Wireless lock system
First Claim
Patent Images
1. An apparatus comprising:
- a processor configured to;
generate an electronic ticket for providing an electronic key device authorization to unlock an electronic lock device, the electronic ticket comprising a public key corresponding to the electronic key device and a link key configured to authenticate an identity of the electronic lock device,wherein the apparatus is authorized to unlock the electronic lock device,wherein the ticket is transmittable from the apparatus to the electronic key device and wherein the ticket is electronically signed by the apparatus using a private key of the apparatus,wherein the public key corresponding to the electronic key device is configured to decrypt a code issued by the electronic lock device and encrypted by the electronic key device, andwherein the link key of the electronic ticket is generated using a one-way hash of a link key of the apparatus and a lock identifier of the electronic lock device.
2 Assignments
0 Petitions
Accused Products
Abstract
A wireless lock and key system using an encryption key pair. When a lock senses a person nearby, the random signal is generated. The key encrypts the signal and returns it to the lock. The lock decrypts the signal and compares it to the original to determine if the lock should be opened. The key may generate temporary tickets for guests to open the lock for limited times.
-
Citations
58 Claims
-
1. An apparatus comprising:
-
a processor configured to; generate an electronic ticket for providing an electronic key device authorization to unlock an electronic lock device, the electronic ticket comprising a public key corresponding to the electronic key device and a link key configured to authenticate an identity of the electronic lock device, wherein the apparatus is authorized to unlock the electronic lock device, wherein the ticket is transmittable from the apparatus to the electronic key device and wherein the ticket is electronically signed by the apparatus using a private key of the apparatus, wherein the public key corresponding to the electronic key device is configured to decrypt a code issued by the electronic lock device and encrypted by the electronic key device, and wherein the link key of the electronic ticket is generated using a one-way hash of a link key of the apparatus and a lock identifier of the electronic lock device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
a processor configured to; receive at least one electronic ticket transmitted from an electronic key device authorized to unlock an electronic lock device, wherein the at least one received electronic ticket comprises a public key corresponding to the apparatus and a link key configured to authenticate an identity of the electronic lock device, wherein the link key of the electronic ticket is generated using a one-way hash of a link key of the electronic key device and a lock identifier of the electronic lock device, transmit the at least one electronic ticket to the electronic lock device, receive a code issued by the electronic lock device, encrypt the code using a private key of the apparatus, and transmit the encrypted code to the electronic lock device, wherein the public key of the apparatus is configured to decrypt the encrypted code. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
33. An apparatus comprising:
a processor configured to; receive, from a first electronic key device, a ticket comprising a public key of the first electronic key device and a link key configured to authenticate an identity of the apparatus, wherein the link key of the electronic ticket is generated using a one-way hash of a link key of the first electronic key device and a lock identifier of the apparatus, wherein the ticket is generated by a second key device authorized to unlock the apparatus and wherein the ticket is electronically secured by a private key of the second electronic key device, issue a code to the first electronic key device, receive an encrypted code corresponding to the issued code encrypted using a private key of the first electronic key device, determine a decrypted code by decrypting the encrypted code using the public key of the first electronic key device, determine whether the decrypted code matches the issued code, and in response to determining that the decrypted code matches the issued code, unlock the apparatus. - View Dependent Claims (34, 35, 36, 37, 38)
-
39. A method comprising:
-
generating a ticket on a first key device, wherein the first key device is authorized to unlock an electronic lock device, and wherein the ticket includes a public key of a second key device and a link key configured to authenticate an identity of the electronic lock device, wherein the link key of the electronic ticket is generated using a one-way hash of a link key of the first key device and a lock identifier of the electronic lock device; electronically securing the ticket with a private key of the first key device; and transmitting the ticket addressed to the second key device, wherein the public key of the second key device is configured to decrypt a code issued by the electronic device and encrypted by the second key device. - View Dependent Claims (40, 41, 42, 43)
-
-
44. A method comprising:
-
receiving, at a first key device, a ticket from a second key device, wherein the second key device is authorized to unlock an electronic lock device, and wherein the ticket comprises a public key corresponding to the first key device and a link key configured to authenticate an identity of the electronic lock device, wherein the link key of the electronic ticket is generated using a one-way hash of a link key of the second key device and a lock identifier of the electronic lock device and wherein the ticket is secured by a private key of the second key device, transmitting the ticket addressed to the electronic lock device, receiving a code issued by the electronic lock device, encrypting the code using a private key of the first key device, and transmitting the encrypted code addressed to the electronic lock device. - View Dependent Claims (45, 46)
-
-
47. A method comprising:
-
receiving, from a first electronic key device, a ticket comprising a public key of the first electronic key device and a link key configured to authenticate an identity of an electronic lock device, wherein the link key of the ticket is generated using a one-way hash of a link key of a second electronic key device and a lock identifier of the electronic lock device, wherein the ticket is generated by the second key device authorized to unlock the electronic lock device and wherein the ticket is electronically secured by a private key of the second electronic key device, issuing a code to the first electronic key device, receiving an encrypted code corresponding to the code encrypted using a private key of the first electronic key device, determining a decrypted code by decrypting the encrypted code using the public key of the first electronic key device, determining whether the decrypted code matches the issued code, and in response to determining that the decrypted code matches the issued code, unlocking the electronic lock device. - View Dependent Claims (48, 49)
-
-
50. One or more computer readable media storing computer readable instructions that, when executed, cause a processor to perform a method comprising:
-
receiving, from a first electronic key device, a ticket comprising a public key of the first electronic key device and a link key configured to authenticate an identity of an electronic lock device, wherein the link key of the ticket is generated using a one-way hash of a link key of a second electronic key device and a lock identifier of the electronic lock device, wherein the ticket is generated by the second key device authorized to unlock the electronic lock device and wherein the ticket is electronically secured by a private key of the second electronic key device, issuing a code to the first electronic key device, receiving an encrypted code corresponding to the code encrypted using a private key of the first electronic key device, determining a decrypted code by decrypting the encrypted code using the public key of the first electronic key device, determining whether the decrypted code matches the issued code, and in response to determining that the decrypted code matches the issued code, unlocking the electronic lock device. - View Dependent Claims (51, 52)
-
-
53. One or more computer readable media storing computer readable instructions that, when executed, cause a processor to perform a method comprising:
-
receiving, at a first key device, a ticket from a second key device, wherein the second key device is authorized to unlock an electronic lock device, and wherein the ticket comprises a public key corresponding to the first key device and a link key configured to authenticate an identity of the electronic lock device, wherein the link key of the electronic ticket is generated using a one-way hash of a link key of the second key device and a lock identifier of the electronic lock device and wherein the ticket is secured by a private key of the second key device, transmitting the ticket addressed to the electronic lock device, receiving a code issued by the electronic lock device, encrypting the code using a private key of the first key device, and transmitting the encrypted code addressed to the electronic lock device. - View Dependent Claims (54, 55)
-
-
56. One or more computer readable media storing computer readable instructions that, when executed, cause a processor to perform a method comprising:
-
generating a ticket on a first key device, wherein the first key device is authorized to unlock an electronic lock device, and wherein the ticket includes a public key of a second key device and a link key configured to authenticate an identity of the electronic lock device, wherein the link key of the electronic ticket is generated using a one-way hash of a link key of the first key device and a lock identifier of the electronic lock device; electronically securing the ticket with a private key of the first key device; and transmitting the ticket addressed to the second key device, wherein the public key of the second key device is configured to decrypt a code issued by the electronic device and encrypted by the second key device. - View Dependent Claims (57, 58)
-
Specification