[go: up one dir, main page]

CN109840974A - Unlocking cipher generation method, device, terminal device and system - Google Patents

Unlocking cipher generation method, device, terminal device and system Download PDF

Info

Publication number
CN109840974A
CN109840974A CN201910049881.9A CN201910049881A CN109840974A CN 109840974 A CN109840974 A CN 109840974A CN 201910049881 A CN201910049881 A CN 201910049881A CN 109840974 A CN109840974 A CN 109840974A
Authority
CN
China
Prior art keywords
information
encrypted message
key
unlocking cipher
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910049881.9A
Other languages
Chinese (zh)
Inventor
张立新
周毕兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Water World Co Ltd
Original Assignee
Shenzhen Water World Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Water World Co Ltd filed Critical Shenzhen Water World Co Ltd
Priority to CN201910049881.9A priority Critical patent/CN109840974A/en
Publication of CN109840974A publication Critical patent/CN109840974A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of unlocking cipher generation method, device, terminal device and systems, wherein method includes the encrypted message that terminal device obtains user's input, encrypted message is subjected to processing and generates key information, key information is exported to smart lock, so that smart lock identifies and unlocks, to solve the problems, such as that identification equipment is exposed vulnerable to destroying and high equipment cost, while the process of audio-frequency information of generating is encrypted by voice messaging, intelligent lock cipher is prevented to be easy the problem of being cracked.

