NETWORKED ACCESS CONTROL SYSTEM
There is described a method for controlling a network access control system (100) having a server (106), a mobile device (102), and a lock device (104). The method comprises (i) assigning a registered user account a first key, (ii) assigning the lock device (104) an encryption key, (iii) encrypting,...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | There is described a method for controlling a network access control system (100) having a server (106), a mobile device (102), and a lock device (104). The method comprises (i) assigning a registered user account a first key, (ii) assigning the lock device (104) an encryption key, (iii) encrypting, by the server (106), at least a first identifier related to the registered user account using the first key to generate an encrypted application token, (iv) communicating, by the server (106), the encrypted application token from the server (106) to the mobile device (102), (v) receiving, by the lock device (104), the encrypted application token and a second identifier from the mobile device (102), the second identifier being related to the registered user account, (vi) encrypting, by the lock device (104) and using the assigned encryption key, the encrypted application token and the second identifier to generate lock encrypted data, (vii) communicating, by the lock device (104), the lock encrypted data from the lock device (104) to the mobile device (102), (viii) receiving, by the server (106), the lock encrypted data from the mobile device (102), (ix) decrypting, by the server (106), the lock encrypted data using the assigned encryption key to extract the second identifier, (x) decrypting, by the server (106) and using the first key, the encrypted application token from the decrypted lock encrypted data to extract the first identifier, and (xi) comparing, by the server (106), the extracted first and second identifiers to verify that the second identifier is related to the first identifier for continued secure communication with the mobile device (102). |
---|