CN101016814B - Electric lock capable of proofing whether himself had been unlocked and implementation method therefor - Google Patents

Electric lock capable of proofing whether himself had been unlocked and implementation method therefor Download PDF

Info

Publication number
CN101016814B
CN101016814B CN200710027002XA CN200710027002A CN101016814B CN 101016814 B CN101016814 B CN 101016814B CN 200710027002X A CN200710027002X A CN 200710027002XA CN 200710027002 A CN200710027002 A CN 200710027002A CN 101016814 B CN101016814 B CN 101016814B
Authority
CN
China
Prior art keywords
key
lock body
legal
synchronous
configuration data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200710027002XA
Other languages
Chinese (zh)
Other versions
CN101016814A (en
Inventor
吴洪伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200710027002XA priority Critical patent/CN101016814B/en
Publication of CN101016814A publication Critical patent/CN101016814A/en
Application granted granted Critical
Publication of CN101016814B publication Critical patent/CN101016814B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

An electric lock capable of proving itself even to be unlocked relates to its realizing method, characterized in that a legal key code is produced by a legal key data which is already stored in the key and is checked by a checking key data which is already stored in the key, wherein the legal key data and the checking key data are updated before an unlocking order finished and keep a matching relation. The checking key data in the lock will not match the legal key data in the key as the lock being unlocked, therefore the key can not unlock the lock, and the invention can prove itself even to be unlocked via unlocking ability of the key. The invention has advantages that the lock not only can prove itself even to be unlocked and prevent the false-unlocking case of deceiving manufacturers in daily lives, but also reduces the anxious of manufacturers in spreading electric locks and improves the unlock-proof property of electric locks.

