locking execution mechanism is made the action of opening the door; (11) lockset is " who " (user's code) with this, notes standbyly with information such as that biological key open the door, and " random number " information is noted, in order to repeat the 6th next time) when judging, uses in the step; (12) lockset turns back to " preparation " state, waits for the request of next time opening the door.
What need understand is: though the foregoing description is to the present invention's detailed explanation of contrasting; but these explanations only limit to explanation of the present invention; rather than limitation of the present invention, any innovation and creation that do not exceed in the connotation of the present invention all fall within the scope of protection of the present invention.

Claims (8)

1, a kind of method of work that comprises the system of biological key and biological lock, it is characterized in that: biological key contains the sensor of human body biological characteristics information, message handler, program data memory, wireless transceiver, power supply and pushbutton switch, biological key adopts symmetry or asymmetrical information cryptographic algorithm the sign ID of the biological information that collected and this biological key and random number are packed and to encrypt respectively according to different application demands, send to supporting biological lock then, supporting biological lock adopts respective algorithms that the encrypted message packet that biological key sends is decrypted, unpack, whether biological lock will once receive and this identical packets of information before all will at first judging when receiving the packets of information that biological key sends at every turn, if identical then refusal is made unlocking action and require biological key to retransmit the information of once unblanking, confirming that this packets of information of receiving is from original, and then packets of information is decrypted with corresponding algorithm, separate package operation, and user's biological information and biological key sign ID confirmed, make is who is in the judgement of using that biological key to unblank to ask, make the respective response action again, biological information sensor acquisition in the biological key to biological information and biological key be built-in with biological information and match, then legal, biological information sensor acquisition in the biological key to biological information and biological key be built-in with biological information and misfit, then illegal, legal biological lock is opened automatically, illegal biological lock refusal is unblanked.
2, the method of work that comprises the system of biological key and biological lock according to claim 1, it is characterized in that: biological key is to biological information by the entrained biological information sensor acquisition of biological key itself, all deposit one in every biological key and be used to identify sign ID of this biological key and password and the cryptographic algorithm that information is encrypted, the biological information sensor acquisition to biological information transfer to message handler, program data memory stores from the message handler information transmitted temporarily, the information transmission of biological key sign ID is to message handler, wireless transceiver connects and is used to receive the information that message handler is sent, or receiving the information that biological lock is sent, pushbutton switch is controlled biological key work.
3, the method for work that comprises the system of biological key and biological lock according to claim 2 is characterized in that: biological key adopts cryptographic algorithm and algorithm secret key that the biological information of being gathered and biological key identification code and a random number are carried out sending to supporting lockset through wireless transceiver again behind the packaging ciphering; The packets of information that biological lock uses cryptographic algorithm and algorithm secret key that wireless transceiver is received is decrypted and unpacks, judge packets of information before being not used after, again the authorized user's that stored in the biological information received and the data-carrier store biological information is compared, if after judging the user and being the user who is authorized to, then carry out unlocking action, otherwise refusal is unblanked.
4, a kind of system that comprises biological key and biological lock, it is characterized in that: biological key is built-in with biological information, this biological information is transmitted into biological lock by the wireless transceiver in the biological key, wireless transceiver receives the biological information of biological key emission in the biological lock, and biological information in this information and the biological key is compared, and the two coincide, and biological lock is opened, misfit, biological lock is not opened.
5, the system that comprises biological key and biological lock according to claim 4, it is characterized in that: biological key contains the biological information sensor, message handler, program data memory, wireless launcher, power supply and pushbutton switch, the biological information sensor acquisition to biological information be sent to message handler, the interim storage of program data memory is from the information of message handler, the information of the identification code ID of biological key is sent to message handler, wireless transceiver is used to receive the information that message handler is sent, or receive the information that biological lock is sent, the work of pushbutton switch control biological key, power supply provides the energy for biological key; Biological lock contains message handler, program data memory, wireless transceiver, power supply, driver and bolt-lock action actuating mechanism, wireless transceiver receives the information that biological key is sent, or the information sent of the processor of receiving information, data in the program data memory storage lockset working routine and the course of work and various authorized users' biological information, authorize the identification code ID information of giving birth to biological key; Message handler is decrypted, unpacks the packets of information that biological key sends, finish the information legitimacy is judged, after biological information identification, the identification code ID identification of biological key, effectiveness of information judges, driver is sent unlock instruction, and driver instruction rear drive bolt-lock action actuating mechanism is unblanked.
6, the system that comprises biological key and biological lock according to claim 5, it is characterized in that: biological key is provided with positioning indicator, and biological lock is provided with keyboard, communication interface, external source interface, inner backup battery and positioning indicator.
7, biological key according to claim 5 and biological lock is characterized in that: biological key ID is recorded in the card, and then inserts in the deck of biological key; The sensor of biological information is fingerprint sensor, eye iris sensor, DNA sensor, sound transducer.
8, the system that comprises biological key and biological lock according to claim 4, it is characterized in that: the sensor of biological information, message handler, program data memory independently are respectively a device, or combination is integrated in same integrated circuit or the thick film circuit; Wireless interface transmitting-receiving device comprises rf receiver and transmitter, infrared transceiver.
CNB2004100707517A 2004-07-23 2004-07-23 Biological key and biological lock Expired - Fee Related CN100483443C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100707517A CN100483443C (en) 2004-07-23 2004-07-23 Biological key and biological lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100707517A CN100483443C (en) 2004-07-23 2004-07-23 Biological key and biological lock

