US20090064744A1 - Instant clearing electronic lock system after key-following cipher use and realizing method therefor - Google Patents
Instant clearing electronic lock system after key-following cipher use and realizing method therefor Download PDFInfo
- Publication number
- US20090064744A1 US20090064744A1 US11/663,621 US66362105A US2009064744A1 US 20090064744 A1 US20090064744 A1 US 20090064744A1 US 66362105 A US66362105 A US 66362105A US 2009064744 A1 US2009064744 A1 US 2009064744A1
- Authority
- US
- United States
- Prior art keywords
- cipher
- lock
- key
- unit
- main body
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/01—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
- B60R25/04—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/10—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
- B60R25/102—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/2018—Central base unlocks or authorises unlocking
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
- B60R25/252—Fingerprint recognition
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R25/00—Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
- B60R25/20—Means to switch the anti-theft system on or off
- B60R25/25—Means to switch the anti-theft system on or off using biometry
- B60R25/255—Eye recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B60—VEHICLES IN GENERAL
- B60R—VEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
- B60R2325/00—Indexing scheme relating to vehicle anti-theft devices
- B60R2325/20—Communication devices for vehicle anti-theft devices
- B60R2325/205—Mobile phones
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/02—Access control comprising means for the enrolment of users
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7068—Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
Definitions
- the Chinese patent number 03147915 disclosed a method named “Electronic Lock Device” which can open an electronic lock by comparing user's finger print.
- This technique improved the operability and reduced cost.
- This electronic lock device comprises finger print input unit and comparison unit, the comparison unit compares the inputted finger print with the registered finger print to verify the user's identification, if the user is identified, the lock will be opened.
- the disadvantage of this lock is that every lock needs a finger print sensor. If there are multiple locks are used by the user, many finger print sensors are needed to be installed on the locks, it is wasting.
- current technique is using nonvolatile cipher key, and is not safe.
- the Chinese patent number 00133249 disclosed a method named “A smart lock which can self set key and allow one key apply to multiple locks with key and the setup tool”, the lock of this invention doesn't need battery, the power for opening the lock is supplied by the battery from the key. The cipher in the key is stored after setting, if the key is lost, the key can be used by other person.
- the electronic key main body also comprises a key keypad, and a key display unit.
- the key keypad collects the additional cipher, stores it in the additional cipher arithmetic unit nonvolatilely. According to the application, the additional cipher can be skipped.
- the key display unit is controlled by the key cipher microprocessor unit to display the operational information.
- the lock main body also comprises a lock keypad, a lock display unit, and a network communication interface unit.
- the lock keypad is controlled by the lock microprocessor of the lock controlling unit to input operation command;
- the lock display unit is controlled by the lock controlling unit to display operation results and warning message;
- the network communication interface unit is controlled by the lock controlling unit to accept command from the network and exchange data with the network.
- the transmission of the cipher data from the key cipher data transmission unit to the lock cipher data transmission unit is realized by wireless communication between the transceiver installed on the electronic key main body and the transceiver installed on the electronic lock main body.
- the human characteristic sensor includes finger print sensor, body temperature sensor, sweat sensor, iris sensor, or sensors combination.
- the lock main body comprises a lock cipher data transmission unit, a lock controlling unit, and a user database; the lock controlling unit is electrically connected with the lock cipher data transmission unit, the user database, and the lock operation element.
- the electronic key main body also comprises a key keypad, and a key display unit.
- the key keypad is electrically connected with the key microprocessor unit
- the key display unit is electrically connected with the key microprocessor unit.
- the lock main body also comprises a lock keypad, a lock display unit, and a network communication interface unit.
- the lock keypad is electrically connected with the lock microprocessor of the lock controlling unit; the lock display unit is electrically connected with the lock controlling unit.
- the network communication interface unit connects the electronic lock into a centralized controlling network which is controlled by a central microcontroller.
- the center microcontroller can establish LAN with other micro computer, and form a larger electronic lock network system.
- the electronic key main body comprises a key contact set which is electrically connected with the key cipher data transmission unit
- the lock main body comprises a lock contact set which is electrically connected with the lock cipher data transmission unit.
- the electronic key main body comprises a key transceiver which is electrically connected with the key cipher data transmission unit
- the lock main body comprises a lock transceiver which is electrically connected with the lock cipher data transmission unit.
- the human characteristic sensor includes a finger print sensor, a body temperature sensor, or a sweat sensor.
- FIG. 1 is a block diagram of the instant clearing electronic lock system after key-cipher use and realizing method
- FIG. 7 is a circuit diagram of the lock operation unit of this invention.
- FIG. 8 is a flow diagram of the method of authorizing a user of this invention.
- the electronic key main body 20 also comprises a key keypad 22 , and a key display unit 23 .
- the key keypad 22 is controlled by the key microprocessor unit 26 to collect the additional cipher, stores it in the additional cipher arithmetic unit 33 .
- the key display unit 23 is controlled by the key cipher microprocessor unit 26 to display the operational information.
- the human characteristic sensor 21 is a finger print sensor. In an alternative embodiment, the human characteristic sensor 21 can be a body temperature sensor or a sweat sensor.
- the lock doesn't need manager cipher if it is not connected with a network.
- Super cipher and manager cipher can access the list of authorized users. No operation can check the user cipher.
- the electronic lock system comprises an electronic key main body 20 , a lock main body 80 , and a lock operation element 120 .
- the electronic key main body also comprises a human characteristic sensor 21 , a key microprocessor unit 26 , a cipher generating unit 30 , a cipher temporary storage unit 34 , a cipher data transmission unit 40 , and a key power 50 ;
- the human characteristic sensor 21 is electrically connected with the key microprocessor unit 26 and the cipher generating unit 30
- the cipher temporary storage unit 34 is electrically connected with the cipher generating unit 30 and the key cipher data transmission unit 40 .
- the electronic key main body 20 also comprises a key keypad 22 , and a key display unit 23 .
- the key keypad 22 is electrically connected with the key microprocessor unit 26 ;
- the key display unit 23 is also electrically connected with the key microprocessor unit 26 .
- the lock main body 80 also comprises a lock keypad 81 , a lock display unit 82 , and a network communication interface unit 83 .
- the lock keypad 81 is electrically connected with the lock microprocessor of the lock controlling unit 100 ; the lock display unit 82 is electrically connected with the lock controlling unit 100 .
- the lock keypad 81 comprises digital circuit chipset U 25 and U 26 , the key command is transmitted to the U 21 through the data bus AD 0 ⁇ AD 7 .
- the electronic key main body 20 comprises a key transceiver 29 which is electrically connected with the key cipher data transmission unit 40
- the lock main body 80 comprises a lock transceiver 89 which is electrically connected with the lock cipher data transmission unit 90 .
- the network communication interface unit 83 is controlled by the lock controlling unit 100 , the TXD and RXD serial communication port in the lock microprocessor U 21 is connected with the network communication interface unit 83 .
- it is using RS485 communication.
- CAN bus or other bus technique can also be used.
- the lock main body 80 can comprise a warning device. In an alternative embodiment, the lock main body 80 doesn't comprise a warning device, warning message can be delivered by communication channel. In one embodiment, the system can automatically call the property owner, the building/distribute manager or security department through an interface.
