首页>
外国专利>
Method for performing authentication of using access system e.g. electronic lock, involves determining whether second key and encrypted second keys are valid based on second temporary session key
Method for performing authentication of using access system e.g. electronic lock, involves determining whether second key and encrypted second keys are valid based on second temporary session key
The method involves checking whether a first key and the encrypted first keys are valid by a mobile terminal (3). The third random value and second key are generated, where the second key is generated by combining first key with third random value. The second key is encrypted with the first temporary session key. The second key and encrypted second key are transmitted on the entrance system (2). A determination is made to determine whether the second key and encrypted second keys are valid, based on the second temporary session key. Independent claims are included for the following: (1) entrance system; and (2) mobile terminal.
展开▼