CN109840974A - Unlocking cipher generation method, device, terminal device and system - Google Patents
Unlocking cipher generation method, device, terminal device and system Download PDFInfo
- Publication number
- CN109840974A CN109840974A CN201910049881.9A CN201910049881A CN109840974A CN 109840974 A CN109840974 A CN 109840974A CN 201910049881 A CN201910049881 A CN 201910049881A CN 109840974 A CN109840974 A CN 109840974A
- Authority
- CN
- China
- Prior art keywords
- information
- encrypted message
- key
- unlocking cipher
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of unlocking cipher generation method, device, terminal device and systems, wherein method includes the encrypted message that terminal device obtains user's input, encrypted message is subjected to processing and generates key information, key information is exported to smart lock, so that smart lock identifies and unlocks, to solve the problems, such as that identification equipment is exposed vulnerable to destroying and high equipment cost, while the process of audio-frequency information of generating is encrypted by voice messaging, intelligent lock cipher is prevented to be easy the problem of being cracked.
Description
Technical field
The present invention relates to intelligent unlocking fields, in particular to be a kind of unlocking cipher generation method, device, terminal device and
System.
Background technique
At present smart lock input key and the mode that unlocks have very much, as recognition of face, iris recognition, fingerprint recognition and
Password identification, benefit be do not need additionally to wear key or unlocking device, the disadvantage is that the equipment of input be it is exposed, vulnerable to broken
It is bad;And the existing unlocking manner using NFC or RFID, solve the problems, such as equipment it is exposed and vulnerable to destroy, but need user with
Body wears solution lock key, and also has the technical issues of at high cost, to be easily cracked and copied.
Summary of the invention
The purpose of the present invention aim to solve the problem that identification apparatus it is exposed and vulnerable to destruction, high equipment cost and be easy
The problem of being cracked, and a kind of unlocking cipher generation method, device, terminal device and system are provided.
To achieve the above object, the invention provides the following technical scheme:
The present invention proposes a kind of unlocking cipher generation method, is applied to intelligent terminal, comprising steps of
Obtain the encrypted message of user's input;
The encrypted message is subjected to processing and generates key information;
The key information is exported so that smart lock identifies and carry out control unlocking.
The present invention proposes that a kind of unlocking cipher generating means include:
Encrypted message acquiring unit, for obtaining the encrypted message of user's input;
Key information generation unit generates key information for the encrypted message to be carried out processing;
Private key information output unit, for exporting the key information so that smart machine identifies and carry out control unlocking.
The present invention proposes a kind of terminal device, including memory and processor, is stored with computer journey in the memory
The step of sequence, the processor realizes above-mentioned unlocking cipher generation method when executing the computer program.
The present invention also proposes a kind of terminal device readable storage medium storing program for executing, is stored thereon with computer program, the computer
The step of unlocking cipher generation method of the upper password unlock is realized when program is executed by processor.
The present invention provides a kind of unlocking cipher generation method, device, terminal device and storage mediums, have beneficial below
Effect:
Terminal device obtains the encrypted message of user's input, and encrypted message is carried out processing and generates key information, is exported close
Key information is to smart lock, so that smart lock identifies and carries out control unlocking, thus solve identification equipment it is exposed and vulnerable to broken
The problem of bad and high equipment cost, while the process for generating audio-frequency information is encrypted by voice messaging, prevent intelligent lock cipher
It is easy the problem of being cracked.
Detailed description of the invention
Fig. 1 is the flow diagram of the unlocking cipher generation method of one embodiment of the invention;
Fig. 2 is the flow diagram of the unlocking cipher generation method of another embodiment of the present invention;
Fig. 3 is the flow diagram of the unlocking cipher generation method of another embodiment of the invention;
Fig. 4 is the flow diagram of the unlocking cipher generation method of another embodiment of the invention;
Fig. 5 is the flow diagram of the unlocking cipher generation method of another embodiment of the invention;
Fig. 6 is the structural block diagram of the unlocking cipher generating means of one embodiment of the invention;
Fig. 7 is the flow diagram for the method that the password of one embodiment of the invention unlocks;
Fig. 8 is the flow diagram for the method that the password of another embodiment of the present invention unlocks;
Fig. 9 is the flow diagram of the method for the password unlock of another embodiment of the invention;
Figure 10 is the flow diagram of the method for the password unlock of another embodiment of the invention;
Figure 11 is the structural block diagram for the device that the password of one embodiment of the invention unlocks;
Figure 12 is the structural block diagram of the terminal device of one embodiment of the invention;
Figure 13 is the structural block diagram of the smart lock of one embodiment of the invention;
Figure 14 is the structural block diagram of the smart lock unlocking system of one embodiment of the invention;
Figure 15 is the functional block diagram of the smart lock unlocking system of one embodiment of the invention.
The embodiments will be further described with reference to the accompanying drawings for realization, functional characteristics and advantage for the purpose of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.Base
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its
His embodiment, shall fall within the protection scope of the present invention.
The present invention proposes a kind of unlocking cipher generation method, is applied to terminal device, and terminal device can be mobile phone, put down
Plate, wearable device, computer, intelligent sound, intelligent robot, intelligent vehicle-carried etc. are unlocking cipher generation method with reference to attached drawing 1
Flow diagram, the present invention provides a kind of unlocking cipher generation method, comprising steps of
S100 obtains the encrypted message of user's input;
Terminal device obtains the encrypted message of user's input, and above-mentioned encrypted message can be to be believed by the biology of detection user
Breath is identified and is analyzed and acquired, can also be defeated by the physical button or display screen that receive user's operation terminal device
The information entered acquires in turn, and biological information is for example including face, iris, fingerprint, voice etc..Specifically, terminal device can
To prestore biological information mapping library corresponding with encrypted message, after terminal device detects the biological information of user, to this
Biological information is identified, and corresponding encrypted message is obtained from mapping library according to the obtained biological information after identification, if
It gets and enters next step S200, obtain less than then issuing prompt.Encrypted message of the invention includes voice messaging, text letter
One of breath, digital information, symbolic information, graphical information are a variety of, wherein voice messaging is audio, digital information be Ah
Arabic numbers, text information can be letter, text, and symbolic information is spcial character etc., and mixing complex information can be above-mentioned
The combination not of the same race of digital information and text information.
Encrypted message is carried out processing and generates key information by S200;
Terminal device of the invention can be encrypted encrypted message, to generate key information.Pass through symmetrical expression
Encrypted message is encrypted in Encryption Algorithm, it is preferred to use SM4 (Encryption Algorithm used in WAPI wireless network standards)
Encrypted message is encrypted.After Crypted password information, terminal device obtains key information.If directly will be close by terminal device
Code information plays out, and is received by smart lock, and in the process, safety is too low, other people can directly know encrypted message,
Therefore terminal device is needed to encrypt encrypted message, achieve the effect that prevent encrypted message from divulging a secret.It can be seen from the above, message in cipher
Breath includes any one of digital information, text information, mixing complex information, such as: digital information " 123 ", text information " A123 "
Or mixing complex information "@A123 " encrypts encrypted message by using SM4 or SM7, to reach the above-mentioned password of encryption
The effect of information.