Description

Unlocking cipher generation method, device, terminal device and system
Technical field
The present invention relates to intelligent unlocking fields, in particular to be a kind of unlocking cipher generation method, device, terminal device and System.
Background technique
At present smart lock input key and the mode that unlocks have very much, as recognition of face, iris recognition, fingerprint recognition and Password identification, benefit be do not need additionally to wear key or unlocking device, the disadvantage is that the equipment of input be it is exposed, vulnerable to broken It is bad;And the existing unlocking manner using NFC or RFID, solve the problems, such as equipment it is exposed and vulnerable to destroy, but need user with Body wears solution lock key, and also has the technical issues of at high cost, to be easily cracked and copied.
Summary of the invention
The purpose of the present invention aim to solve the problem that identification apparatus it is exposed and vulnerable to destruction, high equipment cost and be easy The problem of being cracked, and a kind of unlocking cipher generation method, device, terminal device and system are provided.
To achieve the above object, the invention provides the following technical scheme:
The present invention proposes a kind of unlocking cipher generation method, is applied to intelligent terminal, comprising steps of
Obtain the encrypted message of user's input;
The encrypted message is subjected to processing and generates key information;
The key information is exported so that smart lock identifies and carry out control unlocking.
The present invention proposes that a kind of unlocking cipher generating means include:
Encrypted message acquiring unit, for obtaining the encrypted message of user's input;
Key information generation unit generates key information for the encrypted message to be carried out processing;
Private key information output unit, for exporting the key information so that smart machine identifies and carry out control unlocking.
The present invention proposes a kind of terminal device, including memory and processor, is stored with computer journey in the memory The step of sequence, the processor realizes above-mentioned unlocking cipher generation method when executing the computer program.
The present invention also proposes a kind of terminal device readable storage medium storing program for executing, is stored thereon with computer program, the computer The step of unlocking cipher generation method of the upper password unlock is realized when program is executed by processor.
The present invention provides a kind of unlocking cipher generation method, device, terminal device and storage mediums, have beneficial below Effect:
Terminal device obtains the encrypted message of user's input, and encrypted message is carried out processing and generates key information, is exported close Key information is to smart lock, so that smart lock identifies and carries out control unlocking, thus solve identification equipment it is exposed and vulnerable to broken The problem of bad and high equipment cost, while the process for generating audio-frequency information is encrypted by voice messaging, prevent intelligent lock cipher It is easy the problem of being cracked.
Detailed description of the invention
Fig. 1 is the flow diagram of the unlocking cipher generation method of one embodiment of the invention;
Fig. 2 is the flow diagram of the unlocking cipher generation method of another embodiment of the present invention;
Fig. 3 is the flow diagram of the unlocking cipher generation method of another embodiment of the invention;
Fig. 4 is the flow diagram of the unlocking cipher generation method of another embodiment of the invention;
Fig. 5 is the flow diagram of the unlocking cipher generation method of another embodiment of the invention;
Fig. 6 is the structural block diagram of the unlocking cipher generating means of one embodiment of the invention;
Fig. 7 is the flow diagram for the method that the password of one embodiment of the invention unlocks;
Fig. 8 is the flow diagram for the method that the password of another embodiment of the present invention unlocks;
Fig. 9 is the flow diagram of the method for the password unlock of another embodiment of the invention;
Figure 10 is the flow diagram of the method for the password unlock of another embodiment of the invention;
Figure 11 is the structural block diagram for the device that the password of one embodiment of the invention unlocks;
Figure 12 is the structural block diagram of the terminal device of one embodiment of the invention;
Figure 13 is the structural block diagram of the smart lock of one embodiment of the invention;
Figure 14 is the structural block diagram of the smart lock unlocking system of one embodiment of the invention;
Figure 15 is the functional block diagram of the smart lock unlocking system of one embodiment of the invention.
The embodiments will be further described with reference to the accompanying drawings for realization, functional characteristics and advantage for the purpose of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.Base Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its His embodiment, shall fall within the protection scope of the present invention.
The present invention proposes a kind of unlocking cipher generation method, is applied to terminal device, and terminal device can be mobile phone, put down Plate, wearable device, computer, intelligent sound, intelligent robot, intelligent vehicle-carried etc. are unlocking cipher generation method with reference to attached drawing 1 Flow diagram, the present invention provides a kind of unlocking cipher generation method, comprising steps of
S100 obtains the encrypted message of user's input;
Terminal device obtains the encrypted message of user's input, and above-mentioned encrypted message can be to be believed by the biology of detection user Breath is identified and is analyzed and acquired, can also be defeated by the physical button or display screen that receive user's operation terminal device The information entered acquires in turn, and biological information is for example including face, iris, fingerprint, voice etc..Specifically, terminal device can To prestore biological information mapping library corresponding with encrypted message, after terminal device detects the biological information of user, to this Biological information is identified, and corresponding encrypted message is obtained from mapping library according to the obtained biological information after identification, if It gets and enters next step S200, obtain less than then issuing prompt.Encrypted message of the invention includes voice messaging, text letter One of breath, digital information, symbolic information, graphical information are a variety of, wherein voice messaging is audio, digital information be Ah Arabic numbers, text information can be letter, text, and symbolic information is spcial character etc., and mixing complex information can be above-mentioned The combination not of the same race of digital information and text information.
Encrypted message is carried out processing and generates key information by S200;
Terminal device of the invention can be encrypted encrypted message, to generate key information.Pass through symmetrical expression Encrypted message is encrypted in Encryption Algorithm, it is preferred to use SM4 (Encryption Algorithm used in WAPI wireless network standards) Encrypted message is encrypted.After Crypted password information, terminal device obtains key information.If directly will be close by terminal device Code information plays out, and is received by smart lock, and in the process, safety is too low, other people can directly know encrypted message, Therefore terminal device is needed to encrypt encrypted message, achieve the effect that prevent encrypted message from divulging a secret.It can be seen from the above, message in cipher Breath includes any one of digital information, text information, mixing complex information, such as: digital information " 123 ", text information " A123 " Or mixing complex information "@A123 " encrypts encrypted message by using SM4 or SM7, to reach the above-mentioned password of encryption The effect of information.
In another embodiment, present invention proposition is related to a kind of language encryption application software on the terminal device, above-mentioned Language encrypts application software and executes key information generation for assisting, such as: user touches the screen of terminal device to press language The encrypted message that starting sound-recording function in speech encryption application software is recorded and identified with the voice to user It carries out encryption and generates key information.
S300 exports key information so that smart machine identifies and carry out control unlocking.