- another alternative embodiment of the present invention is a finger print electronic key utilizing a mobile phone 200 .
- the additional cipher can be inputted but the key buttons on the mobile phone, the user puts the fingers for authorization on the finger print exam area of the human characteristic sensor 21 , place the data transmitting port close to the receiving port of the lock cipher data transmission unit 89 on the lock main body 80 , and press sending key. Then the cipher data is sent to be verified, at the same time the system clears the cipher data and waits for the next operation.
- the system can also provide client 24 hours anti-theft monitoring through specialized network, for example, monitoring cars and authorizing to remote shut down the circuit, gas supply of the alarmed car, locating the car with the positioning system.
- the first level user can check the user's status by plugging in the key, inputting the cipher and pressing view button.
- the electronic key comprises a human characteristic sensor, collects different physical feature information from different user, and generates different cipher data.
- This cipher data is registered in the database of the lock beforehand. Thereafter when the lock needs to be open, the cipher data collected by the key will be transmitted to the lock and compared with the record in the database. If the same data is found, the lock will be open, if not, warning message will be delivered.
- the cipher data generated in the electronic key will be automatically cleared when the physical body is disconnected from the electronic key. This will avoid further security damage when the key is lost. More over, a key can be shared by multiple persons and for multiple purposes; this reduces the system cost, and is helpful to establish a large arrange electronic lock/access control monitoring system, develop more functions.
Landscapes
- Engineering & Computer Science (AREA)
- Mechanical Engineering (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
Abstract
A kind of method for electronic lock system making the key-following password tidy up immediately after use, in which: a. establish human characteristic sensor and temporary password memory on the main body of the electronic key and data transmission unit of the lock password, lock controlling unit and user's database on the lock main body; b. firstly, human characteristic sensor gathers every user's human characteristic information that can be changed into corresponding authentification code in the producing unit for the password and deposited into the temporary password memory temporarily, meanwhile transported into data transmission unit of the lock password through data transmission unit of the key password; secondly, the password is deposited into the user's database after being registered and confirmed; c. when the human characteristic sensor leaves the human body or the authentification code is conveyed successfully, the temporary password memory is tidied up.
Description
- 1. Field of Invention
- This present inventing relates to an electronic controlled lock, and more particularly to an instant clearing electronic lock system after key-following cipher is used and realizing method.
- 2. Description of Related Arts
- In current technique most electronic locks are using different kinds of IC cards to unlock. Recently some technology uses human characteristic information gathered from the user to unlock electronic locks. For example, the Chinese patent number 03147915 disclosed a method named “Electronic Lock Device” which can open an electronic lock by comparing user's finger print. This technique improved the operability and reduced cost. This electronic lock device comprises finger print input unit and comparison unit, the comparison unit compares the inputted finger print with the registered finger print to verify the user's identification, if the user is identified, the lock will be opened. The disadvantage of this lock is that every lock needs a finger print sensor. If there are multiple locks are used by the user, many finger print sensors are needed to be installed on the locks, it is wasting. Moreover, current technique is using nonvolatile cipher key, and is not safe.
- Another example, the Chinese patent number 00133249 disclosed a method named “A smart lock which can self set key and allow one key apply to multiple locks with key and the setup tool”, the lock of this invention doesn't need battery, the power for opening the lock is supplied by the battery from the key. The cipher in the key is stored after setting, if the key is lost, the key can be used by other person.
- An object of the present invention is to provide a method and an electronic lock system which can avoid the disadvantage of current technology by instant clearing electronic lock system after key-following cipher is used. In this present invention, the key comprises a human characteristic sensor. Every time when the key is used to open a lock, it will collect user's physical feature information by the sensor, and generate a cipher by a determined encryption algorithm. A same user's same physical body will generate a same cipher. This cipher is then sent to the lock and is compared with the record in the lock's database. If an authorized user is identified, the lock will be opened, otherwise, the lock will not be opened and warning message will be delivered.
- In order to accomplish above object, the present invention provides a method of instant clearing the memory of the electronic lock after the cipher key is used, based on a system which comprises electronic key main body, lock main body, and lock operation element, comprising the steps:
-
- a. providing a human characteristic sensor, a key microprocessor unit, a cipher generating unit, a cipher temporary storage unit, and a key cipher data transmission unit on the electronic key main body;
- b. providing a lock cipher data transmission unit, a lock controlling unit, and a user database on the lock main body;
- c. collecting every user's human characteristic information by the human characteristic sensor first, generating according cipher by the cipher generating unit, storing the cipher in the cipher temporary storage unit temporarily, transmitting the cipher data to the lock cipher data transmission unit by the key cipher data transmission unit, verifying the cipher's registration, saving in the user database, clearing the temporary cipher storage unit after the human body is disconnected from the human characteristic sensor;
- d. collecting user's human characteristic information when the registered user is using the electronic key to open the lock, generating the cipher again by the cipher generating unit, storing the cipher temporarily in the cipher temporary storage unit, transmitting the cipher data to the lock cipher data transmission unit through the key cipher data transmission unit, checking the cipher data on the user database by the lock controlling unit to confirm if there is a same record; and
- e. sending command to the lock operation element to open the lock if a same record is found in the database by the lock controlling unit, or delivering a warning message and saving an error message by the lock controlling unit if no same record is found.
- The cipher generating unit comprises a main cipher arithmetic unit and an additional cipher arithmetic unit, to generate the cipher, the step c also comprises:
-
- a. processing human characteristic information to generate multiple bytes main cipher by the main cipher arithmetic unit;
- b. recalling additional cipher from the additional cipher arithmetic unit by the key microprocessor unit, combining the main cipher and the additional cipher, storing the combined cipher in cipher temporary storage unit; and
- c. checking if the physical body is disconnected with the human characteristic sensor or the cipher is transmitted successfully according to the process of operation by the key microprocessor unit, clearing the cipher temporary storage unit.
- The electronic key main body also comprises a key keypad, and a key display unit.
- Controlled by the key microprocessor unit, the key keypad collects the additional cipher, stores it in the additional cipher arithmetic unit nonvolatilely. According to the application, the additional cipher can be skipped. The key display unit is controlled by the key cipher microprocessor unit to display the operational information.
- The lock main body also comprises a lock keypad, a lock display unit, and a network communication interface unit. The lock keypad is controlled by the lock microprocessor of the lock controlling unit to input operation command; the lock display unit is controlled by the lock controlling unit to display operation results and warning message; the network communication interface unit is controlled by the lock controlling unit to accept command from the network and exchange data with the network.
- The transmission of the cipher data from the key cipher data transmission unit to the lock cipher data transmission unit is realized by the contact between the contact set installed on the electronic key main body and the contact set installed on the electronic lock main body.
- The transmission of the cipher data from the key cipher data transmission unit to the lock cipher data transmission unit is realized by wireless communication between the transceiver installed on the electronic key main body and the transceiver installed on the electronic lock main body.
- The human characteristic sensor includes finger print sensor, body temperature sensor, sweat sensor, iris sensor, or sensors combination.
