KR20170048953A - method for transferring a virtual key and unlocking a locking device using a mobile device - Google Patents

method for transferring a virtual key and unlocking a locking device using a mobile device Download PDF

Info

Publication number
KR20170048953A
KR20170048953A KR1020150149685A KR20150149685A KR20170048953A KR 20170048953 A KR20170048953 A KR 20170048953A KR 1020150149685 A KR1020150149685 A KR 1020150149685A KR 20150149685 A KR20150149685 A KR 20150149685A KR 20170048953 A KR20170048953 A KR 20170048953A
Authority
KR
South Korea
Prior art keywords
virtual key
key
information
mobile device
virtual
Prior art date
Application number
KR1020150149685A
Other languages
Korean (ko)
Other versions
KR101828572B1 (en
Inventor
김기종
Original Assignee
김기종
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 김기종 filed Critical 김기종
Priority to KR1020150149685A priority Critical patent/KR101828572B1/en
Publication of KR20170048953A publication Critical patent/KR20170048953A/en
Application granted granted Critical
Publication of KR101828572B1 publication Critical patent/KR101828572B1/en

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0048Circuits, feeding, monitoring
    • E05B2047/0071Connecting lockparts by electronic communication means only, e.g. bus systems, time multiplexing
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B2047/0094Mechanical aspects of remotely controlled locks
    • E05B2047/0095Mechanical aspects of locks controlled by telephone signals, e.g. by mobile phones

Abstract

Disclosed is a method for transmitting a virtual key and releasing a locking device by using a mobile device, which comprises the steps of: receiving a virtual key; confirming the validity of the virtual key based on at least one among time information and frequency information about the virtual key; and when the virtual key is valid, performing a near-field communication with a locking device by using the virtual key. The time information is information indicating a time period for which the virtual key can be used, and the frequency information is information indicating the number of times that the virtual key can be used.

Description

[0001] The present invention relates to a method for transferring a virtual key using a mobile device and a method for releasing a lock device,

The present invention relates to a method of transmitting a virtual key, and more particularly, to a method for transmitting a virtual key to a third party using a mobile device such as a smart phone or a wearable device, And releasing the locking device.

The release system of the lock device by inputting the key value which is mainly used in recent years is designed to be robust enough that it is almost impossible to release the lock device without knowing the key value. In addition, the structure of the key for locking and unlocking the lock releasing system is also made very complicated.

On the other hand, in the opening and closing method using the conventional contact type card in releasing the locking device, the technique has been technically developed as the opening and closing method using the non-contact type key or the card. Furthermore, a method of releasing a lock using a smartphone app is being developed. However, since the conventional method using the app must perform communication with the lock device using the Internet, it is impossible to use the existing lock device (that is, the lock device must be implemented so as to be able to communicate with the internet) And it takes a lot of time to release it.

SUMMARY OF THE INVENTION The present invention has been made to solve the above-mentioned problems, and it is an object of the present invention to provide a communication system capable of releasing an existing lock device through a local communication (e.g., NFC) instead of Internet communication, And a third person can release the locking device using the virtual key.

According to an aspect of the present invention, there is provided a method for transmitting a virtual key using a mobile device, comprising: receiving a virtual key; checking validity of the virtual key based on at least one of time information and frequency information about the virtual key; And performing short-range communication with the lock device using the virtual key when the virtual key is valid, the time information is information indicating a time period during which the virtual key can be used, The number information may be information indicating the number of times the virtual key can be used.

According to an embodiment of the present invention, performing short-range communication using the virtual key may include generating a key value by decoding the encrypted key information of the virtual key with a decryption key, and transmitting the key value to the lock device Step < / RTI >

According to another example of the present invention, the method may further comprise confirming whether the unique number of the mobile device of the temporary user using the virtual key is the registered number. The method may further include receiving identification information from the locking device to confirm the validity of the locking device.

According to another aspect of the present invention, a method of releasing a lock using a mobile device includes receiving a virtual key including key information, confirming that the virtual key is permanently available, If the virtual key is not available, verifying validity of the virtual key based on at least one of the time information and the count information included in the virtual key; and if the virtual key is permanently available or valid, Generating a key value based on the key value, and transmitting the key value to the lock device using near-field communication, wherein the time information is information indicating a time period during which the virtual key can be used, And may be information indicating the number of times the virtual key can be used.