In another embodiment, present invention proposition is related to a kind of language encryption application software on the terminal device, above-mentioned
Language encrypts application software and executes key information generation for assisting, such as: user touches the screen of terminal device to press language
The encrypted message that starting sound-recording function in speech encryption application software is recorded and identified with the voice to user
It carries out encryption and generates key information.
S300 exports key information so that smart machine identifies and carry out control unlocking.
Smart machine can be smart lock or terminal device, and smart lock can be intelligent door lock, intelligent padlock, terminal device
It can be mobile phone, plate, wearable device, computer, intelligent sound, intelligent robot, intelligent vehicle-carried, intelligent appliance etc., be applied to
Terminal device is mainly used for password just openable application is provided with, for example, device password booting application and other APP are answered
With etc.), for convenience of understanding, now it is illustrated by taking smart lock as an example.In the present embodiment, terminal device broadcasts key information
It puts, it is control smart lock unlocking after matched password that smart lock, which receives the key information discriminance analysis,.The key information can be
Normal person can directly understand its semantic password sound, for example, the sound of " 123 " or " ABC ", or normal person cannot
It is enough directly to understand its semantic password sound, for example, buzzing or white noise.
In another embodiment, if user stays out, but user allows guest to enter room, then first terminal equipment
Key information is sent to second terminal equipment (terminal device of guest) by (terminal device of owner), and second terminal equipment can incite somebody to action
Key information plays out, to be unlocked after smart lock receives key information, it will be understood that first terminal equipment can lead to
It crosses the modes such as QQ, wechat and key information is sent to second terminal equipment.By this embodiment, smart lock is reached without being equipped with
The effect of more keys.Wherein, first terminal equipment can be mobile phone, plate, wearable device, computer, intelligent sound, intelligent machine
Device people, intelligent vehicle-carried etc., and second terminal can be mobile phone, plate, wearable device etc., wearable device is for example are as follows: wrist-watch, hand
Ring, intelligent glasses, intelligent shoe etc..
In yet another embodiment, user is when inputting encrypted message to terminal device, other people around user in order to prevent
Encrypted message is eavesdropped, proposes a kind of mode of key text generation audio-frequency information.Mode step is that it is defeated that terminal device obtains user
The text information entered, terminal device according to text information generate the second encrypted message, according to Handshake Protocol bind text information with
Second encrypted message, terminal device export the second audio-frequency information;According to aforesaid way, realize user pass through it is defeated to terminal device
Enter text, is also able to achieve the effect of smart lock unlocking.
With reference to attached drawing 2 it is the flow diagram of another embodiment of unlocking cipher generation method, and encrypted message is carried out
Processing generate key information step S200 include:
S210 carries out processing to encrypted message and forms unlock voice;
The present embodiment encrypted message is chosen as the text information that user is manually entered, and terminal device text information carries out language
Sound processing, is converted to unlock voice for text information.
S220 to unlock voice encryption and handles generation key information.
Unlock voice is encrypted, the mode of encryption can be to carry out semantic processes to semanteme by Encryption Algorithm.Solution
Lock voice is that can carry out language to unlock voice by Encryption Algorithm by conventional semantic understanding, the present invention after normal person hears
After justice processing, the key information of terminal device final output can make normal person that can not directly distinguish its original semanteme, thus may be used
The safety of password is improved,
Specifically, the output form of key information can be exported for the form of white noise, distinguish normal person can not
It is semantic, guarantees that key information is not leaked, and the sound frequency that normal person can hear is the low frequency of 20HZ and the high frequency of 20KHZ,
White noise of the invention includes low frequency audio and high-frequency audio, and the frequency of low frequency audio of the present invention is 0.3~3.4KHZ, high frequency audio
The frequency of frequency is 10~15KHZ, it will be understood that terminal device exports the minimum 0.3KHZ of audio frequency of white noise, up to
15KHZ.The present invention limits the frequency band of white noise output, and to reduce bit error rate when sound transmission, terminal device will be with white noise
The key information of form output propagates to smart lock, so that smart lock is opened according to the key information that white noise form exports
Lock, white noise form makes normal person that can not understand unlocking cipher, and in such a way that such audio is propagated, makes the appearance of smart lock
Face only needs to be arranged radio reception/broadcast hole, can both complete unlocking work, without installing the identifications such as keyboard, fingerprint, iris dress
It sets, improve safety while also reducing cost.
With reference to the flow diagram for another embodiment that attached drawing 3 is unlocking cipher generation method, encrypted message includes opening
Lock cipher information and Crypted password information.Include: to the step S220 for unlocking voice encryption generation key information
S221, judges whether Crypted password information has corresponding Encryption Algorithm;
Unlocking cipher information is the encrypted message of unencryption that user input to terminal device, Crypted password information for for
Starting Encryption Algorithm encrypts the encrypted message of above-mentioned unlocking cipher information, and Crypted password information understandable is that user sets to terminal
When standby input encrypted message, the Encryption Algorithm of user's selection.Unlocking cipher information and Crypted password information digital all can be believed
Breath, text information, any one for mixing complex information.
S222, if so, being encrypted and being handled according to the corresponding Encryption Algorithm dual lock encrypted message of Crypted password information
Generate key information.
If terminal device, which analyzes Crypted password information, does not have corresponding Encryption Algorithm, prompt information is issued, or random
Selection Encryption Algorithm dual lock encrypted message is encrypted to generate key information.
In another embodiment, key information can be key sound, and according to the corresponding encryption of Crypted password information
Algorithm dual lock encrypted message encrypted and handle generate key information step S222 include:
S2221 transfers the corresponding Encryption Algorithm of Crypted password information;
Prestored in terminal device multiple Crypted password information and with its one-to-one Encryption Algorithm, different encryptions is close
The function of the corresponding Encryption Algorithm of code information is different, for example, Crypted password information is 456, the function of Encryption Algorithm is that will unlock
Encrypted message changes into letter.
S2222 carries out encryption according to Encryption Algorithm dual lock encrypted message and generates encryption unlock sound;
It for convenience of understanding, is shown with citing, the unlocking cipher information that terminal device obtains the unencryption of user's input is
" 123 ", Crypted password information are " 456 ", and terminal device transfers corresponding Encryption Algorithm according to " 456 ", if the function of Encryption Algorithm
Can be for unlocking cipher information be changed into letter, terminal device is then encrypted " 123 " to obtain the text of " ABC ", and is generated and added
Close unlock sound, the i.e. audio of " ABC ".
S2223 is modulated encryption unlock sound and generates key sound.
Terminal device is modulated encryption unlock sound and generates key sound, i.e., as above-mentioned, carries out language to " ABC " audio
Justice is further processed, and obtains the white noise that key sound is " ABC ".
It is the flow diagram of one embodiment of unlocking cipher generation method with reference to attached drawing 4, encrypted message is that voice is close
Code information, the step S210 for carrying out processing formation unlock voice to encrypted message include:
S211 identifies the voice unlocking cipher in speech cipher information;
In this embodiment, encrypted message is the speech cipher information that user inputs to terminal device voice, terminal device
The processing modes such as logical amplification, filtering remove noise to identify the voice unlocking cipher in speech cipher information, such as: terminal
Equipment receives the noise that user speech input includes " 123 " voice and user surrounding environment, the logical amplification of terminal device, filtering
Etc. the noise for removing user surrounding environment to obtain " 123 " voice.