- In order to accomplish above object, the present invention provides an electronic lock system which clears cipher key instantly after the cipher key is used. The electronic lock system comprises an electronic key main body, a lock main body, and a lock operation element. The electronic key main body also comprises a human characteristic sensor, a key microprocessor unit, a cipher generating unit, a cipher temporary storage unit, a cipher data transmission unit, and a key power; the human characteristic sensor is electrically connected with the key microprocessor unit and the cipher generating unit, the cipher temporary storage unit is electrically connected with the cipher generating unit and the key cipher data transmission unit.
- The lock main body comprises a lock cipher data transmission unit, a lock controlling unit, and a user database; the lock controlling unit is electrically connected with the lock cipher data transmission unit, the user database, and the lock operation element.
- The electronic key main body also comprises a key keypad, and a key display unit. The key keypad is electrically connected with the key microprocessor unit, the key display unit is electrically connected with the key microprocessor unit.
- The lock main body also comprises a lock keypad, a lock display unit, and a network communication interface unit. The lock keypad is electrically connected with the lock microprocessor of the lock controlling unit; the lock display unit is electrically connected with the lock controlling unit. The network communication interface unit connects the electronic lock into a centralized controlling network which is controlled by a central microcontroller. The center microcontroller can establish LAN with other micro computer, and form a larger electronic lock network system.
- The electronic key main body comprises a key contact set which is electrically connected with the key cipher data transmission unit, and the lock main body comprises a lock contact set which is electrically connected with the lock cipher data transmission unit.
- The electronic key main body comprises a key transceiver which is electrically connected with the key cipher data transmission unit, and the lock main body comprises a lock transceiver which is electrically connected with the lock cipher data transmission unit.
- The human characteristic sensor includes a finger print sensor, a body temperature sensor, or a sweat sensor.
- Compared with current technology, in the present invention, the electronic key provides a human characteristic sensor which collects different physical information from different users, and generates different cipher data. The cipher data is registered in the lock database beforehand. Every time when the lock is being unlocked, the cipher data on the key will be transmitted to the lock and compared with the lock database. If there is a same record, the lock will be opened, other wise a warning message will be delivered. Every time the cipher data generated in the electronic key will be cleared automatically when the physical body is disconnected with the electronic key, this will avoid security disaster if the key is lost. Further more, one key can be used for multiple users and multiple locks which can save the system cost.
-
FIG. 1 is a block diagram of the instant clearing electronic lock system after key-cipher use and realizing method; -
FIG. 2 is a block diagram of the electronic key cipher generating unit of this invention; -
FIG. 3 is a circuit diagram of the electronic key of this invention; -
FIG. 4 is a block diagram of the lock of this invention; -
FIG. 5 is a circuit diagram of the lock of this invention; -
FIG. 6 is a circuit diagram of the lock network communication interface unit of this invention; -
FIG. 7 is a circuit diagram of the lock operation unit of this invention; -
FIG. 8 is a flow diagram of the method of authorizing a user of this invention; -
FIG. 9 illustrates the electronic lock based control system of this invention; -
FIG. 10 illustrates the contact transmission of the cipher data of this invention; -
FIG. 11 illustrates the wireless transmission of the cipher data of this invention; -
FIG. 12 is the flow diagram of the method of cancel a user of this invention; -
FIG. 13 illustrates the application in car remote control of this invention. -
FIGS. 1 and 4 illustrate a method of instant clearing electronic lock after key-cipher use. Based on a system which comprises an electronic keymain body 20, a lockmain body 80, alock operation unit 120, a preferred embodiment of the method comprises: -
- a. providing a human
characteristic sensor 21, a keymicro processing unit 21, acipher generating unit 30, a ciphertemporary storage unit 34, and a key cipherdata transmitting unit 40 on the electronic keymain body 20; - b. providing a lock cipher
data transmission unit 90, alock controlling unit 100, auser database 110, and alock operation element 120 on the lockmain body 80; - c. collecting every user's human characteristic information by the human
characteristic sensor 21 first, generating according cipher by thecipher generating unit 30, storing the cipher in the ciphertemporary storage unit 34 temporarily, transmitting the cipher data to the lock cipherdata transmission unit 90 by the key cipherdata transmission unit 40, verifying the cipher's registration, saving in theuser database 110, clearing the temporarycipher storage unit 34 after the human body is disconnected from the humancharacteristic sensor 21; - d. collecting user's human characteristic information by the human
characteristic sensor 21 when the registered user is using the electronic keymain body 20 to open the lock, generating the cipher again by thecipher generating unit 30, storing the cipher temporarily in the ciphertemporary storage unit 34, transmitting the cipher data to the lock cipherdata transmission unit 90 through the key cipherdata transmission unit 40, checking the cipher data on theuser database 110 by thelock controlling unit 100 on the lockmain body 80 to confirm if there is a same record; - e. sending command to the
lock operation element 120 to open the lock if a same record is found in the database by thelock controlling unit 100, or delivering a warning message and saving an error message by thelock controlling unit 100 if no same record is found.
- a. providing a human
- As illustrated in
FIG. 2 , thecipher generating unit 30 comprises a main cipherarithmetic unit 31 and an additional cipherarithmetic unit 33, to generate the cipher, the step c also comprises: -
- a. processing human characteristic information to generate 4˜6 bytes main cipher by the main cipher
arithmetic unit 31; - b. recalling additional cipher from the additional cipher
arithmetic unit 33 by thekey microprocessor unit 26, combining the main cipher and the additional cipher, storing the combined cipher in ciphertemporary storage unit 34; - c. checking the physical body is disconnected with the human
characteristic sensor 21 or the cipher is transmitted successfully according to the process of operation by thekey microprocessor unit 26, clearing the ciphertemporary storage unit 34.
- a. processing human characteristic information to generate 4˜6 bytes main cipher by the main cipher
- As illustrated in
FIGS. 1 and 3 , the electronic keymain body 20 also comprises akey keypad 22, and akey display unit 23. Thekey keypad 22 is controlled by thekey microprocessor unit 26 to collect the additional cipher, stores it in the additional cipherarithmetic unit 33. Thekey display unit 23 is controlled by the keycipher microprocessor unit 26 to display the operational information. - As illustrated in
FIGS. 2 and 3 , in an preferred embodiment, the additional cipherarithmetic unit 33 comprises a EEPROM chipset U2, the function of the main cipherarithmetic unit 31 is performed by the microprocessor U1. - As illustrated in
FIGS. 4 and 5 , the lockmain body 80 also comprises alock keypad 81, alock display unit 82, and a networkcommunication interface unit 83. Thelock keypad 81 is controlled by the lock microprocessor U21 of thelock controlling unit 100 to input operation command; thelock display unit 82 is controlled by thelock controlling unit 100 to display operation results and warning message, in a preferred embodiment, the LCD driver U27 is EA V-D2004 OAR. As illustrated inFIG. 6 , the networkcommunication interface unit 83 is controlled by thelock controlling unit 100, the TXD and RXD serial communication port in the lock microprocessor U21 is connected with the networkcommunication interface unit 83. In a preferred embodiment, it is using RS485 communication. In alternative embodiments, CAN bus or other bus technique can also be used. After establishing the network control, very lock accepts the command from the network system, and transmits its product data to the main computer of the control network. - A backup battery and
external power 85 is electrically connected with the lockmain body 80 through an interface. When theexternal power 85 is out of order, the backup battery will automatically supply power. - An
external feed contact 86 is a power contact installed on the lockmain body 80, in unexpected situation, the lock can be opened using the feed current from the key. -
FIG. 7 is a flow diagram of a lock operation unit of a preferred embodiment. M1 is a two-way DC motor. The OPEN DOOR and CLOSE DOOR signal input is directly connected with two inputs of the P1 port on the lock microprocessor U21, when one input is high level an another input is low level, the DC motor M1 rotates in one direction, when one input is low level and another input is high level, the DC motor M1 rotates in another direction, when the two inputs are the same level, the DC motor M1 stops. The operation is controlled by the software embedded in the lock microprocessor U21. In the lockmain body 80 there are multiple position switches connected with the input of P1 port of the lock microprocessor U21, the lock microprocessor U21 check the status of the switches to decide the DC motor M1's operation. - Of course, the system can select to electrically open the lock, or electrically open the pins and exert force through the key to open the lock. The mechanical structure of the lock is using well known technology.