According to an embodiment of the present invention, when the virtual key is used, the usage information of the virtual key may be updated and the usage information may be delivered to the original owner of the virtual key.

According to another example of the present invention, in response to a request to retrieve the original owner of the virtual key, the virtual key received by the mobile device may be retrieved.

1 is a block diagram schematically illustrating a method of transmitting a virtual key according to embodiments of the present invention.
2 is a flowchart schematically illustrating a method of transmitting a virtual key according to embodiments of the present invention and a method of releasing a locking device using a received virtual key.
3 is a flowchart schematically illustrating a method of transmitting a virtual key according to embodiments of the present invention and a method of releasing a locking device using a received virtual key.
4 is a flowchart schematically showing the approval process of FIG.
FIG. 5 is a block diagram showing a mobile device of the temporary user of FIG. 3 in more detail.
FIG. 6 is a flow chart schematically showing a part of the operation of the control unit of the mobile device of the temporary user of FIG. 5;
7 to 9 schematically illustrate a method of transmitting a virtual key according to embodiments of the present invention and a method of releasing a locking device using a received virtual key.

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

Embodiments of the present invention are provided to more fully describe the present invention to those skilled in the art, and the following embodiments may be modified in various other forms, The present invention is not limited to the following embodiments. Rather, these embodiments are provided so that this disclosure will be more thorough and complete, and will fully convey the concept of the invention to those skilled in the art.

The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a", "an," and "the" include plural forms unless the context clearly dictates otherwise. Also, " comprise "and / or" comprising "when used herein should be interpreted as specifying the presence of stated shapes, numbers, steps, operations, elements, elements, and / And does not preclude the presence or addition of one or more other features, integers, operations, elements, elements, and / or groups. As used herein, the term " and / or " includes any and all combinations of one or more of the listed items.

Although the terms first, second, etc. are used herein to describe various elements, regions, and / or regions, it is to be understood that these elements, components, regions, and / . These terms are not intended to be in any particular order, up or down, or top-down, and are used only to distinguish one member, region or region from another member, region or region. Thus, the first member, region or region described below may refer to a second member, region or region without departing from the teachings of the present invention.

1 is a block diagram schematically illustrating a method of transmitting a virtual key according to embodiments of the present invention.

Referring to FIG. 1, the original owner's mobile device registers a key value capable of performing close-range communication with the lock device to release the lock device. The registration process may be performed by registering the key generated in the mobile device with the lock device, and may be performed by copying the key value from the RFID tag registered in the lock device.

The mobile device described herein may be a smart phone or a wearable device, and may include any device capable of the Internet and local area communication (e.g., NFC). The locking device may be a door lock of a door of a general home, a door lock of an outer door of a multi-family house such as an apartment house or a multi-family house, a door lock of a door of a guest room of a hotel, It may be a car door opening / closing system. That is, the locking device referred to herein may include any device that receives a key value via short-range communication and performs an opening and closing operation.

The registered key value may be delivered to a third party. More specifically, the third party can receive the virtual key from the original owner (i.e., the person who registered the key value) and release the lock using the virtual key. According to an alternative embodiment, the third party may receive a virtual key from a non-original owner (e.g., a person who is allowed to deliver the virtual key by authorization of the original owner, such as the family of the original owner) .

The virtual key may include original owner information (or key server information), key information (e.g., encrypted key value), frequency information, and / or time information. The time information may be defined as information indicating a time period during which the virtual key can be used. The number information may be defined as information indicating the number of times a virtual key can be used.

The third party may then release the lock by receiving the virtual key from the original owner. 2 is a flowchart schematically illustrating a method of transmitting a virtual key according to embodiments of the present invention and a method of releasing a locking device using a received virtual key.

Referring to FIG. 2, a third party receives a virtual key from the original owner (S110). More specifically, for example, the mobile device of a temporary user (third party) may communicate with the original owner's mobile device or key server to receive the virtual key. After being received, information about the virtual key may be displayed via the display of the third party mobile device.