Description

Can prove electronic lock and its implementation that whether oneself once was cracked
Technical field
The present invention relates to the electronic lock technology, particularly control the electronic lock of unblanking, also be electronic password lock by the procedure identification password.
Background technology
In present electronic lock research and development field, industry mainly pays close attention to how to improve AES to improve the anti-ability of cracking of electronic lock.If yet one can not prove whether oneself once was cracked to electronic lock, even it has the very high anti-performance that cracks, also still can in applying, be limited to.Because in actual life, if take place because of the electronic lock damnous incident that is cracked, the producer that produces electronic lock so just is required to undertake the responsibility possibly, how to verify whether electronic lock was cracked very this moment just to have become the rub of incident.Because for electronic lock, so-called " cracking " is not meant violence damage, and be meant with any special measures and make the program of unblanking in the lock body carry out unlocking action, after being cracked, electronic lock still can unblank by enough original key, just can't learn also whether electronic lock once was cracked.If there is the user who harhors evil intentions to use the original key back of unblanking to make stolen illusion, pretend to claim again that electronic lock is cracked by the people and to producer's claim, producer will be difficult to discern this lie.Have some electronic locks to be called " becoming the sign indicating number lock " at present, its unlocking cipher all can change after unblanking at every turn, yet this electronic lock still can not prove oneself whether once to be cracked.Electronic lock with employing ACM1330E model encoder and ACM1550D model decoder is an example, its password that becomes password that coding mode is a lock body and key according to set algorithm with the time intercropping synchronizing signal keep synchronous saltus step, so even lock body once was cracked, whether the password of lock body and key still can be consistent, also just can't discern electronic lock and once be cracked.Also has the another kind of code electronic lock that becomes, as application number be 200410087146.0, name is called the electronic lock system of mentioning in the patent application of " a kind of electron key and electrical lock apparatus and its implementation ", its password is to be produced with set AES when unblanking respectively by lock body and key temporarily, lock body and key exchange password then, whether each personal set decipherment algorithm checking the other side's password is legal again, if legal, lock body is just carried out unlocking action.Changed owing to AES and decipherment algorithm can't once be cracked because of lock body, so even lock body once was cracked, also still can unblank with original key, therefore this electronic lock still can not prove oneself whether once to be cracked.Generally speaking, existing electronic lock all can't prove oneself whether once to be cracked.
Summary of the invention
The purpose of this invention is to provide a kind of electronic lock that can prove whether oneself once was cracked, and this electronic lock is realized proving the method whether oneself once was cracked.
The present invention is achieved in that the electronic lock that can prove whether oneself once was cracked, and comprises key and lock body, and key and lock body comprise the control device of unblanking that is used to move the program of unblanking respectively, and the described control device of unblanking comprises:
A1, be positioned at key, be used to produce the legal password generator of key of the legal password of key;
A2, be positioned at key, be used for the legal password of key is sent to the legal password transmitter of key of lock body;
A3, be positioned at lock body, be used to receive the legal password receiver of key of the legal password of key;
A4, be positioned at lock body, be used to verify whether the legal password of key is correct, if correctly then continue the operation program of unblanking, if incorrect the unblank legal password verifier of key of program of operation that then stops;
A5, be positioned at lock body, be used to carry out the unlocking apparatus of final unlocking action;
Especially, the control device of unblanking also comprises:
A6, be positioned at key, be used to store the key configuration data memory of key configuration data, described key configuration data comprises the legal data of key, and the legal data of key are that the legal password generator of key in the key is rely and produced the calculating parameter of the legal password of key;
A7, be positioned at lock body, be used to store the lock body configuration data memory of lock body configuration data, described lock body configuration data comprises the key authentication data, whether correct the key authentication data are the legal password of key that checking receives the calculating parameters of relying of the legal password verifier of key in the lock body, that is the key authentication data in the lock body configuration data and the legal data of key in the key configuration data are complementary the legal data of key that different key authentication data are corresponding different;
A8, be positioned at key, be used for after key sends the legal password of key, before lock body carries out final unlocking action, upgrade the key configuration data renovator of key configuration data;
A9, be positioned at lock body, be used for before lock body is carried out final unlocking action, upgrade the lock body configuration data renovator of lock body configuration data.
Correspondingly, make above-mentioned electronic lock can prove the method whether oneself once was cracked, comprise the program of unblanking of moving respectively in key and lock body, the described program of unblanking may further comprise the steps:
The legal password of key that a1, key produce the legal password of key produces step;
A2, key send to the legal password of key the legal password forwarding step of key of lock body;
A3, lock body receive the legal password receiving step of key of the legal password of key;
A4, lock body verify whether the legal password of key is correct, if correctly then continue to move the program of unblanking, and the legal password authentification step of key of program if incorrect then termination operation is unblanked;
A5, lock body are carried out the step of unblanking of final unlocking action;
Especially, the further comprising the steps of and characteristics of program of unblanking:
A6, in key the key configuration data storing step of storage key configuration data, described key configuration data comprises the legal data of key, and the legal data of key are to produce to rely among the step a1 at the legal password of the key of key to produce the calculating parameter of the legal password of key;
A7, in lock body the lock body configuration data storing step of storage lock body configuration data, described lock body configuration data comprises the key authentication data, whether correct the key authentication data are the legal password of key that receives of checking the calculating parameters of relying in the legal password authentification step of the key of lock body a4, that is the key authentication data in the lock body configuration data and the legal data of key in the key configuration data are complementary the legal data of key that different key authentication data are corresponding different;
A8, key after sending the legal password of key, lock body carries out before the step of finally unblanking, and upgrades the key configuration data step of updating of key configuration data;
A9, lock body upgraded the lock body configuration data step of updating of lock body configuration data before lock body is carried out the step of finally unblanking.
In above-mentioned steps, step a1~a5 and the existing electronic lock process of unblanking is identical.The characteristics of the inventive method are to have increased step a6~a9.From step a6 as can be known, to send to the legal password of key of lock body be to produce by being stored in the legal data of key in the key in advance to key; From step a7 as can be known, the foundation whether legal password of lock body checking key is correct is to depend on the key authentication data that are stored in advance in the lock body; Before the step a5 that finally unblanks, key upgrades the legal data of key of oneself by step a8, lock body has also upgraded the key authentication data of oneself in step a9 simultaneously, so make after this step a5 that unblanks finishes, be stored in the legal data of key in the key, corresponding variation has all taken place with the key authentication data that are stored in the lock body, certainly still keep matching relationship, thereby make that key will generate the legal password of new key in unblanking process next time, lock body then goes to verify with new key authentication data whether the legal password of new key is correct.Suppose that lock body is cracked by the people, the key authentication data of storing in the lock body so will inevitably change, and respective change does not take place in the legal data of the key in the key, just be stored in the lock body the key authentication data no longer with the legal Data Matching of key that is stored in the key.If open the lock with the key after cracking, the legal password of new key that generates according to the legal data of key of key will be thought wrongly by lock body so, so the process of unblanking stops at step a4, can't unblank again.This shows,, just can prove that lock body once was cracked as long as can't unblank with key.
Advantage of the present invention is to make electronic lock have the provable function that oneself whether once was cracked, can effectively prevent contingent swindle incident of swindling producer with " vacation cracks " in the actual life, solve producer and promoted the misgivings of electronic lock, and improved the anti-performance that cracks of electronic lock.
Description of drawings
Fig. 1 is the flow chart of the embodiment of the invention 1;
Fig. 2 is the flow chart of embodiment 2;
Fig. 3 is the another kind of variation pattern of embodiment 2;
Fig. 4 is the flow chart of embodiment 3;