- As illustrated in
FIG. 10 , the transmission of the cipher data from the key cipherdata transmission unit 40 to the lock cipherdata transmission unit 90 is realized by the key contact set 28 on the keymain body 20 and the lock contact set 88 on the lockmain body 80. - As illustrated in
FIG. 11 , the transmission of the cipher data from the key cipherdata transmission unit 40 to the lock cipherdata transmission unit 90 is realized by thekey transceiver 29 on the keymain body 20 and thelock transceiver 89 on the lockmain body 80. - In the preferred embodiment, the lock is using contact method with a key hole. The key hole includes different shapes, for example, square, triangle, rectangular, or like. In an alternative embodiment, the lock can also use non-contact method without key hole. Both contact and non-contact data transmission can use currently well known technology to realize, such as IC card reading method, infrared transmission, Maxim-Dallas' i-Button single bus contact method or like.
- In the preferred embodiment, the human
characteristic sensor 21 is a finger print sensor. In an alternative embodiment, the humancharacteristic sensor 21 can be a body temperature sensor or a sweat sensor. -
FIG. 8 illustrates the cipher authorization function and authorized cipher management function of the present invention. The cipher storage is using encrypt storage method, so the decryption algorithm must be utilized to recall the right cipher or recover the right cipher from recalled data. The cipher has three levels: super level (first level), manager level (second level), and user level (third level). The lock doesn't have any cipher initially. The first cipher used becomes the super cipher automatically. When setup other cipher which is not used in group, besides applying the super cipher, it also needs to apply the non-contact switches, buttons, switches combination, buttons combination, or two combinations together under the locking statuse. -
- The super cipher can authorize or cancel manager cipher and user cipher, can open locks and receive information form locks. If necessary, super cipher can authorize multiple equal super ciphers.
- The manager cipher can authorize or cancel user cipher, can open locks and receive information form locks, but can't authorize or cancel super cipher and manager cipher.
- The user cipher can only open locks and receive information form locks.
- The lock doesn't need manager cipher if it is not connected with a network. Super cipher and manager cipher can access the list of authorized users. No operation can check the user cipher.
-
FIG. 12 illustrates the flow diagram of the method of cancel a user. - An alternative embodiment of the present invention is illustrated.
- Referring to
FIGS. 1 and 4 , an electronic lock system which clears cipher key instantly after the cipher key is used is provided. The electronic lock system comprises an electronic keymain body 20, a lockmain body 80, and alock operation element 120. The electronic key main body also comprises a humancharacteristic sensor 21, akey microprocessor unit 26, acipher generating unit 30, a ciphertemporary storage unit 34, a cipherdata transmission unit 40, and akey power 50; the humancharacteristic sensor 21 is electrically connected with thekey microprocessor unit 26 and thecipher generating unit 30, the ciphertemporary storage unit 34 is electrically connected with thecipher generating unit 30 and the key cipherdata transmission unit 40. - Referring to
FIGS. 4 and 5 , the lockmain body 80 comprises a lock cipherdata transmission unit 90, alock controlling unit 100, and auser database 110; thelock controlling unit 100 is electrically connected with the lock cipherdata transmission unit 90, theuser database 110, and alock operation element 120. In a preferred embodiment, the lock microprocessor U21 is ATMEL89C52. - The electronic key
main body 20 also comprises akey keypad 22, and akey display unit 23. Thekey keypad 22 is electrically connected with thekey microprocessor unit 26; thekey display unit 23 is also electrically connected with thekey microprocessor unit 26. - Referring to
FIG. 5 , the lockmain body 80 also comprises alock keypad 81, alock display unit 82, and a networkcommunication interface unit 83. Thelock keypad 81 is electrically connected with the lock microprocessor of thelock controlling unit 100; thelock display unit 82 is electrically connected with thelock controlling unit 100. In the preferred embodiment, thelock keypad 81 comprises digital circuit chipset U25 and U26, the key command is transmitted to the U21 through the data bus AD0˜AD7. - Referring to
FIG. 10 , in the preferred embodiment, the electronic keymain body 20 comprises a key contact set 28 which is electrically connected with the key cipherdata transmission unit 40, and the lockmain body 80 comprises a lock contact set 88 which is electrically connected with the lock cipherdata transmission unit 90. - Referring to
FIG. 11 , in an alternative embodiment, the electronic keymain body 20 comprises akey transceiver 29 which is electrically connected with the key cipherdata transmission unit 40, and the lockmain body 80 comprises alock transceiver 89 which is electrically connected with the lock cipherdata transmission unit 90. - Referring to
FIG. 6 , the networkcommunication interface unit 83 is controlled by thelock controlling unit 100, the TXD and RXD serial communication port in the lock microprocessor U21 is connected with the networkcommunication interface unit 83. In a preferred embodiment, it is using RS485 communication. In alternative embodiments, CAN bus or other bus technique can also be used. After establishing the network control, very lock accepts the command from the network system, and transmits its product data to the main computer of the control network. - Referring to
FIG. 9 , through the network interface, the system can be managed by multiple terminals; it can also be remote managed through Internet. Well known technology in this field can be used to connect the server or integrated terminal with the lock, such as different kinds of bus and network technology based on twisted-pair cable (for example, RS485). This kind of system is generally used in group management such as in hotel. Resident house can also use it if necessary, for example, used in central management and alarm of resident door locks and furniture locks. - In the preferred embodiment, the human
characteristic sensor 21 is a finger print sensor. In other alternative embodiments, a body temperature sensor, or a sweat sensor can also be used. - The lock
main body 80 can comprise a warning device. In an alternative embodiment, the lockmain body 80 doesn't comprise a warning device, warning message can be delivered by communication channel. In one embodiment, the system can automatically call the property owner, the building/distribute manager or security department through an interface. - Referring to
FIG. 13 , another alternative embodiment of the present invention is a finger print electronic key utilizing amobile phone 200. The additional cipher can be inputted but the key buttons on the mobile phone, the user puts the fingers for authorization on the finger print exam area of the humancharacteristic sensor 21, place the data transmitting port close to the receiving port of the lock cipherdata transmission unit 89 on the lockmain body 80, and press sending key. Then the cipher data is sent to be verified, at the same time the system clears the cipher data and waits for the next operation. The system can also provide client 24 hours anti-theft monitoring through specialized network, for example, monitoring cars and authorizing to remote shut down the circuit, gas supply of the alarmed car, locating the car with the positioning system. - The first level user can check the user's status by plugging in the key, inputting the cipher and pressing view button.