Voice unlocking cipher is changed into text unlocking cipher by S212;
I.e. such as: by " 123 " of above-mentioned speech form, being converted to the 123 of text (i.e. text) form.
Whether S213, analysis text unlocking cipher match with default unlocking cipher;
To be further ensured that encrypted message will not be revealed, default unlocking cipher is previously set in terminal device in user, is being obtained
After the voice unlocking cipher for getting user's input, voice unlocking cipher is identified, text unlocking cipher, subsequent terminal are obtained
Equipment judges whether text unlocking cipher matches with default unlocking cipher.
S214, if matching, changes into unlock voice for text unlocking cipher.
It is above explained to be, text is converted speech into, verify by text and pre-set text, it is correct in verifying
Afterwards, convert text to voice again, i.e. text unlocking cipher is changed into unlock voice by terminal device, the unlock voice be temporarily not
Encryption, and non-semantic processes.
It is the flow diagram of unlocking cipher generation method In yet another embodiment with reference to attached drawing 5, encrypted message includes
Text password information and Crypted password information, key information include key sound.Encrypted message is subjected to processing and generates key letter
The step S200 of breath includes:
S201, judges whether Crypted password information has corresponding Encryption Algorithm;
S202, if so, transferring the corresponding Encryption Algorithm of Crypted password information;
S203 carries out encryption to text password information according to Encryption Algorithm and generates text key;
S204 is modulated text key and generates key sound.
Above-mentioned S201 and S220 principle is identical, S202 is identical as S2221 principle, and this will not be repeated here.Text password information
Inputted from user to the screen key of terminal device comprising text information, digital information, symbolic information, in graphical information
It is one or more, it for convenience of understanding, is shown with citing, the unlocking cipher information that terminal device obtains the unencryption of user's input is
" 123 ", Crypted password information are " 456 ", and whether terminal device have corresponding Encryption Algorithm according to " 456 ", if so, then transferring pair
The Encryption Algorithm answered, if the function of Encryption Algorithm is that unlocking cipher information is changed into letter, terminal device is added " 123 "
The close text key for obtaining " ABC ", and encryption unlock sound, the i.e. audio of " ABC " are generated, and carry out to " ABC " audio semantic
It is further processed, is modulated into the white noise that key sound is " ABC ".In another embodiment, according to Encryption Algorithm to text
Encrypted message carries out
Whether S400, analysis text password information match with default unlocking cipher.
Above-mentioned S400, identical as S213 principle, this will not be repeated here.
In another embodiment, before the step S300 that output key information identifies and unlocks for smart lock also
Include: S201, compression preservation is carried out to key information.The advanced row of white noise is saved, when the user clicks the play button, then
Execute step S300.This implementation can be by the audios lattice such as format of key information boil down to audio, such as WAV, WMA, MP3, AMR
Formula.
In conclusion terminal device of the invention obtains the encrypted message of user's input, encrypted message is subjected to processing life
At key information, key information is exported to smart lock, so that smart lock identifies and unlocks, to solve outside identification equipment
Dew and vulnerable to destroying and the problem of high equipment cost, while the process of audio-frequency information is generated by voice messaging encryption, it is anti-
Only intelligent lock cipher is easy the problem of being cracked, and improves the safety of password.
It is the structural block diagram of unlocking cipher generating means with reference to attached drawing 6, unlocking cipher generating means are applied to above-mentioned end
End equipment comprising encrypted message acquiring unit 10, Key information generation unit 20, private key information output unit 30.
Encrypted message acquiring unit 10, for obtaining the encrypted message of user;
Terminal device obtains the encrypted message of user by encrypted message acquiring unit 10, and above-mentioned encrypted message can be logical
The biological information for crossing detection user is identified and is analyzed and acquires, can also be by receiving user's operation terminal device
Physical button or the information of display screen input acquire in turn, and biological information is for example including face, iris, fingerprint, voice etc..
Specifically, terminal device can prestore biological information mapping library corresponding with encrypted message, when terminal device passes through message in cipher
After breath acquiring unit 10 detects the biological information of user, which is identified, and according to obtaining after identification
Biological information obtains corresponding encrypted message from mapping library, if getting encrypted message, by Key information generation unit 20
Encrypted message is subjected to processing and generates key information, is obtained less than then issuing prompt.Encrypted message of the invention includes voice letter
One of breath, text information, digital information, symbolic information, graphical information are a variety of, wherein voice messaging is audio, number
Information is Arabic numerals, and text information can be letter, text, and symbolic information is spcial character etc., and mixing complex information can
Think the combination not of the same race of above-mentioned digital information and text information.
Key information generation unit 20 generates key information for encrypted message to be carried out processing;
Terminal device is encrypted encrypted message by Key information generation unit 20, to generate key information.
Encrypted message is encrypted by symmetry encryption algorithm, it is preferred to use SM4 is (used in WAPI wireless network standards
Encryption Algorithm) encrypted message is encrypted.After Crypted password information, terminal device obtains key information.If directly by end
End equipment plays out encrypted message, is received by smart lock, and in the process, safety is too low, other people can directly obtain
Know encrypted message, therefore terminal device is needed to encrypt encrypted message, achievees the effect that prevent encrypted message from divulging a secret.By above-mentioned
It is found that encrypted message includes any one of digital information, text information, mixing complex information, such as: digital information " 123 ", text
Information " A123 " or mixing complex information "@A123 " encrypt encrypted message by using SM4 or SM7, add to reach
The effect of close above-mentioned encrypted message.
In another embodiment, present invention proposition is related to a kind of language encryption application software on the terminal device, above-mentioned
Language encrypts application software, executes key information generation method for assisting, such as: user touches the screen of terminal device to press
Starting sound-recording function in lower language encryption application software is recorded with the voice to user, identifies to obtain encrypted message, then
Encryption generates key information.
Private key information output unit 30, for exporting key information so that smart machine identifies and unlocks.
Terminal device is played out key information by private key information output unit 30, and smart lock receives the key information
Discriminance analysis is control smart lock unlocking after matched password.The key information can directly can understand its semanteme for normal person
Password sound, or normal person can not directly understand its semantic password sound.
In another embodiment, if user stays out, but user allows guest to enter room, then first terminal equipment
Key information is sent to second terminal equipment (terminal device of guest) by (terminal device of owner), and second terminal equipment can incite somebody to action
Key information plays out, to be unlocked after smart lock receives key information, it will be understood that first terminal equipment can lead to
It crosses the modes such as QQ, wechat and key information is sent to second terminal equipment.By this embodiment, smart lock is reached without being equipped with
The effect of more keys.Wherein, first terminal equipment can be mobile phone, plate, wearable device, computer, intelligent sound, intelligent machine
Device people, intelligent vehicle-carried etc., and second terminal can be mobile phone, plate, wearable device etc., wearable device is for example are as follows: wrist-watch, hand
Ring, intelligent glasses, intelligent shoe etc..