Then, it is determined whether the virtual key is permanently available (S120). And judges whether or not the virtual key is valid if the virtual key is not permanently available.

At least one of the above-described judging procedures may be performed in the mobile device of the temporary user by receiving information in the received virtual key (e.g., time information and / or frequency information, or information regarding a separate permanent use availability, ). ≪ / RTI > In this case, the lock can be released without any communication with the original owner (or the key server) even when the internet is impossible.

Optionally, the determination process may be performed through communication with the original owner's mobile device or key server. In this case, when the virtual key is used, communication between the third party mobile device and the original owner's mobile device (or the key server) is required, but more reliable opening and closing operations can be performed. That is, it is superior in terms of security.

If the virtual key is permanently available or valid, the virtual key is used to perform close-range communication with the lock device (S140), and the lock device can be opened accordingly. More specifically, the key value is generated based on the key information of the virtual key, and the key value is transmitted to the lock device with the third party mobile device close to the lock device, so that the lock device can be opened.

If the virtual key is permanently available, the key information of the virtual key may be the key value itself (i.e., the lock device may be released without performing a separate decryption on the virtual key, etc.). If the virtual key is not permanently available but valid, the key information of the virtual key may be set to an encrypted key value.

The generation of the key value may be performed after the third party mobile device closes the lock device, or may be activated by the user's button (i.e., it may be performed before short-distance communication with the lock device).

3 is a flowchart schematically illustrating a method of transmitting a virtual key according to embodiments of the present invention and a method of releasing a locking device using a received virtual key.

Referring to FIG. 3, after a third party (temporary user) receives the virtual key, it may transmit an approval request signal to the original owner's mobile device to determine whether the virtual key is valid. The original owner's mobile device may send an acknowledgment or rejection signal to the temporary user's mobile device in response to the authorization request signal.

If the validity of the virtual key has been determined in the third party mobile device, the mobile user of the temporary user may send an approval request signal to the original owner mobile device after the validity determination. The original owner's mobile device may send an acknowledgment signal (e.g., a decryption key) to the temporary user's mobile device in response to the authorization request signal if there is no retrieval request (see FIG. 9) to retrieve the hot water.

In another embodiment, the validity of the virtual key may have been determined in the original owner's mobile device. In another embodiment, the authorization procedure may be performed in the mobile user of the temporary user without communicating with the original owner's mobile device or key server. Such an embodiment has the advantage that the lock can be released without any communication with the original owner (or the key server) even in the situation where the internet is impossible as described above.

Although not shown in the drawings, the locking device may include an identifier (e.g., an RFID tag, an NFC tag).

4 is a flowchart schematically showing the approval process of FIG.

Referring to FIG. 4, the temporary user's mobile device can send an approval request signal to the original owner's mobile device, and the original owner's mobile device can receive the approval request signal (S210). The approval request signal may include a unique number (e.g., a telephone number, a device ID, etc.) of the mobile user of the temporary user.

Then, it is checked whether the unique number of the mobile user of the temporary user is a registered unique number (S220). If the registered number is a registered number, an approval signal is generated (S230) . Through such a procedure, the virtual key can be restricted to be used only for the authorized (i.e., registered) mobile device, and any user can be prevented from using and copying the virtual key.

The step of confirming that the unique number of the temporary user's mobile device is the registered unique number may be performed in the original owner's mobile device or in the temporary user's mobile device as described above. For example, the virtual key may further include information on the unique number of the mobile device of the temporary user (see FIG. 1), extract the unique number of the temporary user, and then, during the confirming step, Can be compared.

FIG. 5 is a block diagram showing the mobile device of the temporary user of FIG. 3 in more detail, and shows the procedure after the approval procedure of FIG. 3 in more detail.

Referring to FIG. 5, the mobile device of the temporary user may include a storage unit, a control unit, a communication unit, and an NFC transceiver unit.

When the original owner mobile device transmits an approval signal (e.g., a decryption key) to the mobile device of the temporary user, the communication unit can receive it and forward it to the control unit. The control unit can perform the decryption function, and can read the key information including the encrypted key value from the storage unit, and generate the key value based on the key information and the decryption key. When the key value is generated, the control unit transfers the key value to the NFC transceiver unit, and the NFC transceiver unit can transmit the key value to the lock unit.