- Because the electronic key doesn't have any cipher, if it is lost, there is no other damage except the cost of the device. Any substitutive key (the key and the shape of the lock hole should be matched in electrical mechanical opening) of the present invention, for example borrowed from neighbor or security department, can open the target lock. The lender doesn't need to worry about releasing his own cipher, same as the borrower. As a form of service, the building manager, security department, and other department can all provide public cipher key service.
- Practice shows, in the present invention, the electronic key comprises a human characteristic sensor, collects different physical feature information from different user, and generates different cipher data. This cipher data is registered in the database of the lock beforehand. Thereafter when the lock needs to be open, the cipher data collected by the key will be transmitted to the lock and compared with the record in the database. If the same data is found, the lock will be open, if not, warning message will be delivered. The cipher data generated in the electronic key will be automatically cleared when the physical body is disconnected from the electronic key. This will avoid further security damage when the key is lost. More over, a key can be shared by multiple persons and for multiple purposes; this reduces the system cost, and is helpful to establish a large arrange electronic lock/access control monitoring system, develop more functions.
- One skilled in the art will understand that the embodiment of the present invention as shown in the drawings and described above is exemplary only and not intended to be limiting.
- It will thus be seen that the objects of the present invention have been fully and effectively accomplished. It embodiments have been shown and described for the purposes of illustrating the functional and structural principles of the present invention and is subject to change without departure from such principles. Therefore, this invention includes all modifications encompassed within the spirit and scope of the following claims.
Claims (13)
1. A method of instant clearing electronic lock after key-cipher use based on a system comprising an electronic key main body, a lock main body, a lock operation unit, wherein the method comprises the steps of:
a. providing a human characteristic sensor, a key micro processing unit, a cipher generating unit, a cipher temporary storage unit, and a key cipher data transmitting unit on said electronic key main body;
b. providing a lock cipher data transmission unit, a lock controlling unit, and a user database on said lock main body;
c. collecting every user's human characteristic information by said human characteristic sensor first, generating according cipher by said cipher generating unit, storing said cipher in said cipher temporary storage unit temporarily, transmitting said cipher data to said lock cipher data transmission unit by said key cipher data transmission unit, verifying said cipher's registration, saving in said user database, clearing said temporary cipher storage unit after the human body is disconnected from said human characteristic sensor;
d. collecting user's human characteristic information by said human characteristic sensor when the registered user is using said electronic key main body to open the lock, generating said cipher again by said cipher generating unit, storing said cipher temporarily in said cipher temporary storage unit, transmitting said cipher data to said lock cipher data transmission unit through said key cipher data transmission unit, checking said cipher data on said user database by said lock controlling unit on said lock main body to confirm if there is a same record; and
e. sending command to said lock operation element to open the lock if a same record is found in said database by said lock controlling unit, or delivering a warning message and saving an error message by said lock controlling unit if no same record is found.
2. The method, as recited in claim 1 , wherein said cipher generating unit comprises a main cipher arithmetic unit and an additional cipher arithmetic unit, wherein the step c also comprises the steps of:
a. processing human characteristic information to generate multiple bytes main cipher by said main cipher arithmetic unit;
b. recalling additional cipher from said additional cipher arithmetic unit by said key microprocessor unit, combining said main cipher and said additional cipher, storing said combined cipher in said cipher temporary storage unit;
c. checking if the physical body is disconnected with said human characteristic sensor according to the process of operation by said key microprocessor unit, deciding the time delay to clear said cipher temporary storage unit.
3. The method, as recited in claim 1 , wherein said electronic key main body also comprises a key keypad which is controlled by said key microprocessor unit to collect said additional cipher, store it in said additional cipher arithmetic unit said, and a key display unit which is controlled by said key cipher microprocessor unit to display the operational information.
4. The method, as recited in claim 1 , wherein said lock main body also comprises a lock keypad which is controlled by a lock microprocessor of said lock controlling unit to input operation command, a lock display unit which is controlled by said lock controlling unit to display operation results and warning message, and a network communication interface unit which is controlled by said lock controlling unit to accept network system command and exchange data with the network.
5. The method, as recited in claim 1 , wherein the transmission of said cipher data from said key cipher data transmission unit to said lock cipher data transmission unit 90 is realized by a key contact set on said key main body and a lock contact set on said lock main body.
6. The method, as recited in claim 1 , wherein the transmission of said cipher data from said key cipher data transmission unit to said lock cipher data transmission unit 90 is realized by a key transceiver on said key main body and a lock transceiver on said lock main body.
7. The method, as recited in claim 1 , wherein said human characteristic sensor includes a finger print sensor, a body temperature sensor, a sweat sensor, or an iris sensor.
8. An electronic lock system which clears cipher key instantly after the cipher key is used, comprising: an electronic key main body; a lock main body; and a lock operation element, wherein said electronic key main body also comprises a human characteristic sensor, a key microprocessor unit, a cipher generating unit, a cipher temporary storage unit, a cipher data transmission unit, and a key power, wherein said human characteristic sensor is electrically connected with said key microprocessor unit and said cipher generating unit, said cipher temporary storage unit is electrically connected with said cipher generating unit and said key cipher data transmission unit, wherein said lock main body comprises a lock cipher data transmission unit, a lock controlling unit, and a user database, wherein said lock controlling unit is electrically connected with said lock cipher data transmission unit, said user database, and said lock operation element.
9. The electronic lock system which clears cipher key instantly after the cipher key is used of claim 8 , wherein said electronic key main body also comprises a key keypad, and a key display unit, wherein said key keypad is electrically connected with said key microprocessor unit, wherein said key display unit is electrically connected with said key microprocessor unit.
10. The electronic lock system which clears cipher key instantly after the cipher key is used of claim 8 , wherein said lock main body also comprises a lock keypad, a lock display unit, and a network communication interface unit, wherein said lock keypad is electrically connected with a lock microprocessor of said lock controlling unit; wherein said lock display unit is electrically connected with said lock controlling unit, wherein said network communication interface unit is electrically connected with said lock controlling unit.
11. The electronic lock system which clears cipher key instantly after the cipher key is used of claim 8 , wherein said electronic key main body comprises a key contact set which is electrically connected with said key cipher data transmission unit, and said lock main body comprises a lock contact set which is electrically connected with said lock cipher data transmission unit.
12. The electronic lock system which clears cipher key instantly after the cipher key is used of claim 8 , wherein said electronic key main body comprises a key transceiver which is electrically connected with said key cipher data transmission unit, and said lock main body comprises a lock transceiver which is electrically connected with said lock cipher data transmission unit.