In yet another embodiment, user is when inputting encrypted message to terminal device, other people around user in order to prevent
Encrypted message is eavesdropped, proposes a kind of mode of key text generation audio-frequency information.Mode step is that it is defeated that terminal device obtains user
The text information entered, terminal device according to text information generate the second encrypted message, according to Handshake Protocol bind text information with
Second encrypted message, terminal device export the second audio-frequency information;According to aforesaid way, realize user pass through it is defeated to terminal device
Enter text, is also able to achieve the effect of smart lock unlocking.
In another embodiment, Key information generation unit 20 includes:
Speech processing module forms unlock voice for carrying out processing to encrypted message;
The present embodiment encrypted message is chosen as the text information that user is manually entered, and terminal device passes through speech processing module
Text information carries out speech processes, and text information is converted to unlock voice.
Key production module, for generating key information to unlock voice encryption.
Unlock voice is encrypted by key production module, the mode of encryption can be to carry out at semanteme to semanteme
Reason.Unlock voice is can be by conventional semantic understanding after normal person hears, the present invention is semantic by carrying out to unlock voice
After processing, the key information of 30 final output of private key information output unit can make normal person that can not directly distinguish its semanteme, thus
The safety that password can be improved is proposed, specifically, the output form of key information is that the form of white noise is exported, and makes normal person
It can not distinguish its semanteme, guarantee that key information is not leaked, the output area of the white noise includes low frequency and high-frequency, wherein
Low frequency is 0.3~3.4KHZ, and high-frequency is 10~15KHZ, it will be understood that terminal device exports the audio frequency of white noise most
Low is 0.3KHZ, up to 15KHZ, the i.e. frequency band of limitation white noise output, and to reduce bit error rate when sound transmission, terminal is set
It is standby that the key information exported in the form of white noise is propagated into smart lock, so that the key that smart lock is exported according to white noise form
Information is unlocked, and in such a way that such audio is propagated, so that the outer surface of smart lock is only needed to be arranged radio reception/broadcast hole, both
Unlocking work can be completed, without installing the identity recognition devices such as keyboard, fingerprint, iris, while reducing cost
Improve safety.
In one embodiment, encrypted message includes unlocking cipher information and Crypted password information.Key production module packet
It includes:
Encryption Algorithm judging submodule, for judging whether Crypted password information has corresponding Encryption Algorithm;
Unlocking cipher information is the encrypted message of unencryption that user input to terminal device, Crypted password information for for
The encrypted message of above-mentioned unlocking cipher information is encrypted, and Crypted password information understandable inputs message in cipher to terminal device for user
When breath, the Encryption Algorithm of user's selection.Unlocking cipher information and Crypted password information all can be digital information, text information,
Mix any one of complex information.
Key generates submodule, for if so, according to the corresponding Encryption Algorithm dual lock encrypted message of Crypted password information
It is encrypted to generate key information.
If nothing, terminal device issues prompt information, or random selection Encryption Algorithm dual lock encrypted message is encrypted
To generate key information.
In another embodiment, key information can be key sound, and key generates submodule and includes:
Algorithm transfers subelement, for transferring the corresponding Encryption Algorithm of Crypted password information;
It is digitally generated encryption sub-unit operable, generates encryption unlock for carrying out encryption according to Encryption Algorithm dual lock encrypted message
Sound;
It is shown with citing, encrypted message acquiring unit 10 obtains the unlocking cipher information of the unencryption of user's input, passes through
Above-mentioned Encryption Algorithm dual lock encrypted message is encrypted, i.e., such as: unlocking cipher information is " 123 ", by Encryption Algorithm to this
" 123 ", which are encrypted, to be obtained " ABC " and generates close digital audio, i.e. the audio of " ABC ".
Sound modulation subunit generates key sound for being modulated to encryption unlock sound.
Sound modulation subunit is modulated encryption unlock sound and generates key sound, i.e., as above-mentioned, to " ABC " audio
Semantic processes are carried out, the white noise that key sound is " ABC " is obtained.
In another embodiment, encrypted message is speech cipher information, and speech processing module includes:
Unlocking cipher identifies submodule, for identification the voice unlocking cipher in speech cipher information;
In this embodiment, encrypted message is the speech cipher information that user inputs to terminal device voice, unlocking cipher
Identification submodule identifies that submodule the processing modes such as amplifies, filters and removes noise to identify voice by unlocking cipher
Voice unlocking cipher in encrypted message, such as: it includes " 123 " that encrypted message acquiring unit 10, which receives user speech input,
Voice and with the sound such as the noise of user surrounding environment, unlocking cipher identifies that submodule passes through to sound using amplification, filtering
Etc. processing modes remove the noise of ambient enviroment to obtain " 123 " voice.
Text conversion submodule, for voice unlocking cipher to be changed into text unlocking cipher;
I.e. such as: " 123 " of above-mentioned speech form are converted to the 123 of text (i.e. text) form by text conversion submodule.
Whether matched sub-block matches for analyzing text unlocking cipher with default unlocking cipher;
To be further ensured that encrypted message will not be revealed, default unlocking cipher is previously set to terminal device in user, close
After code information acquisition unit 10 gets the voice unlocking cipher of user's input, it is close that unlocking cipher identifies that submodule unlocks to voice
Code is translated, and obtains text unlocking cipher, and subsequent matched sub-block judge whether are text unlocking cipher and default unlocking cipher
Matching.
Voice transform subblock turns text unlocking cipher if matching for text unlocking cipher with default unlocking cipher
At unlock voice.
Above explained to be, voice transform subblock converts speech into text, passes through the progress of text and pre-set text
Verifying after verifying is correct, converts text to voice, i.e. voice conversion submodule unlocks text after verifying is correct again
Password changes into unlock voice, which is temporary unencryption, and non-semantic processes.
In one embodiment, encrypted message includes text password information and Crypted password information, and key information includes close
Key sound.Key generating unit 20 includes:
Algorithm judgment module, for judging whether Crypted password information has corresponding Encryption Algorithm;
Algorithm transfers module, if having corresponding Encryption Algorithm for Crypted password information, it is corresponding to transfer Crypted password information
Encryption Algorithm;
Algorithm for encryption module generates text key for carrying out encryption to text password information according to Encryption Algorithm;
Sound modulation module generates key sound for being modulated to text key.
Screen key input of the text password information from user to terminal device comprising text information, digital information, symbol
One of number information, graphical information are a variety of.It for convenience of understanding, is shown with citing, encrypted message acquiring unit 10, which obtains, to be used
The unlocking cipher information of the unencryption of family input is " 123 ", and Crypted password information is " 456 ", and algorithm judgment module is according to " 456 "
Whether corresponding Encryption Algorithm is had, if so, algorithm for encryption module then transfers corresponding Encryption Algorithm, if the function of Encryption Algorithm is
Unlocking cipher information is changed into letter, algorithm for encryption module is then encrypted " 123 " to obtain the text key of " ABC ", sound
The text key of " ABC " is generated encryption unlock sound, the i.e. audio of " ABC " by modulation module, and is carried out to " ABC " audio semantic
It is further processed, is modulated into the white noise that key sound is " ABC ".