Fig. 5 is the another kind of variation pattern of embodiment 3;
Fig. 6 is one of flow chart of embodiment 4;
Fig. 7 be embodiment 4 flow chart two;
Fig. 8 be embodiment 4 flow chart three;
Fig. 9 be embodiment 4 flow chart four;
Figure 10 is one of flow chart of embodiment 5;
Figure 11 be embodiment 5 flow chart two;
Figure 12 be embodiment 5 flow chart three;
Figure 13 be embodiment 5 flow chart four.
Device and the program in the key represented on the top of double dot dash line among each figure, and device and the program in the lock body represented in the bottom, and the solid arrow representation program flows to, and dotted arrow is represented data flow.
The specific embodiment
Embodiment 1
The embodiment of present embodiment is described identical with last joint, elaborates below in conjunction with Fig. 1 again.When unblanking, the legal password generator of the key of key A1 is to be stored in legal data of key among the key configuration data memory A6 in advance as calculating parameter, with certain algorithm calculate the legal password of key, by the legal password transmitter of key A2 the legal password of key is sent to lock body again.Afterwards, the key configuration data renovator A8 of key upgraded the legal data of key among the key configuration data memory A6 before lock body is carried out final unlocking action, prepare for unblank next time.Meanwhile, after the legal password receiver of the key of lock body A3 received the legal password of key, the legal password verifier A4 of the key of lock body verified the legal password of key.The foundation of checking, be to be stored in key authentication data among the lock body configuration data memory A7 in advance as calculating parameter, go to check the legal password of key whether correct with certain algorithm, as long as the key authentication data of storing among the lock body configuration data memory A7, be complementary with the legal data of key of storing among the key configuration data memory A6, the legal password verifier A4 of key just thinks that the legal password of the key that receives is correct so, otherwise think that the legal password of key is wrong, stop the program of unblanking.If the checking result of the legal password of key is correct, lock body configuration data renovator A9 will upgrade the key authentication data among the lock body configuration data memory A7 so, get ready for unblank next time, last just by the final unlocking action of unlocking apparatus A5 execution.In the above-mentioned complete process of unblanking, the key authentication data that lock body configuration data renovator A9 is upgraded, the legal data of being upgraded with key configuration data renovator A8 of key, keeping matching relationship, if lock body is not by key unlocking, unblank but cracked by the people, have only lock body to upgrade the key authentication data so, and key does not upgrade the legal data of key synchronously, if therefore after cracking, open the lock with the key again, will not match with the legal data of key of storing among the key configuration data memory A6 because of the key authentication data of storing among the lock body configuration data memory A7, cause and to unblank, once be cracked with regard to provable lock body like this.
Embodiment 2
Present embodiment proposes for improving embodiment 1.In embodiment 1, suppose in key configuration data step of updating a8 shown in Figure 1, perhaps in lock body configuration data step of updating a9, powered-off fault takes place, renewal process can not normally be finished, so just can't guarantee the legal data of key of storing among the key configuration data memory A6, keep matching relationship, cause key not unblank with the key authentication data of storing among the lock body configuration data memory A7.In order to distinguish is that present embodiment has been done improvement on the basis of embodiment 1 because powered-off fault still caused key to unblank owing to lock body once is cracked on earth.Referring to Fig. 2, in the program of unblanking of key, before key configuration data step of updating a8, increased the key marker stores step b1 that makes mistakes, correspondingly in key, increased the key marker stores B1 that makes mistakes, after key storage key configuration data step a6, before lock body carries out final unlocking action, increase the key mark of makeing mistakes and removed step b3, correspondingly in key, increased the key mark remover B3 that makes mistakes; In the program of unblanking of lock body, before lock body configuration data step of updating a9, increased the lock body marker stores step b2 that makes mistakes, correspondingly in lock body, increased the lock body mark memory B2 that makes mistakes, after lock body storage lock body configuration data step a7, before lock body carries out final unlocking action, increased the lock body mark of makeing mistakes and removed step b4, correspondingly in lock body, increased the lock body mark of makeing mistakes and removed B4.After so improving, if in key configuration data step of updating a8, perhaps in lock body configuration data step of updating a9, powered-off fault takes place causes renewal process normally not finish, so in key is made mistakes mark memory B1, perhaps will remain with the mark of makeing mistakes at the lock body mark memory B2 that makes mistakes, so just can identify is can not unblank owing to powered-off fault causes key, but not lock body was once cracked by the people.
Present embodiment also can change the program of unblanking of key into shown in Figure 3.The distinctive points of Fig. 3 and Fig. 2 only is the key marker stores step b1 that makes mistakes has been moved on to before the legal password forwarding step of key, so also can play same effect.Other flow process among Fig. 3 is identical with Fig. 2.
Need to prove, though the situation of powered-off fault may take place in the store and clear step of the mark of makeing mistakes equally, but mark only is to use as a mark owing to make mistakes, can only represent with single byte, even only use one " 0 " or " 1 " in the byte to represent, therefore its store and clear speed is very fast, and the probability that powered-off fault takes place in its store and clear process is almost nil.
Embodiment 3
Though embodiment 2 has had further improvement than embodiment 1, but still there are some leaks.Suppose that an electronic lock user who grasps advanced techniques wants to swindle producer, this user implements swindle possibly so so: the lock body that produces a vacation earlier, use very key operated this false lock body again, make complete program of unblanking of true key experience, so according to embodiment 2 described key unlocking programs, the legal data of the key of true key will change at step a8, and the key mark of makeing mistakes also can be eliminated in step b3, and real lock body does not participate in opening process, the key authentication data that are true lock body do not change the mark nor existence makes mistakes, when whether producer's checking lock body once was cracked, true key can't be opened true lock body, and true key and the true lock body mark of all not makeing mistakes, therefore producer will be cheated.In addition, this user also might implement swindle like this: when with very key operated false lock body the time, do not allow true key experience the complete program of unblanking, but sending the legal password of key, the key of only taking seriously grants the leave behind the lock body, just stop true key to carry out remaining step with power down or other method, the legal data of key of true key are not changed and do not store the key mark of makeing mistakes, and then with one imitated false key, the legal password of intercepting and capturing of key is sent to true lock body, make complete program of unblanking of true lock body experience, so the key authentication data of true lock body will change at step a9, no longer with the legal Data Matching of the key of true key, and the lock body of the true lock body mark of makeing mistakes also can be removed in step b4, therefore when whether producer's checking lock body once was cracked, true key can't be opened true lock body, and true key and the true lock body mark of all not makeing mistakes, and therefore producer also can be cheated.For stopping this situation, present embodiment makes improvements on the basis of embodiment 2 again.Referring to Fig. 4, in lock body, increased lock body legal password generator C1 and the legal password transmitter of lock body C3, increased sealed method data in the lock body configuration data of in lock body configuration data memory A7, storing.Sealed method data are that the legal password generator of lock body C1 is rely and produced the calculating parameter of the legal password of lock body, that is to say in step c1, the legal password generator of lock body C1 produces the legal password of lock body to be stored in sealed method data among the lock body configuration data memory A7 in advance as calculating parameter with certain algorithm.Correspondingly, in key, increase lock body legal password receiver C4 and the legal password verifier C5 of lock body, increased the lock verification msg in the key configuration data of in key configuration data memory A6, storing.Whether correct the lock verification msg be the legal password verifier C5 of the lock body legal password of lock body that receives of checking the calculating parameter of relying, that is to say that the legal password verifier C5 of lock body is to be stored in lock verification msg among the key configuration data memory A6 in advance as calculating parameter, go to check the legal password of lock body whether correct with certain algorithm, as long as the sealed method data of storing among lock verification msg of storing among the key configuration data memory A6 and the lock body configuration data memory A7 are complementary, the legal password verifier C5 of lock body will think that the legal password of the lock body that receives is correct, otherwise think that the legal password of lock body is wrong, stop the program of unblanking of key.Present embodiment is the marker stores step b1 that makes mistakes of the key in the special provision key unlocking program also, must be before the legal password forwarding step of key a2 finishes; Lock body lock body in the program marker stores step b2 that makes mistakes that unblanks must be before the legal password forwarding step of lock body c3 finishes.Only explain below with regard to the step that is different from previous embodiment among Fig. 4:
The execution in step b2 of lock body elder generation, the storage lock body mark of makeing mistakes in lock body is made mistakes mark memory B2, again by the legal password generator of lock body C1 execution in step c1, to be stored in sealed method data among the lock body configuration data memory A7 in advance, produce the legal password of lock body with certain algorithm as calculating parameter; Before lock body configuration data step of updating a9,, the legal password of lock body is sent to key by the legal password transmitter of lock body C3 execution in step c3; In key, after the legal password receiver of the lock body of key C4 receives the legal password of lock body, by the legal password verifier C5 execution in step of lock body c5, whether the legal password of checking lock body is correct, the foundation of checking, be to be stored in lock verification msg among the key configuration data memory A6 in advance as calculating parameter, go to check the legal password of lock body whether correct with certain algorithm, as long as the sealed method data of storing among lock verification msg of storing among the key configuration data memory A6 and the lock body configuration data memory A7 are complementary, the legal password verifier C5 of lock body will think that the legal password of the lock body that receives is correct, otherwise think that the legal password of lock body is wrong, stop the program of unblanking of key, if the checking result of the legal password of lock body is correct, then continue execution in step b1.So far finish the checking of key to lock body, later step and previous embodiments, key is execution in step a8, a6, b3 successively, and lock body is execution in step a3, a4, a9, a7, b4, a5 successively.What specify is that in key configuration data step of updating a8, the key configuration data that is upgraded comprises the lock verification msg that present embodiment increases; In lock body configuration data step of updating a9, the lock body configuration data that is upgraded comprises the sealed method data that present embodiment increases, and the sealed method data maintenance coupling of lock verification msg of upgrading and renewal, gets ready for unblank next time.From the step process of present embodiment as can be known, present embodiment had been stored the key mark of makeing mistakes earlier before the legal password forwarding step of the key of key a2 finishes, guaranteed the integrality of key from the legal password forwarding step of key a2 to key configuration data step of updating a8; Key is also verified lock body in addition, and in the process of at every turn unblanking, the sealed method data that are used to produce the legal password of lock body of storing among the lock body configuration data memory A7, and being used to of storing among the key configuration data memory A6 verify the lock verification msg that the legal password of lock body is whether correct, the capital changes, so copy out false lock body that an energy approved by true key and be unusual difficulty, so present embodiment can be stopped the described at the beginning leak of this section.
Whether whether flow process shown in Figure 4 is earlier correct by the legal password of the lock body of key authentication lock body, correct by the legal password of key of lock body checking key again.In fact present embodiment also can adopt flow process shown in Figure 5.Whether whether the distinctive points of Fig. 5 and Fig. 4 only be correct, correct by the legal password of the lock body of key authentication lock body again by the legal password of key of lock body checking key earlier.Particularly, that is first by key execution in step b1, a2 successively, the legal password of key is sent to lock body, lock body is execution in step a3, a4 successively, the legal password of key is verified, if correct, then lock body is made mistakes after the marker stores step b2 having carried out lock body, execution in step c1, c3 send to key with the legal password of lock body, correspondingly again, key execution in step c4, c5, the legal password of lock body is verified if correct, then lock body continues execution in step a9, a7, b4, a5 successively.Other step among Fig. 5 is identical with Fig. 4.
Embodiment 4
Also there is another problem in embodiment 2, if lock body very was cracked, the lock body configuration data of the lock body configuration data memory A7 of lock body storage is inevitable so is updated, if this moment is again with the key operated lock that once was cracked, certainly just can't unblank, but the key mark memory B1 that makes mistakes of key will remain with the key mark of makeing mistakes this moment, so producer will deny in view of the above that lock body once was cracked, and this is irrational.For addressing this problem, present embodiment has increased following steps:
D1, key produced the synchronous legal password of synchronous legal password before the storage key is made mistakes mark. and produce step, correspondingly in key, increased synchronous legal password generator D1;
D2, the key configuration data of being stored in key configuration data storing step also comprise synchronous legal data, and described synchronous legal data are the calculating parameters that produce the synchronous legal password of generation of relying in the step at the synchronous legal password of key.Correspondingly, the key configuration data of storing in key configuration data memory A6 comprises synchronous legal data;
D3, key sent to the synchronous legal password forwarding step of lock body with synchronous legal password before the storage key is made mistakes mark, correspondingly increased synchronous legal password transmitter D3 in key;
D4, lock body receive the synchronous legal password receiving step of synchronous legal password, have correspondingly increased synchronous legal password receiver D4 in lock body;
D5, lock body are before the storage lock body is made mistakes mark, verify whether synchronous legal password is correct, if correctly then continue to move the program of unblanking, the synchronous legal password authentification step of program has correspondingly increased synchronous legal password verifier D5 in lock body if incorrect then termination operation is unblanked;
D6, the lock body configuration data of being stored in lock body configuration data storing step a7 also comprise synchronous verification msg, whether correct described synchronous verification msg be the synchronous legal password that receives of checking the calculating parameter of relying in the synchronous legal password authentification steps d 5 of lock body, that is the synchronous verification msg in the lock body configuration data and the synchronous legal data in the key configuration data are complementary the different corresponding different synchronous legal data of synchronous verification msg.Correspondingly, the lock body configuration data of being stored in lock body configuration data memory A7 comprises synchronous verification msg.
Present embodiment can adopt flow process shown in Figure 6.Fig. 6 has increased steps d 1, d3 in the program of unblanking of key on the basis of Fig. 3, increased steps d 4, d5 in the program of unblanking of lock body, and other flow process is identical with Fig. 3.As can be seen from Figure 6, before key is made mistakes marker stores step b1, key sends to lock body by steps d 1, d3 with synchronous legal password earlier, after steps d 4, the d5 of lock body verify, if synchronous legal password is correct, key is execution in step b1, if synchronous legal password bad, key and lock body all stop the program of unblanking.Because in the process of at every turn unblanking, store among the key configuration data memory A6 in order to produce the synchronous legal data of synchronous legal password, and the synchronous verification msg that is used to verify synchronous legal password of storing among the lock body configuration data memory A7, the capital changes, therefore if with the key operated lock body that once was cracked, when lock body is carried out steps d 5, will stop, in key and lock body, can not preserve the mark of makeing mistakes, so just can avoid one section described situation of present embodiment beginning.
Present embodiment also can adopt flow process shown in Figure 7.Fig. 7 has increased steps d 1, d3 in the program of unblanking of key on the basis of Fig. 2, increased steps d 4, d5 in the program of unblanking of lock body, and other flow process is identical with Fig. 2.Fig. 7 is the same with Fig. 6, also be that synchronous legal password at lock body checking key is under the correct condition, key is execution in step b1, and in the process of at every turn unblanking, store among the key configuration data memory A6 in order to produce the synchronous legal data of synchronous legal password, and the synchronous verification msg that is used to verify synchronous legal password of storing among the lock body configuration data memory A7, the capital changes, therefore if with the key operated lock body that once was cracked, when lock body is carried out steps d 5, also can stop, can avoid one section described situation of present embodiment beginning equally.
Present embodiment also can adopt flow process shown in Figure 8.Fig. 8 has increased steps d 1, d3 in the program of unblanking of key on the basis of Fig. 5, increased steps d 4, d5 in the program of unblanking of lock body, and other flow process is identical with Fig. 5.Fig. 8 is the same with Fig. 6, also be that synchronous legal password at lock body checking key is under the correct condition, key is execution in step b1, and in the process of at every turn unblanking, store among the key configuration data memory A6 in order to produce the synchronous legal data of synchronous legal password, and the synchronous verification msg that is used to verify synchronous legal password of storing among the lock body configuration data memory A7, the capital changes, therefore if with the key operated lock body that once was cracked, when lock body is carried out steps d 5, also can stop, can avoid one section described situation of present embodiment beginning equally.
Present embodiment also can adopt flow process shown in Figure 9.Fig. 9 has increased steps d 1, d3 in the program of unblanking of key on the basis of Fig. 4, increased steps d 4, d5 in the program of unblanking of lock body, and other flow process is identical with Fig. 4.Fig. 9 is the same with Fig. 6, also be that synchronous legal password at lock body checking key is under the correct condition, key is execution in step b1, and in the process of at every turn unblanking, store among the key configuration data memory A6 in order to produce the synchronous legal data of synchronous legal password, and the synchronous verification msg that is used to verify synchronous legal password of storing among the lock body configuration data memory A7, the capital changes, therefore if with the key operated lock body that once was cracked, when lock body is carried out steps d 5, also can stop, can avoid one section described situation of present embodiment beginning equally.
Embodiment 5
In order to solve one section problem that is proposed of beginning, also can increase following steps at embodiment 4:
E1, lock body are before the storage lock body is made mistakes mark, and the synchronous legal password that produces synchronous legal password produces step, has correspondingly increased synchronous legal password generator E1 in lock body;
E2, the lock body configuration data of being stored in lock body configuration data storing step also comprise synchronous legal data, and described synchronous legal data are the calculating parameters that produce the synchronous legal password of generation of relying in the step at the synchronous legal password of lock body;
E3, lock body sent to the synchronous legal password forwarding step of key with synchronous legal password before the storage lock body is made mistakes mark, correspondingly increased synchronous legal password transmitter E3 in lock body;
E4, key receive the synchronous legal password receiving step of synchronous legal password, have correspondingly increased synchronous legal password receiver E4 in key;
E5, key are before the storage key is made mistakes mark, verify whether synchronous legal password is correct, if correctly then continue to move the program of unblanking, the synchronous legal password authentification step of program has correspondingly increased synchronous legal password verifier E5 in key if incorrect then termination operation is unblanked;
E6, the key configuration data of being stored in key configuration data storing step also comprise synchronous verification msg, whether correct described synchronous verification msg be the synchronous legal password that receives of checking the calculating parameter of relying in the synchronous legal password authentification step of key, that is the synchronous verification msg in the key configuration data and the synchronous legal data in the lock body configuration data are complementary the different corresponding different synchronous legal data of synchronous verification msg.
Present embodiment can adopt flow process shown in Figure 10.Figure 10 is the same with Fig. 6 among the embodiment 4, also is to improve on the basis of Fig. 3.The distinctive points of Figure 10 and Fig. 6 only is that synchronous legal password produces and send to key by lock body, whether correct by the synchronous legal password of key authentication, have only synchronous legal password correct, key is execution in step b1, if synchronous legal password bad, key and lock body all stop the program of unblanking.Reason similarly to Example 4, because in the process of at every turn unblanking, store among the lock body configuration data memory A7 in order to produce the synchronous legal data of synchronous legal password, and the synchronous verification msg that is used to verify synchronous legal password of storing among the key configuration data memory A6, the capital changes, therefore if with the key operated lock body that once was cracked, when carrying out step e5, key will stop, in key and lock body, can not preserve the mark of makeing mistakes, so just avoid one section described situation of embodiment 4 beginnings.
Present embodiment also can adopt flow process shown in Figure 11.Figure 11 is the same with Fig. 7 among the embodiment 4, also is to improve on the basis of Fig. 2.The distinctive points of Figure 11 and Fig. 7, the same with Figure 10 with the distinctive points of Fig. 6, be not repeated.
Present embodiment also can adopt flow process shown in Figure 12.Figure 12 is the same with Fig. 8 among the embodiment 4, also is to improve on the basis of Fig. 5.The distinctive points of Figure 12 and Fig. 8, the same with Figure 10 with the distinctive points of Fig. 6, be not repeated.
Present embodiment also can adopt flow process shown in Figure 13.Figure 13 is the same with Fig. 9 among the embodiment 4, also is to improve on the basis of Fig. 4.The distinctive points of Figure 13 and Fig. 9, the same with Figure 10 with the distinctive points of Fig. 6, be not repeated.
As another kind of embodiment, also embodiment 4 and embodiment 5 can be combined, make key and lock body send synchronous legal password respectively to the other side, it all is correct having only the synchronous legal password when key and lock body, ability memory error mark in key and lock body, one section problem that is proposed of beginning that can solve embodiment 4 equally like this.
It is that example is told about that the various embodiments described above have a key made to fit the lock with a lock body.In fact the present invention is applicable to that also those lock body joins the electronic lock of many keys, and key can be opened the electronic lock of a plurality of lock bodies.Join the electronic lock of many keys for a lock body, only need to give every key to set a numbering, in lock body configuration data memory A7, place the data corresponding, number according to different keys when unblanking and enable different data with the key of different numberings; Can open the electronic lock of a plurality of lock bodies for a key, only need to give each lock body to set a numbering, in key configuration data memory A6, place the data corresponding, number according to different lock bodies when unblanking and enable different data with the lock body of different numberings.
The legal password of key used in the present invention, sealed method password, synchronous legal password all are as calculating parameter with the data of storing in key configuration data memory and the lock body configuration data memory, produce with certain algorithm, checking in these passwords also be the data of storing in key configuration data memory and lock body configuration data memory as calculating parameter, verify with certain algorithm.Described algorithm can be selected for use from existing various digital encryption algorithms.With the generation of the legal password of key be verified as example, illustrate wherein a kind of algorithm below:
In this algorithm, the legal data of the key of storing in the key configuration data memory, and the matching relationship between the key authentication data of storing in the lock body configuration data memory is exactly a relation of equality.Setting legal data of key and key authentication data all is to be made of four bytes, when key produces the legal password of key, the legal password generator of key A1 chooses first and second byte data in the legal data of key as key, third and fourth byte data is as plaintext, and key carries out the result of XOR just as the legal password of key with plaintext; When the legal password of lock body checking key, the legal password verifier A4 of key chooses in the key authentication data first and second byte data as authentication secret, the legal password of authentication secret and key carries out XOR and produces checking expressly, whether comparatively validate is expressly identical with third and fourth byte data in the key authentication data, if the legal password of identical then key is correct, otherwise the legal password bad of key.For example, suppose that the legal data of the key of storing in the key configuration data memory are 0x32,0x46,0x13,0x88, the legal password generator of key A1 chooses 0x32 so, and 0x46 is as key, 0x13,0x88 is as plaintext, 0x32,0x46 and 0x13, the legal password of key that 0x88 carries out the XOR generation is 0x21,0xCE; When the legal password of lock body checking key, the key authentication data of storing in the lock body configuration data memory also are 0x32,0x46,0x13,0x88, the legal password verifier A4 of key chooses 0x32,0x46 is as authentication secret, 0x32, the legal password 0x21 of 0x46 and key, 0xCE carries out XOR and produces to verify it expressly is 0x13,0x88, this checking is 0x13 expressly, latter two byte 0x13 in 0x88 and the key authentication data, 0x88 equates, learns that thus the legal password of key is correct.Along the band explanation, the algorithm correspondence is therewith, and the legal data of upgrading among the key configuration data step of updating a8 of key remain relation of equality with the key authentication data of upgrading among the lock body configuration data step of updating a9.Update mode can adopt random algorithm to produce a random number, with this random number as legal data of key and key authentication data.
Various device of the present invention be interpreted as realizing described each step of program of unblanking the functional module that must set up, the electronic lock that is made of such one group of functional module is interpreted as the main functional module framework of realizing the object of the invention by the program of unblanking, therefore the present invention can adopt the hardware configuration the same with existing electronic lock, realizes with the single-chip microcomputer hardware system of routine.Various device of the present invention both can be different hardware entities, also can be that same hardware entities constitutes, and for example all devices in the key (except the unlocking apparatus A5) can be integrated in the singlechip chip.
For realizing the object of the invention better; in concrete making electronic lock; preferably the hardware system of electronic lock is taked some conventional hardware protection measures; to prevent that significant data even program are stolen; for example can in the storage chip of single-chip microcomputer, write the distinctive information of producer; chip is positioned in the enclosure, and enclosure is only reserved necessary communication interface, and opening enclosure will defective chip or cause data failure in the chip.

Claims (10)

1. the electronic lock that can prove whether oneself once was cracked comprises key and lock body, and key and lock body comprise the control device of unblanking that is used to move the program of unblanking respectively, and the described control device of unblanking comprises:
Be positioned at key, be used to produce the legal password generator of key of the legal password of key;
Be positioned at key, be used for the legal password of key is sent to the legal password transmitter of key of lock body;
Be positioned at lock body, be used to receive the legal password receiver of key of the legal password of key;
Be positioned at lock body, be used to verify whether the legal password of key is correct, if correctly then continue to move the program of unblanking, the legal password verifier of key of program if incorrect then termination operation is unblanked;
Be positioned at lock body, be used to carry out the unlocking apparatus of final unlocking action;
It is characterized in that the described control device of unblanking also comprises:
Be positioned at key, be used to store the key configuration data memory of key configuration data, described key configuration data comprises the legal data of key, and the legal data of key are that the legal password generator of key (A1) in the key is rely and produced the calculating parameter of the legal password of key;
Be positioned at lock body, be used to store the lock body configuration data memory of lock body configuration data, described lock body configuration data comprises the key authentication data, whether correct the key authentication data are the legal password of key that checking receives the calculating parameters of relying of the legal password verifier of key (A4) in the lock body, that is the key authentication data in the lock body configuration data and the legal data of key in the key configuration data are complementary the legal data of key that different key authentication data are corresponding different;
Be positioned at key, be used for after key sends the legal password of key, before lock body carries out final unlocking action, upgrade the key configuration data renovator of key configuration data;
Be positioned at lock body, be used for before lock body is carried out final unlocking action, upgrade the lock body configuration data renovator of lock body configuration data.
2. electronic lock as claimed in claim 1 is characterized in that the described control device of unblanking also comprises:
Be positioned at key, be used for before upgrading the key configuration data, the storage key key of the mark mark memory of makeing mistakes of makeing mistakes;
Be positioned at lock body, be used for before upgrading the lock body configuration data, the storage lock body lock body of the mark mark memory of makeing mistakes of makeing mistakes;
Be positioned at key, be used for after key storage key configuration data, before lock body carries out final unlocking action, remove the key key of the mark mark remover of makeing mistakes of makeing mistakes;
Be positioned at lock body, be used for after lock body storage lock body configuration data, before lock body carries out final unlocking action, remove the lock body lock body of the mark mark remover of makeing mistakes of makeing mistakes.
3. electronic lock as claimed in claim 2 is characterized in that the described control device of unblanking also comprises with lower device and characteristics:
Be positioned at lock body, be used to produce the legal password generator of lock body of the legal password of lock body;
The lock body configuration data of being stored in lock body configuration data memory (A7) also comprises sealed method data, and sealed method data are that the legal password generator of lock body in the lock body is rely and produced the calculating parameter of the legal password of lock body;
Be positioned at lock body, be used for before lock body upgrades the lock body configuration data, the legal password of lock body being sent to the legal password transmitter of lock body of key;
Be positioned at key, be used to receive the legal password receiver of lock body of the legal password of lock body;
Be positioned at key, be used to verify whether the legal password of lock body is correct, if correctly then continue the program of unblanking, if the incorrect legal password verifier of lock body that then stops the program of unblanking;
The key configuration data of being stored in key configuration data memory (A6) also comprises the lock verification msg, whether correct described lock verification msg be the legal password of lock body that receives of checking the calculating parameter of relying of the legal password verifier of lock body (C5) in the key, that is the sealed method data in lock verification msg in the key configuration data and the lock body configuration data are complementary the sealed method data that different lock verification msgs is corresponding different;
The described lock body mark memory (B2) of makeing mistakes, be used for lock body send the legal password of lock body finish before the storage lock body mark of makeing mistakes;
The described key mark memory (B1) of makeing mistakes, be used for key send the legal password of key finish before the storage key mark of makeing mistakes.
4. as the described electronic lock in one of claim 2 or 3, it is characterized in that the described control device of unblanking also comprises with lower device and characteristics:
Be positioned at key, be used for makeing mistakes before the mark, produce the synchronous legal password generator of synchronous legal password at key mark memory (B1) the storage key of makeing mistakes;
The key configuration data of being stored in key configuration data memory (A6) also comprises synchronous legal data, and described synchronous legal data are that the synchronous legal password generator (D1) in the key is rely and produced the calculating parameter of synchronous legal password;
Be positioned at key, be used for makeing mistakes before the mark, synchronous legal password is sent to the synchronous legal password transmitter of lock body at key mark memory (B1) the storage key of makeing mistakes;
Be positioned at lock body, be used to receive the synchronous legal password receiver of synchronous legal password;
Be positioned at lock body, be used for makeing mistakes before the mark, verify whether synchronous legal password is correct, if correctly then continue the operation program of unblanking, if incorrect the unblank synchronous legal password verifier of program of operation that then stops at lock body mark memory (B2) the storage lock body of makeing mistakes;
The lock body configuration data of being stored in lock body configuration data memory (A7) also comprises synchronous verification msg, whether correct described synchronous verification msg be synchronous legal password that checking receives the calculating parameter of relying of the synchronous legal password verifier (D5) in the lock body, that is the synchronous verification msg in the lock body configuration data and the synchronous legal data in the key configuration data are complementary the different corresponding different synchronous legal data of synchronous verification msg.
5. as the described electronic lock in one of claim 2 or 3, it is characterized in that the described control device of unblanking also comprises with lower device and characteristics:
Be positioned at lock body, be used for makeing mistakes before the mark, produce the synchronous legal password generator of synchronous legal password at lock body mark memory (B2) the storage lock body of makeing mistakes;
The lock body configuration data of being stored in lock body configuration data memory (A7) also comprises synchronous legal data, and described synchronous legal data are that the synchronous legal password generator (E1) in the lock body is rely and produced the calculating parameter of synchronous legal password;
Be positioned at lock body, be used for makeing mistakes before the mark, synchronous legal password is sent to the synchronous legal password transmitter of key at lock body mark memory (B2) the storage lock body of makeing mistakes;
Be positioned at key, be used to receive the synchronous legal password receiver of synchronous legal password;
Be positioned at key, be used for makeing mistakes before the mark, verify whether synchronous legal password is correct, if correctly then continue the operation program of unblanking, if incorrect the unblank synchronous legal password verifier of program of operation that then stops at key mark memory (B1) the storage key of makeing mistakes;
The key configuration data of being stored in key configuration data memory (A6) also comprises synchronous verification msg, whether correct described synchronous verification msg be synchronous legal password that checking receives the calculating parameter of relying of the synchronous legal password verifier (E5) in the key, that is the synchronous verification msg in the key configuration data and the synchronous legal data in the lock body configuration data are complementary the different corresponding different synchronous legal data of synchronous verification msg.
6. one kind makes the described electronic lock of claim 1 can prove the method whether oneself once was cracked, and comprises the following step of unblanking:
The legal password of key that key produces the legal password of key produces step;
Key sends to the legal password of key the legal password forwarding step of key of lock body;
Lock body receives the legal password receiving step of key of the legal password of key;
Whether the legal password of lock body checking key is correct, if correctly then continue to carry out the step of unblanking, if the incorrect legal password authentification step of key that then stops carrying out the step of unblanking;
Lock body is carried out the step of final unlocking action;
It is characterized in that: the further comprising the steps of and characteristics of the described step of unblanking:
The key configuration data storing step of storage key configuration data in key, described key configuration data comprises the legal data of key, and the legal data of key are to produce to rely in the step (a1) at the legal password of the key of key to produce the calculating parameter of the legal password of key;
The lock body configuration data storing step of storage lock body configuration data in lock body, described lock body configuration data comprises the key authentication data, whether correct the key authentication data are the legal password of key that receives of checking the calculating parameters of relying in the legal password authentification step of the key of lock body (a4), that is the key authentication data in the lock body configuration data and the legal data of key in the key configuration data are complementary the legal data of key that different key authentication data are corresponding different;
Key upgrades the key configuration data step of updating of key configuration data after sending the legal password of key, before lock body carries out and finally unblank;
Lock body is carried out at lock body before the step of final unlocking action, upgrades the lock body configuration data step of updating of lock body configuration data.
7. method as claimed in claim 6 is characterized in that the described step of unblanking is further comprising the steps of:
Before upgrading the key configuration data, the storage key key of the mark marker stores step of makeing mistakes of makeing mistakes in key;
Before upgrading the lock body configuration data, the storage lock body lock body of the mark marker stores step of makeing mistakes of makeing mistakes in lock body;
After key storage key configuration data, before lock body carries out final unlocking action, remove the key key of the mark mark of makeing mistakes of makeing mistakes and remove step;
After lock body storage lock body configuration data, before lock body carries out final unlocking action, remove the lock body lock body of the mark mark of makeing mistakes of makeing mistakes and remove step.
8. method as claimed in claim 7 is characterized in that the further comprising the steps of and characteristics of the described step of unblanking:
The legal password of lock body that lock body produces the legal password of lock body produces step;
The lock body configuration data of being stored in lock body configuration data storing step (a7) also comprises sealed method data, and sealed method data are to produce to rely in the step at the legal password of lock body to produce the calculating parameter of the legal password of lock body;
Before lock body upgrades the lock body configuration data, the legal password of lock body is sent to the legal password forwarding step of lock body of key;
Key receives the legal password receiving step of lock body of the legal password of lock body;
Whether the legal password of key authentication lock body is correct, if correctly then continue to carry out the step of unblanking, if the incorrect legal password authentification step of lock body that then stops carrying out the step of unblanking;
The key configuration data of being stored in key configuration data storing step (a6) also comprises the lock verification msg, whether correct described lock verification msg be the legal password of lock body that receives of checking the calculating parameter of relying in the legal password authentification step of the lock body of key (c5), that is the sealed method data in lock verification msg in the key configuration data and the lock body configuration data are complementary the sealed method data that different lock verification msgs is corresponding different;
The described lock body of the claim 7 marker stores step (b2) of makeing mistakes is to send before the legal password of lock body finishes at lock body;
The described key of the claim 7 marker stores step (b1) of makeing mistakes is to send before the legal password of key finishes at key.
9. as the described method in one of claim 7 or 8, it is characterized in that the further comprising the steps of and characteristics of the described step of unblanking:
Key is made mistakes marker stores step (b1) before at key, and the synchronous legal password that produces synchronous legal password produces step;
The key configuration data of being stored in key configuration data storing step (a6) also comprises synchronous legal data, and described synchronous legal data are the calculating parameters that produce the synchronous legal password of generation of relying in the step (d1) at the synchronous legal password of key;
Key is made mistakes marker stores step (b1) before at key, synchronous legal password is sent to the synchronous legal password forwarding step of lock body;
Lock body receives the synchronous legal password receiving step of synchronous legal password;
Lock body is made mistakes marker stores step (b2) before at lock body, verifies whether synchronous legal password is correct, if correctly then continue to carry out the step of unblanking, if the incorrect synchronous legal password authentification step that then stops carrying out the step of unblanking;
The lock body configuration data of being stored in lock body configuration data storing step (a7) also comprises synchronous verification msg, whether correct described synchronous verification msg be the synchronous legal password that receives of checking the calculating parameter of relying in the synchronous legal password authentification step (d5) of lock body, that is the synchronous verification msg in the lock body configuration data and the synchronous legal data in the key configuration data are complementary the different corresponding different synchronous legal data of synchronous verification msg.
10. as the described method in one of claim 7 or 8, it is characterized in that the further comprising the steps of and characteristics of the described step of unblanking:
Lock body is made mistakes marker stores step (b2) before at lock body, and the synchronous legal password that produces synchronous legal password produces step;
The lock body configuration data of being stored in lock body configuration data storing step (a7) also comprises synchronous legal data, and described synchronous legal data are the calculating parameters that produce the synchronous legal password of generation of relying in the step (e1) at the synchronous legal password of lock body;
Lock body is made mistakes marker stores step (b2) before at lock body, synchronous legal password is sent to the synchronous legal password forwarding step of key;
Key receives the synchronous legal password receiving step of synchronous legal password;
Key is made mistakes marker stores step (b1) before at key, verifies whether synchronous legal password is correct, if correctly then continue to carry out the step of unblanking, if the incorrect synchronous legal password authentification step that then stops carrying out the step of unblanking;
The key configuration data of being stored in key configuration data storing step (a6) also comprises synchronous verification msg, whether correct described synchronous verification msg be the synchronous legal password that receives of checking the calculating parameter of relying in the synchronous legal password authentification step (e5) of key, that is the synchronous verification msg in the key configuration data and the synchronous legal data in the lock body configuration data are complementary the different corresponding different synchronous legal data of synchronous verification msg.
CN200710027002XA 2007-02-15 2007-02-15 Electric lock capable of proofing whether himself had been unlocked and implementation method therefor Expired - Fee Related CN101016814B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710027002XA CN101016814B (en) 2007-02-15 2007-02-15 Electric lock capable of proofing whether himself had been unlocked and implementation method therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710027002XA CN101016814B (en) 2007-02-15 2007-02-15 Electric lock capable of proofing whether himself had been unlocked and implementation method therefor