13. The electronic lock system which clears cipher key instantly after the cipher key is used of claim 8 , wherein said human characteristic sensor includes a finger print sensor, a body temperature sensor, a sweat sensor, an iris sensor, or a sensors combination.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2004100516793A CN1272519C (en) | 2004-09-22 | 2004-09-22 | Instant clearing electronic lock system after key cipher use and realizing method |
CN200410051679.3 | 2004-09-22 | ||
PCT/CN2005/001519 WO2006032201A1 (en) | 2004-09-22 | 2005-09-21 | Instant clearing electronic lock system after key-following cipher use and realizing method therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090064744A1 true US20090064744A1 (en) | 2009-03-12 |
Family
ID=34602500
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/663,620 Expired - Fee Related US8340286B2 (en) | 2004-09-22 | 2005-08-29 | Interleaving and deinterleaving method for preventing periodic position interference |
US11/663,621 Abandoned US20090064744A1 (en) | 2004-09-22 | 2005-09-21 | Instant clearing electronic lock system after key-following cipher use and realizing method therefor |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/663,620 Expired - Fee Related US8340286B2 (en) | 2004-09-22 | 2005-08-29 | Interleaving and deinterleaving method for preventing periodic position interference |
Country Status (3)
Country | Link |
---|---|
US (2) | US8340286B2 (en) |
CN (1) | CN1272519C (en) |
WO (2) | WO2006032186A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8009013B1 (en) * | 2007-09-21 | 2011-08-30 | Precision Control Systems of Chicago, Inc. | Access control system and method using user location information for controlling access to a restricted area |
US8203426B1 (en) | 2007-07-11 | 2012-06-19 | Precision Edge Access Control, Inc. | Feed protocol used to report status and event information in physical access control system |
US8410898B1 (en) | 2012-08-16 | 2013-04-02 | Google Inc. | Near field communication based key sharing techniques |
US20140310327A1 (en) * | 2013-04-10 | 2014-10-16 | Microsoft Corporation | Synchronization across applications |
US20160176381A1 (en) * | 2014-12-17 | 2016-06-23 | Denso International America, Inc. | Vehicle system and method for keyless authentication and control of an ignition system |
US9384613B2 (en) | 2012-08-16 | 2016-07-05 | Google Inc. | Near field communication based key sharing techniques |
EP3274970A4 (en) * | 2015-03-27 | 2018-04-11 | Cordiner, Peter Alexander | A lock monitoring device and a lock monitoring system |
US10360746B1 (en) * | 2016-12-30 | 2019-07-23 | Alarm.Com Incorporated | Controlled indoor access using smart indoor door knobs |
CN110191468A (en) * | 2019-05-21 | 2019-08-30 | 维沃移动通信有限公司 | Encryption and decryption method and mobile terminal |
WO2020171841A1 (en) * | 2019-02-18 | 2020-08-27 | Quantum Lock Technologies LLC | Quantum random number generator lock |
US10764064B2 (en) * | 2017-12-01 | 2020-09-01 | International Business Machines Corporation | Non-networked device performing certificate authority functions in support of remote AAA |
CN112446993A (en) * | 2020-12-16 | 2021-03-05 | 珠海格力电器股份有限公司 | Intelligent door lock system and unlocking method |
US10990356B2 (en) * | 2019-02-18 | 2021-04-27 | Quantum Lock Technologies LLC | Tamper-resistant smart factory |
CN113605788A (en) * | 2021-07-26 | 2021-11-05 | 珠海格力电器股份有限公司 | Door lock alarm method, electronic device, intelligent door lock and readable storage medium |
DE102021130994A1 (en) | 2021-11-25 | 2023-05-25 | Cariad Se | Key unit for a motor vehicle for starting the motor vehicle and opening at least one wing element and method for outputting a warning signal from a key unit for a motor vehicle |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008122906A1 (en) * | 2007-04-05 | 2008-10-16 | Koninklijke Philips Electronics N.V. | Wireless sensor network key distribution |
CN101398949A (en) | 2007-09-24 | 2009-04-01 | 深圳富泰宏精密工业有限公司 | Fingerprint identification gate inhibition system and method |
CN102098268A (en) * | 2009-12-11 | 2011-06-15 | 厦门大菁洋网络科技有限公司 | Fingerprint identification-based vehicle leasing method |
CN102211220B (en) * | 2010-04-07 | 2015-05-20 | 模帝乐技术有限公司 | Key cutting method based on biometrics identification |
CN101942940B (en) * | 2010-08-13 | 2012-07-04 | 宁波永发集团有限公司 | Double control safety box unlocked by key and inputting password |
CN101967915B (en) * | 2010-10-25 | 2014-03-19 | 淮阴工学院 | Control method for safety box with palmprint recognition system |
US9058025B2 (en) * | 2011-03-24 | 2015-06-16 | Recludo Ab | Standalone biometric authorization control device and method |
US20130023234A1 (en) * | 2011-07-19 | 2013-01-24 | Tai Cheung Poon | Systems and methods for providing mislead information to intruders when intrusion occur |
US20130219481A1 (en) * | 2012-02-16 | 2013-08-22 | Robert Matthew Voltz | Cyberspace Trusted Identity (CTI) Module |
CN103295281A (en) * | 2012-02-29 | 2013-09-11 | 深圳光启创新技术有限公司 | Light-operated lock system and implementation method thereof |
DE102012008395A1 (en) * | 2012-04-27 | 2013-10-31 | Lock Your World Gmbh & Co. Kg | Method and system for secure key handover |
CN103425456A (en) * | 2012-05-22 | 2013-12-04 | 中国科学院深圳先进技术研究院 | Password input system on basis of human communication channel |
CN103700168A (en) * | 2013-12-12 | 2014-04-02 | 苏州市峰之火数码科技有限公司 | Electronic cabinet lock system |
CN105672768B (en) * | 2014-11-20 | 2018-07-24 | 富泰华工业(深圳)有限公司 | Multi-purpose key apparatus and its control method |
CN104715533B (en) * | 2015-04-10 | 2017-03-08 | 电子科技大学 | A kind of method of use mobile terminal dynamic fingerprint to code door lock |
CN104867215B (en) * | 2015-05-29 | 2018-01-02 | 上海斐讯数据通信技术有限公司 | A kind of mobile terminal method for unlocking, mobile terminal and smart lock |
KR101657005B1 (en) * | 2015-06-11 | 2016-09-12 | 전문석 | Method for electrocardiogram authentication |
CN105469489A (en) * | 2015-11-29 | 2016-04-06 | 林海航 | Electronic locking system based on random key |
CN105654594B (en) * | 2015-12-21 | 2017-12-12 | 林海航 | A kind of intelligent remote control key |
US10270801B2 (en) * | 2016-01-25 | 2019-04-23 | Oath Inc. | Compromised password detection based on abuse and attempted abuse |
CN106097511A (en) * | 2016-06-23 | 2016-11-09 | 林海航 | A kind of electronic lock keyless access system of random key |
GB2556906A (en) | 2016-11-24 | 2018-06-13 | Trustonic Ltd | Handset identifier verification |
CN106892029B (en) * | 2017-03-11 | 2022-05-20 | 天津天优科技股份有限公司 | Random password identification type horseshoe lock for threshing machine |
CN109003365A (en) * | 2018-07-09 | 2018-12-14 | 戴天智能科技(上海)有限公司 | A kind of Intelligent Passive lock system based on 1-wire technology |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