The locking device may receive the key value, release the locked state through user authentication, and forward the termination signal to the NFC transceiver. The termination signal is transmitted to the communication unit through the control unit, and the communication unit can transmit the termination signal to the mobile equipment of the original owner. Thus, the owner of the key can be notified whether or not the key is used.

Optionally, if the authorization procedure is performed in the mobile device of the temporary user without communication with the original owner's mobile device or key server, the decryption key may be stored in the storage of the temporary user's mobile device. In this case , An approval procedure, a key value creation procedure, and an unlock procedure can be performed without communicating with the original owner's mobile device via the communication unit.

Note that the NFC transceiver unit of the present specification is not limited to the transceiver unit according to the NFC standard, and may be implemented as a transceiver unit compliant with any wireless communication standard for short-range wireless communication.

FIG. 6 is a flow chart schematically showing a part of the operation of the control unit of the mobile device of the temporary user of FIG. 5;

Referring to FIG. 6, in addition to the above-described key value generation operation, the controller may perform a step of determining whether the lock device is a valid lock device (i.e., does not correspond to a reader of a person who replicates a key value) (S310). Specifically, the mobile user of the temporary user can receive the identification information from the lock device to check the validity of the lock device. If the lock device is valid, the virtual key is activated (e.g., generating a key value or transferring the generated key value to the lock device) (S320), and if not valid, generating an error message (S330).

For example, a tag (e.g., RFID tag, NFC tag, etc.) may be attached to the locking device, and the mobile device of the temporary user may be operable to generate a key value only if the tag is recognized. Alternatively, the recognition distance of the tag may be set to be short so that a separate duplication device can not enter between the tag and the mobile device of the temporary user. Therefore, when a device for duplicating a key value is inserted between a mobile device and a tag, a tag attached to the lock device is not recognized.

As another example, the mobile user of the temporary user may use the camera to acquire an image of the lock device and activate the virtual key only when the same is compared (or substantially the same) with the image registered by the original owner. The operation may be performed in the original owner's mobile device, in the mobile device of the temporary user, or in the key server. When executed on the temporary user's mobile device, the virtual key may further include image information of the lock device registered by the original owner.

7 to 9 schematically illustrate a method of transmitting a virtual key according to embodiments of the present invention and a method of releasing a locking device using a received virtual key.

7, for example, the first virtual key of the first mobile device and the second virtual key of the second mobile device may be delivered to a mobile device of a temporary user (e.g., a courier). In this case, the number of times information for each of the first and second virtual keys may be set to one.

If the temporary user brings the mobile device closer to the lock to open the original owner's lock of the first virtual key (e.g., the entrance door of the apartment where the original owner resides), the mobile device of the temporary user is moved to the original owner's mobile You can request approval from the device. Since the number of times information for the first virtual key is 1, the original owner's mobile device can forward the grant signal to the mobile user of the temporary user, so that the first lock device can be released. Then, the usage information of the virtual key is updated and the number information becomes 0, or the first virtual key is discarded. Therefore, even if the temporary user makes an approval request based on the first virtual key to release the lock device, the first lock device will not be released.

On the other hand, if the temporary user moves the mobile device closer to the lock to open the original owner's lock of the second virtual key (e.g., the entrance door of the multi-family house where the original owner lives) Activation button), the temporary user's mobile device can make an authorization request to the original owner's mobile device. Since the number of times information for the first virtual key is 1, the original owner's mobile device can forward the grant signal to the mobile user of the temporary user, and as a result the second lock device can be released. Then the number information may be zero or the second virtual key may be discarded. Therefore, even if the temporary user makes an approval request based on the second virtual key to release the lock device, the second lock device will not be released.

Referring to FIG. 8, a temporary user (e.g., a room guest) may use a particular room via Internet or a smartphone application from 3:00 pm on October 7, 2015 to 11:00 pm on October 8, 2015 The information related to the virtual key for unlocking the room (for example, the time information from 3:00 pm on October 7, 2015 to 11:00 am on October 8, 2015) The key can be stored in the server. The virtual key may also be delivered to the mobile user of the temporary user.