Publications (2)

Publication Number Publication Date
CN1588426A CN1588426A (en) 2005-03-02
CN100483443C true CN100483443C (en) 2009-04-29

Family

ID=34604530

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100707517A Expired - Fee Related CN100483443C (en) 2004-07-23 2004-07-23 Biological key and biological lock

Country Status (1)

Country Link
CN (1) CN100483443C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI639523B (en) * 2014-12-31 2018-11-01 鴻海精密工業股份有限公司 System and method for driving saftey

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI359381B (en) 2007-12-25 2012-03-01 Htc Corp Method for unlocking a locked computing device and
CN101493883B (en) * 2008-01-21 2012-12-12 宏达国际电子股份有限公司 Method for unlocking locked operational equipment and operational equipment
CN102768780B (en) * 2012-06-29 2015-07-01 深圳光启创新技术有限公司 Photon entrance guard system based on voice control
CN104363571B (en) * 2014-10-30 2018-05-04 广东欧珀移动通信有限公司 The display methods and device of post and telecommunication tariff
CN105894620A (en) * 2015-08-11 2016-08-24 乐视体育文化产业发展(北京)有限公司 Bicycle control method and device and bicycle
CN109979043A (en) * 2017-12-28 2019-07-05 国民技术股份有限公司 A kind of lockset working method, lockset and key system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI639523B (en) * 2014-12-31 2018-11-01 鴻海精密工業股份有限公司 System and method for driving saftey

Also Published As

Publication number Publication date
CN1588426A (en) 2005-03-02

Similar Documents

Publication Publication Date Title
US6523745B1 (en) Electronic transaction system including a fingerprint identification encoding
JP3222110B2 (en) Personal identification fob
CN106971441B (en) Unlocking method, door lock, key and lockset
EP0924657B1 (en) Remote idendity verification technique using a personal identification device
US7536721B2 (en) Low cost secure ID card and system
US8919024B2 (en) Secure smartphone-operated gun trigger lock
ES2385215T3 (en) Portable device and method to access devices powered by a data key
US20080024272A1 (en) Biometric authentication lock machine
AU2009201756B1 (en) Electronic locking system and method
CA2500039A1 (en) Electronic lock box with multiple modes and security states
CN104424678A (en) Electronic password lock system and control method thereof
CN109184361B (en) Door lock with high safety and working method thereof
CN106504377A (en) A kind of electronic lock keyless access system of random key
JP4999193B2 (en) Portable device with fingerprint authentication function
KR20110096576A (en) Access identification and control device
CN104392525A (en) Intelligent lock system
CN100483443C (en) Biological key and biological lock
CN2818698Y (en) Biological key and lock
CN206376639U (en) A kind of theftproof lock
JP2013209821A (en) Electric lock system
CN108780476A (en) Method for verifying personnel identity
CN204229495U (en) A kind of intelligent lock system
KR20120134607A (en) The door-lock apparatus available to prevent hacking and method for authenticating smart-keys using the same
JP2000331166A (en) Finger print authenticating system
CN108071276A (en) A kind of theftproof lock

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090429

Termination date: 20150723

EXPY Termination of patent right or utility model