US5617542A (en) * | 1993-09-10 | 1997-04-01 | British Telecommunications Public Limited Company | Keyboard terminal with rapid keyed character local display that is altered if character transmitted to host is not timely acknowledged |
US5872513A (en) * | 1996-04-24 | 1999-02-16 | The Chamberlain Group, Inc. | Garage door opener and wireless keypad transmitter with temporary password feature |
US5949349A (en) * | 1997-02-19 | 1999-09-07 | The Chamberlain Group, Inc. | Code responsive radio receiver capable of operation with plural types of code transmitters |
US6041410A (en) * | 1997-12-22 | 2000-03-21 | Trw Inc. | Personal identification fob |
US6078265A (en) * | 1998-02-11 | 2000-06-20 | Nettel Technologies, Inc. | Fingerprint identification security system |
US6111977A (en) * | 1997-04-17 | 2000-08-29 | Cross Match Technologies, Inc. | Hand-held fingerprint recognition and transmission device |
US6125192A (en) * | 1997-04-21 | 2000-09-26 | Digital Persona, Inc. | Fingerprint recognition system |
US6140939A (en) * | 1995-04-14 | 2000-10-31 | Flick; Kenneth E. | Biometric characteristic vehicle control system having verification and reset features |
US6325285B1 (en) * | 1999-11-12 | 2001-12-04 | At&T Corp. | Smart card with integrated fingerprint reader |
US6326754B1 (en) * | 2000-01-28 | 2001-12-04 | Wayne-Dalton Corp. | Wireless operating system utilizing a multi-functional wall station transmitter for a motorized door or gate operator |
US6644557B1 (en) * | 2002-03-25 | 2003-11-11 | Robert A Jacobs | Access controlled thermostat system |
US20030210131A1 (en) * | 1999-12-20 | 2003-11-13 | Fitzgibbon James J. | Garage door operator having thumbprint identification system |
US20040022421A1 (en) * | 2002-07-31 | 2004-02-05 | Fujitsu Limited | Processor with personal verification function and operating device |
US6710700B1 (en) * | 2000-03-21 | 2004-03-23 | Mitsubishi Denki Kabushiki Kaisha | Vehicle key system |
US20040096086A1 (en) * | 2002-09-06 | 2004-05-20 | Seiko Epson Corporation | Information device and display control method |
US6828899B2 (en) * | 2000-10-19 | 2004-12-07 | Cecrop Co., Ltd. | Fingerprint identification system and method for a motor vehicle |
US6940391B1 (en) * | 2000-03-21 | 2005-09-06 | Mitsubishi Denki Kabushiki Kaisha | Vehicle key system |
US6963267B2 (en) * | 2002-03-15 | 2005-11-08 | Wayne-Dalton Corporation | Operator for a movable barrier and method of use |
US7106168B2 (en) * | 2004-01-12 | 2006-09-12 | Overhead Door Corporation | Menu driven wall console with LED indicators for garage door operator |
US7135957B2 (en) * | 2001-12-19 | 2006-11-14 | Lear Corporation | Universal garage door operating system and method |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6035398A (en) * | 1997-11-14 | 2000-03-07 | Digitalpersona, Inc. | Cryptographic key generation using biometric data |
JPH11229688A (en) * | 1998-02-13 | 1999-08-24 | Shiyunkou Ka | Key as locking-unlocking and start-stop device by hand-writing input |
US6353889B1 (en) * | 1998-05-13 | 2002-03-05 | Mytec Technologies Inc. | Portable device and method for accessing data key actuated devices |
JP3112076B2 (en) * | 1998-05-21 | 2000-11-27 | 豊 保倉 | User authentication system |
US6363485B1 (en) * | 1998-09-09 | 2002-03-26 | Entrust Technologies Limited | Multi-factor biometric authenticating device and method |
US6175923B1 (en) * | 1998-12-08 | 2001-01-16 | Senetas Corporation Limited | Secure system using images of only part of a body as the key where the part has continuously-changing features |
US6332193B1 (en) * | 1999-01-18 | 2001-12-18 | Sensar, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
US6516415B1 (en) * | 1999-04-23 | 2003-02-04 | Geneticware Co., Ltd | Device and method of maintaining a secret code within an integrated circuit package |
AUPQ702900A0 (en) * | 2000-04-20 | 2000-05-18 | Grosvenor Leisure Incorporated | Secure biometric loop |
GB0011384D0 (en) * | 2000-05-11 | 2000-06-28 | Ralph Michael T | A security system |
JP2002271320A (en) * | 2001-03-13 | 2002-09-20 | Sony Corp | Information processing equipment and method therefor and recording medium thereof |
US20030140233A1 (en) * | 2002-01-22 | 2003-07-24 | Vipin Samar | Method and apparatus for facilitating low-cost and scalable digital identification authentication |
JP4140313B2 (en) * | 2002-08-09 | 2008-08-27 | 日本ユニカ株式会社 | Personal authentication device, locking device |
US20040123113A1 (en) * | 2002-12-18 | 2004-06-24 | Svein Mathiassen | Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks |
US20050005136A1 (en) * | 2003-04-23 | 2005-01-06 | Liqun Chen | Security method and apparatus using biometric data |
US20070038867A1 (en) * | 2003-06-02 | 2007-02-15 | Verbauwhede Ingrid M | System for biometric signal processing with hardware and software acceleration |
JP4633347B2 (en) * | 2003-08-27 | 2011-02-16 | ソニー株式会社 | Electronics |
-
2004
- 2004-09-22 CN CNB2004100516793A patent/CN1272519C/en not_active Expired - Fee Related
-
2005
- 2005-08-29 US US11/663,620 patent/US8340286B2/en not_active Expired - Fee Related
- 2005-08-29 WO PCT/CN2005/001348 patent/WO2006032186A1/en not_active Application Discontinuation
- 2005-09-21 US US11/663,621 patent/US20090064744A1/en not_active Abandoned
- 2005-09-21 WO PCT/CN2005/001519 patent/WO2006032201A1/en not_active Application Discontinuation
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4993068A (en) * | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
US5617542A (en) * | 1993-09-10 | 1997-04-01 | British Telecommunications Public Limited Company | Keyboard terminal with rapid keyed character local display that is altered if character transmitted to host is not timely acknowledged |
US6140939A (en) * | 1995-04-14 | 2000-10-31 | Flick; Kenneth E. | Biometric characteristic vehicle control system having verification and reset features |
US5872513A (en) * | 1996-04-24 | 1999-02-16 | The Chamberlain Group, Inc. | Garage door opener and wireless keypad transmitter with temporary password feature |
US5949349A (en) * | 1997-02-19 | 1999-09-07 | The Chamberlain Group, Inc. | Code responsive radio receiver capable of operation with plural types of code transmitters |
US6111977A (en) * | 1997-04-17 | 2000-08-29 | Cross Match Technologies, Inc. | Hand-held fingerprint recognition and transmission device |
US6125192A (en) * | 1997-04-21 | 2000-09-26 | Digital Persona, Inc. | Fingerprint recognition system |
US6041410A (en) * | 1997-12-22 | 2000-03-21 | Trw Inc. | Personal identification fob |
US6078265A (en) * | 1998-02-11 | 2000-06-20 | Nettel Technologies, Inc. | Fingerprint identification security system |
US6325285B1 (en) * | 1999-11-12 | 2001-12-04 | At&T Corp. | Smart card with integrated fingerprint reader |
US20030210131A1 (en) * | 1999-12-20 | 2003-11-13 | Fitzgibbon James J. | Garage door operator having thumbprint identification system |
US6326754B1 (en) * | 2000-01-28 | 2001-12-04 | Wayne-Dalton Corp. | Wireless operating system utilizing a multi-functional wall station transmitter for a motorized door or gate operator |