If the temporary user brings the mobile device closer to the locking device of the room at 1 pm on October 7, 2015, the approval request is sent to the key server based on the time (i.e., 1 pm on October 7, 2015) Lt; / RTI > The key server compares the time with the time information of the virtual key and may forward the rejection signal to the mobile user of the temporary user since the time does not belong to the time information. Thus, the temporary user will not be able to release the locking device of the room.

If the temporary user approached the mobile device with the locking device of the room at 8:00 am on Oct. 8, 2015, the authorization request is sent to the key server based on the time (i.e., 8:00 am on October 8, 2015) Lt; / RTI > The key server compares the time with the time information of the virtual key, and since the time belongs to the time information, it can forward the acknowledgment signal to the mobile user of the temporary user. Thus, the temporary user may release the locking device of the room.

If the temporary user approached the mobile device with the locking device of the room at 8:00 am on Oct. 9, 2015, the approval request is sent to the key server based on the time (i.e., 8:00 am on Oct. 9, 2015) Lt; / RTI > The key server compares the time with the time information of the virtual key and may forward the rejection signal to the mobile user of the temporary user since the time does not belong to the time information. Thus, the temporary user will not be able to release the locking device of the room.

Referring to FIG. 9, for example, a first temporary user (e.g., a car sharing service provider) may access the Internet through a web or smartphone application at 10:00 am on October 7, 2015, And a second temporary user made a reservation to use the car by internet from 3:00 pm on October 7, 2015 to 7:00 pm on October 7, 2015, assuming that the second temporary user made a reservation can do. In this case, a first virtual key for the first temporary user and a second virtual key for the second temporary user may be generated and transmitted to the first mobile device and the second mobile device, respectively.

On the other hand, it may be assumed that the second temporary user canceled the above-mentioned car use reservation due to the change of the plan. In this case, the original owner's mobile device (or desktop) may request to retrieve the second virtual key for the second mobile device of the second temporary user as the key server, and the key server may request the retrieval request information Can be stored.

If the first temporary user brings the mobile device closer to the locking device of the car at 10 am on October 7, 2015, the key server will notify the mobile device at that time (i.e. 10 o'clock on October 7, 2015) And transmits the approval signal to the temporary user's mobile device since the time belongs to the time information. Accordingly, the temporary user may be able to perform the operation by releasing the locking device of the automobile (in this case, the operation starting device may also be configured to operate with the key value extracted from the most key).

If the second temporary user brings the mobile device closer to the locking device of the car at 3 pm on October 7, 2015, the key server will notify the mobile device at that time (i.e. 8 o'clock on October 8, 2015) It can be compared with time information. Although the time belongs to the time information, the key server may forward the rejection signal to the temporary user's mobile device based on the stored number request information. Thus, the temporary user will not be able to release the locking device of the vehicle.

BRIEF DESCRIPTION OF THE DRAWINGS For a clear understanding of the present invention, the organization of the appended drawings is to be understood as illustrative. It should be noted that the present invention can be modified into various shapes other than the illustrated configurations. Like numbers refer to like elements throughout the drawings.

It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the invention. Will be clear to those who have knowledge of.

Claims (7)

A method for transmitting a virtual key using a mobile device,
Receiving a virtual key;
Confirming the validity of the virtual key based on at least one of the time information and the count information for the virtual key; And
If the virtual key is valid, performing near-field communication with the lock device using the virtual key,
Wherein the time information is information indicating a time period during which the virtual key can be used,
And the number information is information indicating the number of times the virtual key can be used.
The method according to claim 1,
Wherein performing near-field communication using the virtual key comprises:
Decrypting the encrypted key information of the virtual key with a decryption key to generate a key value;
And delivering the key value to the locking device.
The method according to claim 1,
Further comprising confirming that the unique number of the mobile device of the temporary user using the virtual key is a registered number.
The method according to claim 1,
Further comprising receiving identification information from the locking device to verify validity of the locking device.
A method of releasing a locking device using a mobile device,
Receiving a virtual key including key information;
Confirming that the virtual key is permanently available;
Confirming the validity of the virtual key based on at least one of the time information and the count information included in the virtual key when the virtual key is not permanently available;
If the virtual key is permanently available or valid, generating a key value based on the key information; And
And communicating the key value to the locking device using near field communication,
Wherein the time information is information indicating a time period during which the virtual key can be used,
And the number information is information indicating the number of times the virtual key can be used.
The method of claim 5,
Wherein when the virtual key is used, the usage information of the virtual key is updated and the usage information is communicated to the original owner of the virtual key.
The method of claim 5,
And in response to a request to retrieve the original owner of the virtual key, the virtual key received by the mobile device is discarded.
KR1020150149685A 2015-10-27 2015-10-27 method for transferring a virtual key and unlocking a locking device using a mobile device KR101828572B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150149685A KR101828572B1 (en) 2015-10-27 2015-10-27 method for transferring a virtual key and unlocking a locking device using a mobile device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150149685A KR101828572B1 (en) 2015-10-27 2015-10-27 method for transferring a virtual key and unlocking a locking device using a mobile device

Publications (2)

Publication Number Publication Date
KR20170048953A true KR20170048953A (en) 2017-05-10
KR101828572B1 KR101828572B1 (en) 2018-02-12

Family

ID=58743906

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150149685A KR101828572B1 (en) 2015-10-27 2015-10-27 method for transferring a virtual key and unlocking a locking device using a mobile device

Country Status (1)

Country Link
KR (1) KR101828572B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019172641A1 (en) * 2018-03-06 2019-09-12 Samsung Electronics Co., Ltd. Electronic device and method for managing electronic key thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006273471A (en) * 2005-03-28 2006-10-12 Nec Corp Article transportation management system, method, terminal, and program
KR101211477B1 (en) * 2011-08-31 2012-12-12 주식회사 아이레보 Method for mobile-key service

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019172641A1 (en) * 2018-03-06 2019-09-12 Samsung Electronics Co., Ltd. Electronic device and method for managing electronic key thereof
US10810811B2 (en) 2018-03-06 2020-10-20 Samsung Electronics Co., Ltd. Electronic device and method for managing electronic key thereof

Also Published As

Publication number Publication date
KR101828572B1 (en) 2018-02-12

Similar Documents

Publication Publication Date Title
JP6908451B2 (en) Car sharing system and car sharing method
US10127750B2 (en) Electronic locking system
KR101296863B1 (en) Entry authentication system using nfc door lock
KR102498326B1 (en) Digital doorlock having unique master key and operating method thereof
CN110033534B (en) Secure seamless access control
US20140232524A1 (en) Electronic key system, and lock-side terminal and portable terminal employed in same
US20100241857A1 (en) Authentication method, authentication system, in-vehicle device, and authentication apparatus
JP2011511350A (en) Access control management method and apparatus
KR101565848B1 (en) Method and apparatus for vehicle control by using mobile terminal
US20150019304A1 (en) Vehicle Rental Method and System
TW201322189A (en) Apparatus and method for access control
KR101733453B1 (en) A Locking System and Method Comprising Smart Phone Mobile Key
KR100722990B1 (en) System for controlling opening/locking of door using mobile terminal and recording-medium storing the controlling method
KR20150137947A (en) Door Lock System For Vehicle
EP3140825A1 (en) Authentication method for vehicular number plate recognition
KR20170018128A (en) Door lock system capable of setting a temporary password and the control method thereof
CN106126986A (en) Lock unlocking processing method and the device of data partition
KR101163709B1 (en) System and method for releasing lock
KR101828572B1 (en) method for transferring a virtual key and unlocking a locking device using a mobile device
KR101733454B1 (en) A Locking System and Method Comprising Registered Smart Phone Key
JP2003148017A (en) Lock device, lock control system and method for controlling lock
JP2008250923A (en) Authentication processing system, mobile communication terminal and authentication processing method
JP5332152B2 (en) Room reservation management system, room management apparatus, and apparatus program
JP2007308873A (en) System for managing entry into room
KR102001607B1 (en) Method and system for security service using position information

Legal Events

Date Code Title Description
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant