Trusted address binding equipment

A device and a trusted technology, applied in the field of trusted address binding devices, can solve problems such as unreliable location, working location, insufficient GPS signal accuracy, and weak signal

Pending Publication Date: 2021-12-10
HANGZHOU VASTCHAIN TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Through NFC and QR code, it is only simple to achieve the binding of location and location, and the position in the location work cannot be trusted. The puncher can copy the QR code, NFC, or move the NFC or two-dimensional code of the binding location. QR code to other places
The GPS signal is weak in some areas, or a certain area needs intensive inspection but the accuracy of the GPS signal is not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] refer to figure 1 , shows a functional block diagram of a trusted address binding device according to an embodiment of the present invention, including a trusted data module, a tamper-proof module and an address authentication module, and the trusted data module further includes an initialization unit and a registration unit, wherein the initialization unit uses Based on the preset device serial number and two dispersion factors, as well as the newly created administrator application and normal authority user application, each application adds its own secret key to form the administrator user secret key and normal authority user secret key, and the administrator user secret key key and normal authority user key are the sub-keys dispersed by the system using the root key of the administrator user and the root key of the normal authority user respectively; the registration unit is in the registration state by default when the device is powered on , the administrator commu...

Embodiment 2

[0030] On the basis of embodiment 1, see figure 2 , The trusted address binding device in the embodiment of the present invention further includes an activation module, configured to re-provide the address authentication service only after receiving a state activation instruction issued by the administrator when the device is in the forced demolition state. The activation process is after the device is dismantled, such as changing the battery or repairing the device, which will cause the anti-dismantlement of the device to be triggered by mistake. At this time, the device is in the state of forced dismantling to be activated. Only the administrator authority can reactivate the device, and ordinary authority users do not have the ability to reactivate the device. authority.

[0031] When the trusted address binding device according to the embodiment of the present invention is used, first install the battery, and then fix it in a designated place where a trusted address needs ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses credible address binding equipment, and the equipment comprises a credible data module, an anti-tamper module and an address authentication module; the credible data module further comprises an initialization unit and a registration unit, and the initialization unit is used for presetting an equipment serial number and two dispersion factors and creating a new administrator application and a common authority user application; the registration unit is in a default registration state when the equipment is powered on after being installed, a manager communicates with the equipment through administrator equipment for data interaction, the equipment confirms the identity of an administrator and completes equipment registration after receiving a registration instruction, and the registered equipment enters a working state; the anti-disassembly module is provided with a pressing anti-disassembly switch or a Hall sensor; and the address authentication module is used for the third-party equipment to obtain the random number of the equipment, then encrypts the random number by using the secret key and returns an encrypted result to the equipment, and the equipment performs external authentication on the encrypted result by using the secret key of the corresponding secret key number in the trusted data unit.

Description

technical field [0001] The invention belongs to the technical field of computer equipment, and in particular relates to a trusted address binding equipment. Background technique [0002] In a large number of workplaces, manual patrol safety inspections are required, such as hazardous chemical warehouses, office building elevators, factory fire control rooms, school fences, hotels, hospitals, etc. At present, most of the inspections are done manually and there is no supervision mechanism. The work content of inspection check-in is generally composed of inspection personnel, address, time and event. In the process of unsupervised, the most difficult thing is to locate the trusted address. [0003] At present, card punching is generally performed through a fixed-point NFC (Near Field Communication, near-field communication) card, a two-dimensional code, and a GPS (Global Positioning System, Global Positioning System) signal. Through NFC and QR code, it is only simple to achiev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/043H04W12/06H04W12/40H04W60/00
CPCH04W12/06H04W12/043H04W12/40H04W60/00Y02D30/70
Inventor 程希冀周丹丹罗骁张志文
Owner HANGZHOU VASTCHAIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products