US6710700B1 (en) * | 2000-03-21 | 2004-03-23 | Mitsubishi Denki Kabushiki Kaisha | Vehicle key system |
US6940391B1 (en) * | 2000-03-21 | 2005-09-06 | Mitsubishi Denki Kabushiki Kaisha | Vehicle key system |
US6828899B2 (en) * | 2000-10-19 | 2004-12-07 | Cecrop Co., Ltd. | Fingerprint identification system and method for a motor vehicle |
US7135957B2 (en) * | 2001-12-19 | 2006-11-14 | Lear Corporation | Universal garage door operating system and method |
US6963267B2 (en) * | 2002-03-15 | 2005-11-08 | Wayne-Dalton Corporation | Operator for a movable barrier and method of use |
US6644557B1 (en) * | 2002-03-25 | 2003-11-11 | Robert A Jacobs | Access controlled thermostat system |
US20040022421A1 (en) * | 2002-07-31 | 2004-02-05 | Fujitsu Limited | Processor with personal verification function and operating device |
US20040096086A1 (en) * | 2002-09-06 | 2004-05-20 | Seiko Epson Corporation | Information device and display control method |
US7106168B2 (en) * | 2004-01-12 | 2006-09-12 | Overhead Door Corporation | Menu driven wall console with LED indicators for garage door operator |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8203426B1 (en) | 2007-07-11 | 2012-06-19 | Precision Edge Access Control, Inc. | Feed protocol used to report status and event information in physical access control system |
US8009013B1 (en) * | 2007-09-21 | 2011-08-30 | Precision Control Systems of Chicago, Inc. | Access control system and method using user location information for controlling access to a restricted area |
US8410898B1 (en) | 2012-08-16 | 2013-04-02 | Google Inc. | Near field communication based key sharing techniques |
US9384613B2 (en) | 2012-08-16 | 2016-07-05 | Google Inc. | Near field communication based key sharing techniques |
US20140310327A1 (en) * | 2013-04-10 | 2014-10-16 | Microsoft Corporation | Synchronization across applications |
US9396043B2 (en) * | 2013-04-10 | 2016-07-19 | Microsoft Technology Licensing, Llc | Synchronization across applications |
US20160176381A1 (en) * | 2014-12-17 | 2016-06-23 | Denso International America, Inc. | Vehicle system and method for keyless authentication and control of an ignition system |
US9862353B2 (en) * | 2014-12-17 | 2018-01-09 | Denso International America, Inc. | Vehicle system and method for keyless authentication and control of an ignition system |
EP3274970A4 (en) * | 2015-03-27 | 2018-04-11 | Cordiner, Peter Alexander | A lock monitoring device and a lock monitoring system |
US10360746B1 (en) * | 2016-12-30 | 2019-07-23 | Alarm.Com Incorporated | Controlled indoor access using smart indoor door knobs |
US11182989B1 (en) | 2016-12-30 | 2021-11-23 | Alarm.Com Incorporated | Controlled indoor access using smart indoor door knobs |
US10726650B1 (en) | 2016-12-30 | 2020-07-28 | Alarm.Com Incorporated | Controlled indoor access using smart indoor door knobs |
US11640736B2 (en) | 2016-12-30 | 2023-05-02 | Alarm.Com Incorporated | Controlled indoor access using smart indoor door knobs |
US10764064B2 (en) * | 2017-12-01 | 2020-09-01 | International Business Machines Corporation | Non-networked device performing certificate authority functions in support of remote AAA |
WO2020171841A1 (en) * | 2019-02-18 | 2020-08-27 | Quantum Lock Technologies LLC | Quantum random number generator lock |
US10797872B2 (en) * | 2019-02-18 | 2020-10-06 | Quantum Lock Technologies LLC | Quantum random number generator lock |
US10990356B2 (en) * | 2019-02-18 | 2021-04-27 | Quantum Lock Technologies LLC | Tamper-resistant smart factory |
CN110191468A (en) * | 2019-05-21 | 2019-08-30 | 维沃移动通信有限公司 | Encryption and decryption method and mobile terminal |
CN112446993A (en) * | 2020-12-16 | 2021-03-05 | 珠海格力电器股份有限公司 | Intelligent door lock system and unlocking method |
CN113605788A (en) * | 2021-07-26 | 2021-11-05 | 珠海格力电器股份有限公司 | Door lock alarm method, electronic device, intelligent door lock and readable storage medium |
DE102021130994A1 (en) | 2021-11-25 | 2023-05-25 | Cariad Se | Key unit for a motor vehicle for starting the motor vehicle and opening at least one wing element and method for outputting a warning signal from a key unit for a motor vehicle |
Also Published As
Publication number | Publication date |
---|---|
US20120002808A1 (en) | 2012-01-05 |
WO2006032201A1 (en) | 2006-03-30 |
CN1587616A (en) | 2005-03-02 |
WO2006032186A1 (en) | 2006-03-30 |
CN1272519C (en) | 2006-08-30 |
US8340286B2 (en) | 2012-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090064744A1 (en) | Instant clearing electronic lock system after key-following cipher use and realizing method therefor | |
JP6908451B2 (en) | Car sharing system and car sharing method | |
CN110462692B (en) | Safety communication method based on intelligent lock system and intelligent lock system thereof | |
KR102659972B1 (en) | Systems and methods for controlling access to physical space | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
CN104517338B (en) | Distance entrance and its implementation based on wireless network | |
KR101242122B1 (en) | Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus | |
US20070290789A1 (en) | Intelligent Interactive Lock and Locking System | |
CN107967741A (en) | Double-channel testimony of a witness in-one intelligent lock control method and system | |
JP6588518B2 (en) | Car sharing system | |
CN101674109A (en) | NFC monitoring device, NFC communication terminal and monitoring system | |
JP2004528655A (en) | Frequency method | |
US7065647B2 (en) | Communication system, authentication communication device, control apparatus, and communication method | |
CN107341885A (en) | A kind of intelligent door lock management system | |
CN108460862A (en) | The method and electric lockset, lock system having with palmprint authentication and Mobile phone control lock | |
KR102328402B1 (en) | Smart door look control system and method | |
CN106097490B (en) | A kind of intelligent lock, the door-locking system and method for unlocking being made of lockset | |
CN104301523A (en) | Intelligent lock device based on mobile phone terminal and unlocking method | |
CN101201944A (en) | Fingerprint case and control method thereof | |
CN101019366A (en) | Method for realizing volatile secret key and separated checking module by collecting human characteristic | |
WO2012023153A1 (en) | A mobile phone operable electro-mechanical lock and a method thereof | |
CN206584428U (en) | Electric lockset, lockset equipment and the safety cabinet controlled with mobile phone and palmmprint | |
CN109955934A (en) | Electric vehicle identity authorization system and method | |
CN109243014A (en) | Access control system and the double mirror unlocking methods of gate inhibition | |
CN113593088A (en) | Intelligent unlocking method, intelligent lock, mobile terminal and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |