CN104537737A - Picture lock and application of picture key - Google Patents
Picture lock and application of picture key Download PDFInfo
- Publication number
- CN104537737A CN104537737A CN201410807201.2A CN201410807201A CN104537737A CN 104537737 A CN104537737 A CN 104537737A CN 201410807201 A CN201410807201 A CN 201410807201A CN 104537737 A CN104537737 A CN 104537737A
- Authority
- CN
- China
- Prior art keywords
- picture
- mortice lock
- key
- lock
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to a picture lock and application of a picture key. The application comprises the following steps: when the picture lock is used by a user, the user sends information of the picture lock to a cloud data server center and simultaneously acquires an authorized mobile phone APP, the authorized mobile phone APP can send acquiring information to the cloud data server center, the cloud data server center generates a picture corresponding to the picture lock by virtue of an operate mode the same as the picture lock, then compiles the picture into an encrypted picture key and sends the picture to a mobile phone of the user, and then the user can directly unlock the picture lock by virtue of the picture key. The picture lock has the characteristics that the use is convenient, the safety is high, the picture lock is unlikely decoded, and the like.
Description
Technical field
The invention belongs to picture lock technology field, relate to the application of a kind of figure mortice lock and picture key.
Background technology
The door lock in past generally adopts the corresponding lockhole of key to unblank, but because key carries inconvenience, just find when often people go out that oneself non-carrying keys is gone out, or there is the situation that key is lost when moving out of doors, so people have invented Puzzle door lock relatively more conventional in modern hotels, the advantage of coded lock is without the need to carrying keys, people only needs to remember that password just can get back to the family of oneself, without the need to worrying the problems such as key loss, but because the security of coded lock is comparatively single, if other people are aware of the room that password also can enter user easily, applicant devised a kind of figure mortice lock afterwards, by downloading the encryption picture of the operation law corresponding with this figure mortice lock thus opening figure mortice lock, but owing to being directly use Quick Response Code, therefore be also very easy in use directly be decoded by people.
Summary of the invention
For overcoming above-mentioned technical disadvantages, the invention provides the application of a kind of figure mortice lock and picture key, virtual key encryption can be changed into picture when obtaining virtual key by cloud data service center by it, be transferred to user again, thus enable user directly use encryption to have data picture to open figure mortice lock, have property easy to use, safe by force, not easily by features such as people decode.
The present invention solves the technical method that its technical matters adopts: the application of a kind of figure mortice lock and picture key, and its applying step is:
Send to cloud data service center to obtain a mobile phone A PP authorized the information of figure mortice lock during user's use figure mortice lock of first figure mortice lock simultaneously, this mobile phone A PP can send an obtaining information to cloud data service center, cloud data service center then can to generate a corresponding picture phase-locked with this picture with the identical operation mode that figure mortice lock is arranged, then this picture is compiled into a secondary encryption picture key, and above mobile phone picture being sent to user, user just can directly use this picture key to open figure mortice lock.
This mobile phone A PP can directly bind this cell-phone number, thus cannot to the virtual key of picture of cloud data service center acquisition figure mortice lock after avoiding mobile phone to drop.
Outside described figure mortice lock, be provided with picture collection device, in figure mortice lock, be then provided with processor, this processor is then connected with the reservoir being positioned at figure mortice lock, can comparison and analyze whether belong to same compute mode picture key thus realize unblank.
The invention has the beneficial effects as follows: by picture being compiled into encryption picture key, thus fundamentally improve the security of figure mortice lock, because picture has been compiled into encryption picture key, even if therefore deliberately remembered also cannot decode picture by people, have property easy to use, safe by force, not easily by features such as people decode.
Embodiment
Below in conjunction with embodiment, the present invention is further described.
An application for figure mortice lock and picture key, its applying step is:
Send to cloud data service center to obtain a mobile phone A PP authorized the information of figure mortice lock during user's use figure mortice lock of first figure mortice lock simultaneously, this mobile phone A PP can send an obtaining information to cloud data service center, cloud data service center then can to generate a corresponding picture phase-locked with this picture with the identical operation mode that figure mortice lock is arranged, then this picture is compiled into a secondary encryption picture key, and above mobile phone picture being sent to user, user just can directly use this picture key to open figure mortice lock.
This mobile phone A PP can directly bind this cell-phone number, thus cannot to the virtual key of picture of cloud data service center acquisition figure mortice lock after avoiding mobile phone to drop.
Outside described figure mortice lock, be provided with picture collection device, in figure mortice lock, be then provided with processor, this processor is then connected with the reservoir being positioned at figure mortice lock, can comparison and analyze whether belong to same compute mode picture key thus realize unblank.
The invention has the beneficial effects as follows: by picture being compiled into encryption picture key, thus fundamentally improve the security of figure mortice lock, because picture has been compiled into encryption picture key, even if therefore deliberately remembered also cannot decode picture by people, have property easy to use, safe by force, not easily by features such as people decode.
Claims (3)
1. an application for figure mortice lock and picture key, is characterized in that applying step is:
Send to cloud data service center to obtain a mobile phone A PP authorized the information of figure mortice lock during user's use figure mortice lock of first figure mortice lock simultaneously, this mobile phone A PP can send an obtaining information to cloud data service center, cloud data service center then can to generate a corresponding picture phase-locked with this picture with the identical operation mode that figure mortice lock is arranged, then this picture is compiled into a secondary encryption picture key, and above mobile phone picture being sent to user, user just can directly use this picture key to open figure mortice lock.