With reference to attached drawing 7, the method that the present invention proposes a kind of unlock of password is applied to smart machine, which can be with
For smart lock or terminal device, smart lock can be intelligent door lock, intelligent padlock, and terminal device can be mobile phone, plate, wearing
Equipment, computer, intelligent sound, intelligent robot, intelligent vehicle-carried, intelligent appliance etc. are mainly used for applied to terminal device to setting
It is equipped with password just openable application, for example, device password booting application and other APP application etc.), it is existing for convenience of understanding
It is illustrated by taking smart lock as an example.Attached drawing 3 is the flow diagram of the method for password unlock, the method for password unlock of the invention
Include:
S001 receives external voice;
External voice can be understood as including any of the above-described key information as described in the examples, or also comprising intelligence
Ambient noise is locked, excellent key information of the invention is white noise.
S002 handles to obtain key information external voice;
This step can first amplify external voice, after clearly identifying key sound and ambient noise, then
Ambient noise filters out, to obtain pure key information.
Key information is carried out processing and generates encrypted message by S003;
In the embodiment of above-mentioned unlocking cipher generation method, key information can be by Crypted password information by encryption,
White noise made of modulation, and in the present embodiment, smart lock can carry out back-modulation (as demodulating), decryption to white noise,
To obtain encrypted message.
S004 generates unlock instruction according to encrypted message and is unlocked with controlling.
After smart lock gets encrypted message, the encrypted message and preset password information are subjected to matching verifying, if
It is identical, then smart lock generate unlock instruction, such as: encrypted message be " abc123 ", preset password information be " abc123 ",
After comparison, the two is identical, generates unlock instruction, and smart lock controls smart lock according to unlock instruction and unlocks.
Key information is handled for the flow diagram of another embodiment of the method for password unlock with reference to attached drawing 8
Generate the step S003 of encrypted message, comprising:
S013 is decrypted key information to form unlock voice.
By description above S200 it is found that key information is that voice is modulated processing, semantic processes make language to unlock
Justice and original real unlocking cipher are corresponding but not identical, and in the present embodiment, smart lock passes through the interior audio analysis prestored
Program analyzes whether key information is the audio crossed by modulation treatment.Audio analysis program can analyze low frequency audio and high frequency audio
Frequently, the audio that frequency is 0.3~3.4KHZ is defined as low frequency audio by the present invention, and frequency is that the audio of 10~15KHZ is defined as
High-frequency audio, when it is low frequency audio or high-frequency audio that audio analysis program, which analyzes key information, smart lock can determine that key
Information is normal person or smart lock not can recognize its semantic audio, is modulated at this time to key information and passes through decipherment algorithm
It is handled, unlock voice is parsed from key information, so that normal person or smart lock can identify its semanteme.
S023 carries out processing to unlock voice and forms encrypted message;
Because unlock voice is the form of audio, this step is the unlock voice conversion by audio form in textual form
Encrypted message.Specifically, smart lock semantics recognition unlocks voice, and above-mentioned unlock voice is interpreted as to the message in cipher of textual form
Breath.
Shape is decrypted to key information for the flow diagram of another embodiment of the method for password unlock with reference to attached drawing 9
Include: at the step S013 for unlocking voice
S112 demodulates key information to parse encryption unlock sound;
Key information in the present embodiment is normal person or smart lock directly can not normally identify its semantic low frequency audio
Or high-frequency audio, therefore need to carry out key information demodulation herein and restore to be generated as normal person or smart lock and directly can normally identify
Its semantic encryption unlocks sound.For example, key information is buzzing or white noise, generating encryption unlock sound afterwards upon mediation is
The audio of " ABC ", and the audio for being somebody's turn to do " ABC " is that normal person directly can normally identify that its semanteme, smart lock are soft by speech recognition
Part can also Direct Recognition go out its semanteme.
S113, judges whether encryption unlock sound has the corresponding decipherment algorithm prestored;
Such as above-mentioned steps S221 and S222, key information can be corresponding by Crypted password information for unlocking cipher information
The encryption that Encryption Algorithm obtains after being encrypted unlocks sound, and the present embodiment is the process reversely decrypted to key information.
Specifically, whether smart lock analysis encryption unlock sound and the decipherment algorithm prestored are identical, if they are the same, execute lower step.Wherein,
Prestored in the algorithms library of smart lock multiple encryptions unlock sound and with its one-to-one decipherment algorithm.It reaches in this manner
To the formula of judgement selection decryption, the safety of password is promoted.
S213, if so, being then decrypted encryption unlock sound to parse unlock voice according to the decipherment algorithm prestored.
Such as in above-mentioned S222 step, encryption unlock sound can carry out the information that semantic processes are crossed to be encrypted algorithm,
So in the present embodiment, if smart lock determine encryption unlock sound have it is corresponding prestore decipherment algorithm, calculated by prestoring decryption
Encryption unlock sound is decrypted in method, to obtain the unlock voice of openable smart lock.Specifically, encryption unlock sound example
For example " ABC " audio, through the corresponding unlock voice for prestoring generation " 123 " after decipherment algorithm is decrypted.
In another embodiment, encryption unlock sound is decrypted to generate solution according to the decipherment algorithm prestored
Lock voice step S213 include:
Unlock voice is changed into text unlocking cipher by S123;
Smart lock is stored with the speech recognition program of 0~9 specific voice (or nonspecific voice), by the solution of audio form
Lock speech recognition is translated as the text unlocking cipher of textual form.
Whether S223, analysis text unlocking cipher match with default unlocking cipher;
Prestored in smart lock unlocking cipher and with the one-to-one text unlocking cipher of the unlocking cipher.
S323, if matching, is determined as encrypted message for text unlocking cipher.
Smart lock, if successful match, generates unlock by matching text unlocking cipher with default unlocking cipher
Instruction, carries out the unlocking of smart lock.
In yet another embodiment, to unlock voice carry out processing formed encrypted message step S023 include:
Whether S0231, analysis unlock voice match with default unlocking voice;
Specifically, whether the vocal print that smart lock can analyze unlock voice matches with the vocal print of default unlocking voice, can also
To analyze whether the audio band of the audio band and default unlocking voice of unlock voice coincide.
Unlock voice is determined as encrypted message if matching by S0231.
It is the flow diagram of one embodiment of the method for password unlock, at external voice with reference to attached drawing 10
Reason is to obtain the step S002 of key information, comprising:
S012 carries out enhancing processing to external voice to obtain key information;
Enhancing processing includes any one or more processing of filtering processing, sound enhanced processing or sound equalization processing.
Further, external voice is handled to obtain the step S012 of key information and include:
S022 carries out enhancing processing to external voice to obtain enhancing key;
By above-mentioned S012 mode, enhancing processing is carried out to external voice, obtains enhancing key, enhancing key is to handle
Key information afterwards.
S032, judge to enhance key whether with the cipher key match that prestores;
S042 determines that enhancing key is key information if matching.
In one embodiment, before the step S001 for receiving external voice, comprising:
S101 obtains the unlock enabled instruction of user's input;
S102 generates the voice reminder for reminding user to keep quite within a preset time according to unlock enabled instruction
Information, and start reception external voice.
Purpose is to remind user to keep quite within a preset time when terminal device exports key sound, above-mentioned default
Time is preferably in 1 second to 10 seconds.