Publications (2)

Publication Number Publication Date
CN101016814A CN101016814A (en) 2007-08-15
CN101016814B true CN101016814B (en) 2010-12-08

Family

ID=38726021

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710027002XA Expired - Fee Related CN101016814B (en) 2007-02-15 2007-02-15 Electric lock capable of proofing whether himself had been unlocked and implementation method therefor

Country Status (1)

Country Link
CN (1) CN101016814B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102426715A (en) * 2011-09-30 2012-04-25 华为技术有限公司 Unlocking method for electronic door lock, electronic door lock and electronic door lock system
CN104899946B (en) * 2015-05-05 2017-09-19 范玉昌 The communication means of anti-decoding optoelectronic switch lock
TWI706077B (en) * 2019-07-29 2020-10-01 彰彬工業股份有限公司 How to use electronic trailer lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4207555A (en) * 1978-03-03 1980-06-10 The Eastern Company Lock system
CN1317619A (en) * 2001-03-21 2001-10-17 张凤石 Computerised lock and computerized key
CN1145735C (en) * 1996-07-10 2004-04-14 石易 Autonomous random dynamic puzzle-lock system
CN1769637A (en) * 2004-11-01 2006-05-10 华为技术有限公司 Electric key and electric lock device and realization method thereof
CN2797547Y (en) * 2005-06-20 2006-07-19 张七利 Electronic puzzle lock device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4207555A (en) * 1978-03-03 1980-06-10 The Eastern Company Lock system
CN1145735C (en) * 1996-07-10 2004-04-14 石易 Autonomous random dynamic puzzle-lock system
CN1317619A (en) * 2001-03-21 2001-10-17 张凤石 Computerised lock and computerized key
CN1769637A (en) * 2004-11-01 2006-05-10 华为技术有限公司 Electric key and electric lock device and realization method thereof
CN2797547Y (en) * 2005-06-20 2006-07-19 张七利 Electronic puzzle lock device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特开平5-71258A 1993.03.23

Also Published As

Publication number Publication date
CN101016814A (en) 2007-08-15

Similar Documents

Publication Publication Date Title
CN102843231B (en) Cryptographic communications systems and cipher communication method
CN105139491B (en) A kind of cell phone access control based on ciphering type Quick Response Code
CN107978047B (en) Use the methods, devices and systems of password unlocking
CA1103358A (en) Digital signature system and apparatus
CN106020139B (en) A kind of substation configuration description file consistency ensuring method based on flow management and control
EP2999156A1 (en) Device authenticity determination system and device authenticity determination method
CN107797827A (en) Secure storage system and the method for safe storage
CN107992753B (en) Method for updating software of a control device of a vehicle
CN109617675A (en) Both sides' identification authentication method and system between a kind of charge-discharge facility and user terminal
CN106933752B (en) A kind of encryption device and method of SRAM type FPGA
CN110598375B (en) Data processing method, device and storage medium
CN110473327A (en) A kind of lock control method based on NFC, system and storage medium
CN107958513A (en) A kind of offline authorization method and system of electronic lock
CN101016814B (en) Electric lock capable of proofing whether himself had been unlocked and implementation method therefor
CN105956452A (en) Method and system for unlocking device
CN113344222A (en) Safe and credible federal learning mechanism based on block chain
CN103117862A (en) Method for using X.509 digital certificate of openssl for verifying Java certificate
CN106548059A (en) The method of teacher, head of a family's mobile terminal and head of a family's authentication
CN110543768A (en) method and system for controlling trusted root in BIOS
CN101741561A (en) Method and system for authenticating two-way hardware
CN111125456A (en) Virtual password comparison method and system and intelligent lock
CN106506145A (en) Key system and its encipher-decipher method
CN109977702A (en) A kind of FPGA device encrypted authentication system and method based on DS2432 chip
CN110321725A (en) A kind of method and device for preventing from distorting system data and clock
CN102983969A (en) Security login system and security login method for operating system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101208

Termination date: 20130215