2. the application of figure mortice lock and picture key as claimed in claim 1, is characterized in that this mobile phone A PP can directly bind this cell-phone number, thus cannot to the virtual key of picture of cloud data service center acquisition figure mortice lock after avoiding mobile phone to drop.
3. the application of figure mortice lock and picture key as claimed in claim 1, it is characterized in that being provided with picture collection device outside described figure mortice lock, then processor is provided with in figure mortice lock, this processor is then connected with the reservoir being positioned at figure mortice lock, can comparison and analyze whether belong to same compute mode picture key thus realize unblank.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410807201.2A CN104537737A (en) | 2014-12-23 | 2014-12-23 | Picture lock and application of picture key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410807201.2A CN104537737A (en) | 2014-12-23 | 2014-12-23 | Picture lock and application of picture key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104537737A true CN104537737A (en) | 2015-04-22 |
Family
ID=52853256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410807201.2A Pending CN104537737A (en) | 2014-12-23 | 2014-12-23 | Picture lock and application of picture key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104537737A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425191A (en) * | 2007-10-31 | 2009-05-06 | 鸿富锦精密工业(深圳)有限公司 | Safety system |
CN103116928A (en) * | 2013-03-14 | 2013-05-22 | 韶关市英诺维科技设备有限公司 | Two-dimensional code unlocking method |
CN103593894A (en) * | 2013-11-14 | 2014-02-19 | 高椿明 | Double-encryption entrance guard system based on handset two-dimension code |
CN103646455A (en) * | 2013-12-24 | 2014-03-19 | 杨密凯 | Intelligent lock device and usage method thereof as well as configuration method for electronic keys |
CN103955975A (en) * | 2014-04-22 | 2014-07-30 | 广州闪购软件服务有限公司 | Cellphone-based dynamic two-dimension code access control system |
CN103955982A (en) * | 2014-05-22 | 2014-07-30 | 国家电网公司 | Method and device for identifying time-varying dynamic two-dimensional code entrance guard |
CN104167041A (en) * | 2014-09-11 | 2014-11-26 | 祁春富 | Access control system based on smart phones and control method of access control system |
-
2014
- 2014-12-23 CN CN201410807201.2A patent/CN104537737A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425191A (en) * | 2007-10-31 | 2009-05-06 | 鸿富锦精密工业(深圳)有限公司 | Safety system |
CN103116928A (en) * | 2013-03-14 | 2013-05-22 | 韶关市英诺维科技设备有限公司 | Two-dimensional code unlocking method |
CN103593894A (en) * | 2013-11-14 | 2014-02-19 | 高椿明 | Double-encryption entrance guard system based on handset two-dimension code |
CN103646455A (en) * | 2013-12-24 | 2014-03-19 | 杨密凯 | Intelligent lock device and usage method thereof as well as configuration method for electronic keys |
CN103955975A (en) * | 2014-04-22 | 2014-07-30 | 广州闪购软件服务有限公司 | Cellphone-based dynamic two-dimension code access control system |
CN103955982A (en) * | 2014-05-22 | 2014-07-30 | 国家电网公司 | Method and device for identifying time-varying dynamic two-dimensional code entrance guard |
CN104167041A (en) * | 2014-09-11 | 2014-11-26 | 祁春富 | Access control system based on smart phones and control method of access control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109790727B (en) | Padlock device, system including the same, and method of operating the same | |
CN105303659B (en) | A kind of gate inhibition's personal identification method and device based on ultrasonic wave | |
CN204904392U (en) | Intelligent lock system is encrypted in high in clouds | |
JP3198191U (en) | Access control system that integrates Bluetooth (registered trademark) and NFC and has video transmission | |
MX366390B (en) | Wireless key management for authentication. | |
MX2016011988A (en) | Confidential data management method and device, and security authentication mehod and system. | |
NZ728318A (en) | Networked access control system | |
WO2015023341A3 (en) | Secure authorization systems and methods | |
WO2016144257A3 (en) | Method and system for facilitating authentication | |
JP2015508257A5 (en) | ||
MY169151A (en) | Security key generation for dual connectivity | |
WO2013003265A3 (en) | Persistent key access to a resources in a collection | |
WO2009115528A3 (en) | Mobile terminal authorisation arrangements | |
CN105005862A (en) | Internet dynamic password unlocking management system | |
CN103136819A (en) | Unlocking method for door control system based on mobile terminal and mobile terminal | |
CN104464064A (en) | Application of two-dimensional code lock to home furnishing | |
SG11201906426PA (en) | Device configuration method, apparatus and system | |
CN104852913A (en) | Dynamic password electronic coded lock | |
AU2016342501A1 (en) | Method and system for facilitating use of an electronically controlled lock | |
CN105635075A (en) | Method of registering cloud terminal, cloud terminal, cloud server and cloud system | |
CN204833403U (en) | Access control system based on bluetooth | |
CN104537737A (en) | Picture lock and application of picture key | |
CN206411752U (en) | A kind of visual door control system based on wearable device | |
CN204303346U (en) | The portable hard drive that a kind of remote password controls | |
CN205827475U (en) | A kind of Internet of Things electronic lock control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150422 |
|
RJ01 | Rejection of invention patent application after publication |