In another embodiment, smart lock is equipped with key, after user presses the button, obtains unlock enabled instruction.
In conclusion smart lock receives external voice;External voice is handled to obtain key information;Key is believed
Breath carries out processing and generates encrypted message;Unlock instruction is generated according to encrypted message to unlock to control;To solve identification equipment
It is exposed and vulnerable to destroying and the problem of high equipment cost, while the process for generating audio-frequency information is encrypted by voice messaging,
Intelligent lock cipher is prevented to be easy the problem of being cracked.
With reference to attached drawing 11, a kind of structural block diagram of the device of password unlock is proposed for the present invention, the device of password unlock is answered
For in above-mentioned smart machine comprising:
Sound reception unit 01, for receiving external voice;
External voice can be understood as including any of the above-described key information as described in the examples, or also comprising intelligence
Ambient noise is locked, excellent key information of the invention is white noise.
Key handling unit 02, for being handled external voice to obtain key information;
Key handling unit 02 can first amplify external voice, clearly to identify that key sound and surrounding are miscellaneous
After sound, to obtain pure key sound.
Cryptography processing units 03 generate encrypted message for key information to be carried out processing;
In the embodiment of above-mentioned unlocking cipher generation method, key information can be by Crypted password information by encryption,
White noise made of modulation, and in the present embodiment, cryptography processing units 03 to white noise carry out back-modulation (as demodulating),
Decryption, to obtain encrypted message.
Unlocking unit 04 generates unlock instruction according to encrypted message and is unlocked with controlling.
After cryptography processing units 03 generate encrypted message, which match testing with preset password information
Card, if they are the same, then unit 04 of unlocking generate unlock instruction, such as: encrypted message is " abc123 ", and preset password information is
" abc123 ", after matching comparison, the two is identical, then unit 04 of unlocking generates unlock instruction, and smart lock makes according to unlock instruction
Control smart lock is unlocked.
In one embodiment, cryptography processing units 03 include:
Cipher key decryption block to form unlock voice for key information to be decrypted.
Key information is that voice is modulated processing, semantic processes make semantic and original real unlocking cipher to unlocking
It is corresponding but not identical, in the present embodiment, smart lock by the interior audio analysis program prestored analyze key information whether be by
The audio that frequency is 0.3~3.4KHZ is defined as low frequency audio by the audio that modulation treatment is crossed, the present invention, and frequency is 10~
The audio of 15KHZ is defined as high-frequency audio, when it is low frequency audio or high-frequency audio that audio analysis program, which analyzes key information,
Cipher key decryption block can determine that key information is that normal person or smart lock not can recognize its semantic audio, at this time to key information
It is modulated and is handled by decipherment algorithm, unlock voice is parsed from key information, so as to normal person or intelligence
Lock can identify its semanteme.
Speech processing module is unlocked, forms encrypted message for carrying out processing to unlock voice;
Because unlock voice is the form of audio, unlock speech processing module converts the unlock speech processes of audio form
In the encrypted message of textual form.Specifically, unlock speech processing module semantics recognition unlocks voice, by above-mentioned unlock voice solution
It is translated into the encrypted message of textual form.
In one embodiment, unlock speech processing module includes:
Sound demodulation submodule, for being demodulated to key information to parse encryption unlock sound;
Key information in the present embodiment is normal person or smart lock directly can not normally identify its semantic low frequency audio
Or high-frequency audio, therefore need that key information is carried out demodulation by sound demodulation submodule herein to restore to be generated as normal person or intelligence
Encryption unlock sound that directly can normally identify that it is semantic can be locked.For example, key information is buzzing or white noise, give birth to afterwards upon mediation
It is that normal person directly can normally identify its semanteme, intelligence at the audio that encryption unlock sound is the audio of " ABC ", and is somebody's turn to do " ABC "
Lock by speech recognition software can also Direct Recognition to go out its semantic.
Decipherment algorithm submodule corresponding prestores decipherment algorithm for judging whether clear crytpographic key information has;
Key information obtains after being encrypted for unlocking cipher information by the corresponding Encryption Algorithm of Crypted password information
The encryption unlock sound arrived, the present embodiment is the process reversely decrypted to key information.Specifically, smart lock analysis encryption
Whether unlock sound and the decipherment algorithm prestored are identical, if they are the same, execute lower step.Wherein, it is prestored in the algorithms library of smart lock
Have multiple encryptions unlock sound and with its one-to-one decipherment algorithm.Reach the public affairs of judgement selection decryption in this manner
Formula promotes the safety of password.
Speech production submodule is unlocked, if so, being decrypted encryption unlock sound to solve according to the decipherment algorithm prestored
Unlock voice is precipitated.
Encryption unlock sound can carry out the information that semantic processes are crossed to be encrypted algorithm, so in the present embodiment, if intelligence
Can lock determine encryption unlock sound have it is corresponding prestore decipherment algorithm, then by prestore decipherment algorithm to encryption unlock sound carry out
Decryption, to obtain the unlock voice of openable smart lock.Specifically, encryption unlock sound is, for example, " ABC " audio, through correspondence
Prestore decipherment algorithm decryption after generate " 123 " unlock voice.
In another embodiment, unlock speech processing module includes:
Text submodule changes into text unlocking cipher for that will unlock voice;
Text submodule is stored with the speech recognition program of 0~9 specific voice (or nonspecific voice), by audio form
Unlock speech recognition be translated as the text unlocking cipher of textual form.
Whether matching verifying submodule, match for analyzing text unlocking cipher with default unlocking cipher;
Matching verifying submodule in prestore unlocking cipher and with the one-to-one text unlocking cipher of the unlocking cipher.
Text decision sub-module, if text unlocking cipher is determined as encrypted message for matching.
Text decision sub-module is by matching text unlocking cipher with default unlocking cipher, if successful match,
Unlock instruction is generated, the unlocking of smart lock is carried out.
In yet another embodiment, unlock speech processing module includes:
Whether voice submodule matches for analyzing unlock voice with default unlocking voice;
Specifically, whether the vocal print that voice submodule can analyze unlock voice matches with the vocal print of default unlocking voice,
Whether the audio band that also can analyze the audio band and default unlocking voice of unlock voice coincide.
Unlock voice is determined as encrypted message if matching by voice decision sub-module.
In one embodiment, cipher key unit 02 includes:
Key enhances module, for carrying out enhancing processing to external voice to obtain key information;
Enhancing processing includes any one or more processing of filtering processing, sound enhanced processing or sound equalization processing.
Further, cipher key unit 02 includes:
Enhance module, enhancing processing is carried out to obtain enhancing key to external voice;
Enhancing module carries out enhancing processing to external voice, obtains enhancing key, and enhancing key is treated key
Information.
Enhance cipher key match module, for judge enhancing key whether with the cipher key match that prestores;
Enhance key determination module, if determining that enhancing key is key information for matching.
In one embodiment, the device of password unlock includes:
Enabled instruction acquiring unit, for obtaining the unlock enabled instruction of user's input;
Quiet reminding unit, for generating for reminding user to keep pacifying within a preset time according to unlock enabled instruction
Quiet voice reminder information, and start reception external voice.
Purpose is to remind user to keep quite within a preset time when terminal device exports key sound, above-mentioned default
Time is preferably 1 second to 10 seconds.
In another embodiment, smart lock is equipped with key, after user presses the button, obtains unlock enabled instruction.
With reference to attached drawing 12, it is the structural block diagram of terminal device provided by the invention, including memory 11 and processor 21, deposits
Computer program 12 is stored in reservoir 11, processor 21 realizes above-mentioned unlocking cipher generation method when executing computer program 12
The step of.
The step of executing unlocking cipher generation method by terminal device, step includes:
Obtain the encrypted message of user's input;
Encrypted message is subjected to processing and generates key information;
Output key information is so that smart lock identifies and unlocks.
Terminal device obtains the encrypted message of user's input, and encrypted message is carried out processing and generates key information, is exported close
Key information is to smart lock, so that smart lock identifies and unlocks, thus solve identification equipment it is exposed and vulnerable to destroying and
The problem of high equipment cost, while the process for generating audio-frequency information is encrypted by voice messaging, prevent intelligent lock cipher to be easy
The problem of being cracked.
The present invention also provides terminal device readable storage medium storing program for executing, are stored thereon with computer program, and computer program is located
Reason device realizes the step of unlocking cipher generation method of above-mentioned password unlock when executing.
With reference to attached drawing 13, it is the structural block diagram of smart machine provided by the invention, including memory 22 and processor 21, deposits
Computer program 13 is stored in reservoir 21, processor 22 realizes the method for above-mentioned password unlock when executing computer program 13
Step.
The step of executing unlocking cipher generation method by smart machine, step includes:
Receive external voice;
The external voice is handled to obtain key information;
Key information is subjected to processing and generates encrypted message;
Unlock instruction is generated according to the encrypted message to unlock to control.
Smart machine receives external voice, and identifies whether external voice has key information;If external voice is with close
Key information, then decryption key information is to obtain digital audio;Judge digital audio whether with preset number information matches;If digital
Sound and preset number information matches then generate unlock instruction, and unlock instruction is for instructing intelligent door lock to unlock;To solve
It identifies that equipment is exposed vulnerable to destroying and the problem of high equipment cost, while being encrypted by voice messaging and generating audio-frequency information
Process, prevent intelligent lock cipher to be easy the problem of being cracked.
The present invention also provides a kind of smart lock readable storage medium storing program for executing, are stored thereon with computer program, computer program quilt
Processor realizes the step of method of above-mentioned password unlock when executing.
With reference to attached drawing 14, the structural block diagram for the intelligent unlocking system that the present invention also proposes, as seen from the figure, intelligent unlocking system
Applied to intelligent terminal and smart machine, intelligent terminal is used to execute the unlocking cipher generation side in above-mentioned any one embodiment
Method, the method that smart machine is used to execute the password unlock in above-mentioned any one embodiment, for example, intelligent unlocking system includes:
Intelligent terminal obtains the encrypted message of user's input;
Encrypted message is carried out processing and generates key information by intelligent terminal;
Intelligent terminal exports key information so that smart lock identifies and unlocks.
The received external voice of smart machine, external voice are at least partly exported by intelligent terminal;
Smart machine is handled external voice to obtain the key information of intelligent terminal output;
Key information is carried out processing and generates encrypted message by smart machine;
Smart machine generates unlock instruction according to encrypted message and is unlocked with controlling.
It is the realization principle block diagram of intelligent unlocking system proposed by the present invention with reference to attached drawing 15, specific real-time mode is above-mentioned
It has been described, therefore does not repeat them here.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (10)
1. a kind of unlocking cipher generation method is applied to intelligent terminal, which is characterized in that comprising steps of
Obtain the encrypted message of user's input;
The encrypted message is subjected to processing and generates key information;
The key information is exported so that smart machine identifies and carry out control unlocking.
2. unlocking cipher generation method according to claim 1, which is characterized in that it is described will be at the encrypted message
Managing the step of generating key information includes:
Processing is carried out to encrypted message and forms unlock voice;
To the unlock voice encryption and handle the generation key information.
3. unlocking cipher generation method according to claim 2, which is characterized in that the encrypted message includes unlocking cipher
Information and Crypted password information.Described pair of unlock voice encryption generates the step of key information and includes:
Whether judgement plus the close encrypted message have corresponding Encryption Algorithm;
If so, being encrypted according to the corresponding Encryption Algorithm of the Crypted password information to the unlocking cipher information and handling life
At key information.
4. unlocking cipher generation method according to claim 3, which is characterized in that the key information is key sound,
It is described the unlocking cipher information is encrypted according to the Crypted password information corresponding Encryption Algorithm it is described close to generate
The step of key information includes:
Transfer the corresponding Encryption Algorithm of the Crypted password information;
Encryption is carried out to the unlocking cipher information according to the Encryption Algorithm and generates encryption unlock sound;
Encryption unlock sound is modulated and generates the key sound.
5. unlocking cipher generation method according to claim 2, which is characterized in that the encrypted message is speech cipher letter
Breath, it is described to the encrypted message carry out processing formed digital speech the step of include:
Identify the voice unlocking cipher in the speech cipher information;
The voice unlocking cipher is changed into text unlocking cipher;
Analyze whether the text unlocking cipher matches with default unlocking cipher;
If matching, changes into the unlock voice for text unlocking cipher.
6. unlocking cipher generation method according to claim 1, which is characterized in that the encrypted message includes text password
Information and Crypted password information, the key information include key sound.It is described by the encrypted message carry out processing generate it is close
The step of key information includes:
Judge whether the Crypted password information has corresponding Encryption Algorithm;
If so, transferring the corresponding Encryption Algorithm of the Crypted password information;
Encryption is carried out to the text password information according to the Encryption Algorithm and generates text key;
The text key is modulated and generates the key sound.
7. unlocking cipher generation method according to claim 1, which is characterized in that it is described according to the Encryption Algorithm to institute
Include: before stating the step of text password information carries out encryption generation text key
Analyze whether the text password information matches with default unlocking cipher.
8. a kind of unlocking cipher generating means characterized by comprising
Encrypted message acquiring unit, for obtaining the encrypted message of user's input;
Key information generation unit generates key information for the encrypted message to be carried out processing;
Private key information output unit, for exporting the key information so that smart machine identifies and carry out control unlocking.
9. a kind of terminal device, including memory and processor, it is stored with computer program in the memory, feature exists
In the processor realizes unlocking cipher generation method described in any one of claims 1 to 7 when executing the computer program
The step of.
10. a kind of intelligent unlocking system, which is characterized in that be applied to terminal device and smart machine, the terminal device executes
Unlocking cipher generation method described in any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910049881.9A CN109840974A (en) | 2019-01-18 | 2019-01-18 | Unlocking cipher generation method, device, terminal device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910049881.9A CN109840974A (en) | 2019-01-18 | 2019-01-18 | Unlocking cipher generation method, device, terminal device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109840974A true CN109840974A (en) | 2019-06-04 |
Family
ID=66883915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910049881.9A Pending CN109840974A (en) | 2019-01-18 | 2019-01-18 | Unlocking cipher generation method, device, terminal device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109840974A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114005208A (en) * | 2021-12-30 | 2022-02-01 | 深圳灏鹏科技有限公司 | Access control method, device, equipment and storage medium |
CN114582054A (en) * | 2022-03-09 | 2022-06-03 | 浙江钟铮锁业有限公司 | Key feedback method applied to coded lock |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103402203A (en) * | 2013-07-30 | 2013-11-20 | 深圳市中兴移动通信有限公司 | Biological recognition-based rapid access method and device |
CN103684773A (en) * | 2012-09-24 | 2014-03-26 | 国民技术股份有限公司 | Secret lock device, portable terminal and audio unlocking method based on portable terminal |
CN103761779A (en) * | 2013-11-29 | 2014-04-30 | 北京国信灵通网络科技有限公司 | Mobile terminal and control method for electronic lock at mobile terminal |
JP5522875B1 (en) * | 2013-06-28 | 2014-06-18 | 楽天株式会社 | Information processing method, portable device, and information processing program |
CN104103110A (en) * | 2014-07-11 | 2014-10-15 | 孙景鑫 | Voice-activated lock and unlocking method thereof |
CN105303659A (en) * | 2015-10-10 | 2016-02-03 | 深圳市雨滴科技有限公司 | Method and device for identifying access control identity based on ultrasonic waves |
CN105374090A (en) * | 2014-09-02 | 2016-03-02 | 冯林 | Lock and unlocking method based on mobile terminal |
CN105577361A (en) * | 2015-04-20 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method and device thereof |
CN105809790A (en) * | 2016-03-10 | 2016-07-27 | 上海斐讯数据通信技术有限公司 | Acoustic wave lock system and automatic unlocking method |
CN105869244A (en) * | 2016-03-31 | 2016-08-17 | 青岛歌尔声学科技有限公司 | Voice cipher unlocking method and cipher lock |
CN106447835A (en) * | 2016-07-25 | 2017-02-22 | 罗新亮 | Door lock sound wave control system and method |
CN106548548A (en) * | 2016-08-16 | 2017-03-29 | 中山微宇电器科技有限公司 | An unlocking method of an intelligent lock and an intelligent lock system |
CN106714170A (en) * | 2015-11-13 | 2017-05-24 | 深圳市光峰光电技术有限公司 | Projection device, user terminal, and method for accessing projection device into local area network |
CN207611426U (en) * | 2017-12-25 | 2018-07-13 | 上海跃众文化传媒有限公司 | A kind of electronic lock, electronic lock system |
-
2019
- 2019-01-18 CN CN201910049881.9A patent/CN109840974A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103684773A (en) * | 2012-09-24 | 2014-03-26 | 国民技术股份有限公司 | Secret lock device, portable terminal and audio unlocking method based on portable terminal |
JP5522875B1 (en) * | 2013-06-28 | 2014-06-18 | 楽天株式会社 | Information processing method, portable device, and information processing program |
CN103402203A (en) * | 2013-07-30 | 2013-11-20 | 深圳市中兴移动通信有限公司 | Biological recognition-based rapid access method and device |
CN103761779A (en) * | 2013-11-29 | 2014-04-30 | 北京国信灵通网络科技有限公司 | Mobile terminal and control method for electronic lock at mobile terminal |
CN104103110A (en) * | 2014-07-11 | 2014-10-15 | 孙景鑫 | Voice-activated lock and unlocking method thereof |
CN105374090A (en) * | 2014-09-02 | 2016-03-02 | 冯林 | Lock and unlocking method based on mobile terminal |
CN105577361A (en) * | 2015-04-20 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method and device thereof |
CN105303659A (en) * | 2015-10-10 | 2016-02-03 | 深圳市雨滴科技有限公司 | Method and device for identifying access control identity based on ultrasonic waves |
CN106714170A (en) * | 2015-11-13 | 2017-05-24 | 深圳市光峰光电技术有限公司 | Projection device, user terminal, and method for accessing projection device into local area network |
CN105809790A (en) * | 2016-03-10 | 2016-07-27 | 上海斐讯数据通信技术有限公司 | Acoustic wave lock system and automatic unlocking method |
CN105869244A (en) * | 2016-03-31 | 2016-08-17 | 青岛歌尔声学科技有限公司 | Voice cipher unlocking method and cipher lock |
CN106447835A (en) * | 2016-07-25 | 2017-02-22 | 罗新亮 | Door lock sound wave control system and method |
CN106548548A (en) * | 2016-08-16 | 2017-03-29 | 中山微宇电器科技有限公司 | An unlocking method of an intelligent lock and an intelligent lock system |
CN207611426U (en) * | 2017-12-25 | 2018-07-13 | 上海跃众文化传媒有限公司 | A kind of electronic lock, electronic lock system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114005208A (en) * | 2021-12-30 | 2022-02-01 | 深圳灏鹏科技有限公司 | Access control method, device, equipment and storage medium |
CN114005208B (en) * | 2021-12-30 | 2022-03-18 | 深圳灏鹏科技有限公司 | Access control method, device, equipment and storage medium |
CN114582054A (en) * | 2022-03-09 | 2022-06-03 | 浙江钟铮锁业有限公司 | Key feedback method applied to coded lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8699944B2 (en) | Device pairing using device generated sound | |
CN105303659B (en) | A kind of gate inhibition's personal identification method and device based on ultrasonic wave | |
EP1481535B1 (en) | System and method for wireless two factor authentication | |
US8730009B2 (en) | Smart card and mobile communication device comprising the smart card | |
WO2017152815A1 (en) | Identity authentication method and system | |
CN109830013A (en) | Method, apparatus, smart machine and its system of password unlock | |
CN104851164B (en) | Intelligent lock with biological feature recognition function and control method thereof | |
CN105939197A (en) | Identity authentication method and system | |
CN106463120B (en) | Method and device for identifying or authenticating people and/or objects through dynamic acoustic safety information | |
CN104709238A (en) | Vehicle remote control method and mobile device | |
US20060267860A1 (en) | Device pairing via human initiated contact | |
CN102412970A (en) | Pervasive-network-oriented remote identity authentication system and method | |
CN105205894A (en) | An access control-based audio recognition method and an audio recognition access control system | |
CN109600343A (en) | Control method, device, mobile terminal, vehicle and the remote server of vehicle | |
CN109840974A (en) | Unlocking cipher generation method, device, terminal device and system | |
CN104660307B (en) | Based near field magnetic relaying and the soft replacement encrypted wireless communication system of user | |
CN104734750B (en) | Shield and its method of work, Mobile terminal signature method, mobile terminal and system | |
CN104929443B (en) | Smart lock and its method for unlocking and device | |
CN109671192A (en) | A kind of method and earphone using earphone unlock intelligent door lock | |
JP2001241229A (en) | Keyless entry system | |
JP2002112340A (en) | Personal authentication system for mobile device and its method | |
WO2018028308A1 (en) | Method, system, and unlocking device for device unlocking and device to be unlocked | |
CN107978049A (en) | Control method and device, the vehicle of smart lock | |
KR100971443B1 (en) | Recognition system and method using mobile communication terminal | |
CN106447835A (en) | Door lock sound wave control system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190604 |