Smart machine can be smart lock or terminal device, and smart lock can be intelligent door lock, intelligent padlock, terminal device It can be mobile phone, plate, wearable device, computer, intelligent sound, intelligent robot, intelligent vehicle-carried, intelligent appliance etc., be applied to Terminal device is mainly used for password just openable application is provided with, for example, device password booting application and other APP are answered With etc.), for convenience of understanding, now it is illustrated by taking smart lock as an example.In the present embodiment, terminal device broadcasts key information It puts, it is control smart lock unlocking after matched password that smart lock, which receives the key information discriminance analysis,.The key information can be Normal person can directly understand its semantic password sound, for example, the sound of " 123 " or " ABC ", or normal person cannot It is enough directly to understand its semantic password sound, for example, buzzing or white noise.
In another embodiment, if user stays out, but user allows guest to enter room, then first terminal equipment Key information is sent to second terminal equipment (terminal device of guest) by (terminal device of owner), and second terminal equipment can incite somebody to action Key information plays out, to be unlocked after smart lock receives key information, it will be understood that first terminal equipment can lead to It crosses the modes such as QQ, wechat and key information is sent to second terminal equipment.By this embodiment, smart lock is reached without being equipped with The effect of more keys.Wherein, first terminal equipment can be mobile phone, plate, wearable device, computer, intelligent sound, intelligent machine Device people, intelligent vehicle-carried etc., and second terminal can be mobile phone, plate, wearable device etc., wearable device is for example are as follows: wrist-watch, hand Ring, intelligent glasses, intelligent shoe etc..
In yet another embodiment, user is when inputting encrypted message to terminal device, other people around user in order to prevent Encrypted message is eavesdropped, proposes a kind of mode of key text generation audio-frequency information.Mode step is that it is defeated that terminal device obtains user The text information entered, terminal device according to text information generate the second encrypted message, according to Handshake Protocol bind text information with Second encrypted message, terminal device export the second audio-frequency information;According to aforesaid way, realize user pass through it is defeated to terminal device Enter text, is also able to achieve the effect of smart lock unlocking.
With reference to attached drawing 2 it is the flow diagram of another embodiment of unlocking cipher generation method, and encrypted message is carried out Processing generate key information step S200 include:
S210 carries out processing to encrypted message and forms unlock voice;
The present embodiment encrypted message is chosen as the text information that user is manually entered, and terminal device text information carries out language Sound processing, is converted to unlock voice for text information.
S220 to unlock voice encryption and handles generation key information.
Unlock voice is encrypted, the mode of encryption can be to carry out semantic processes to semanteme by Encryption Algorithm.Solution Lock voice is that can carry out language to unlock voice by Encryption Algorithm by conventional semantic understanding, the present invention after normal person hears After justice processing, the key information of terminal device final output can make normal person that can not directly distinguish its original semanteme, thus may be used The safety of password is improved,
Specifically, the output form of key information can be exported for the form of white noise, distinguish normal person can not It is semantic, guarantees that key information is not leaked, and the sound frequency that normal person can hear is the low frequency of 20HZ and the high frequency of 20KHZ, White noise of the invention includes low frequency audio and high-frequency audio, and the frequency of low frequency audio of the present invention is 0.3~3.4KHZ, high frequency audio The frequency of frequency is 10~15KHZ, it will be understood that terminal device exports the minimum 0.3KHZ of audio frequency of white noise, up to 15KHZ.The present invention limits the frequency band of white noise output, and to reduce bit error rate when sound transmission, terminal device will be with white noise The key information of form output propagates to smart lock, so that smart lock is opened according to the key information that white noise form exports Lock, white noise form makes normal person that can not understand unlocking cipher, and in such a way that such audio is propagated, makes the appearance of smart lock Face only needs to be arranged radio reception/broadcast hole, can both complete unlocking work, without installing the identifications such as keyboard, fingerprint, iris dress It sets, improve safety while also reducing cost.
With reference to the flow diagram for another embodiment that attached drawing 3 is unlocking cipher generation method, encrypted message includes opening Lock cipher information and Crypted password information.Include: to the step S220 for unlocking voice encryption generation key information
S221, judges whether Crypted password information has corresponding Encryption Algorithm;
Unlocking cipher information is the encrypted message of unencryption that user input to terminal device, Crypted password information for for Starting Encryption Algorithm encrypts the encrypted message of above-mentioned unlocking cipher information, and Crypted password information understandable is that user sets to terminal When standby input encrypted message, the Encryption Algorithm of user's selection.Unlocking cipher information and Crypted password information digital all can be believed Breath, text information, any one for mixing complex information.
S222, if so, being encrypted and being handled according to the corresponding Encryption Algorithm dual lock encrypted message of Crypted password information Generate key information.
If terminal device, which analyzes Crypted password information, does not have corresponding Encryption Algorithm, prompt information is issued, or random Selection Encryption Algorithm dual lock encrypted message is encrypted to generate key information.
In another embodiment, key information can be key sound, and according to the corresponding encryption of Crypted password information Algorithm dual lock encrypted message encrypted and handle generate key information step S222 include:
S2221 transfers the corresponding Encryption Algorithm of Crypted password information;
Prestored in terminal device multiple Crypted password information and with its one-to-one Encryption Algorithm, different encryptions is close The function of the corresponding Encryption Algorithm of code information is different, for example, Crypted password information is 456, the function of Encryption Algorithm is that will unlock Encrypted message changes into letter.
S2222 carries out encryption according to Encryption Algorithm dual lock encrypted message and generates encryption unlock sound;
It for convenience of understanding, is shown with citing, the unlocking cipher information that terminal device obtains the unencryption of user's input is " 123 ", Crypted password information are " 456 ", and terminal device transfers corresponding Encryption Algorithm according to " 456 ", if the function of Encryption Algorithm Can be for unlocking cipher information be changed into letter, terminal device is then encrypted " 123 " to obtain the text of " ABC ", and is generated and added Close unlock sound, the i.e. audio of " ABC ".
S2223 is modulated encryption unlock sound and generates key sound.
Terminal device is modulated encryption unlock sound and generates key sound, i.e., as above-mentioned, carries out language to " ABC " audio Justice is further processed, and obtains the white noise that key sound is " ABC ".
It is the flow diagram of one embodiment of unlocking cipher generation method with reference to attached drawing 4, encrypted message is that voice is close Code information, the step S210 for carrying out processing formation unlock voice to encrypted message include:
S211 identifies the voice unlocking cipher in speech cipher information;
In this embodiment, encrypted message is the speech cipher information that user inputs to terminal device voice, terminal device The processing modes such as logical amplification, filtering remove noise to identify the voice unlocking cipher in speech cipher information, such as: terminal Equipment receives the noise that user speech input includes " 123 " voice and user surrounding environment, the logical amplification of terminal device, filtering Etc. the noise for removing user surrounding environment to obtain " 123 " voice.
Voice unlocking cipher is changed into text unlocking cipher by S212;
I.e. such as: by " 123 " of above-mentioned speech form, being converted to the 123 of text (i.e. text) form.
Whether S213, analysis text unlocking cipher match with default unlocking cipher;
To be further ensured that encrypted message will not be revealed, default unlocking cipher is previously set in terminal device in user, is being obtained After the voice unlocking cipher for getting user's input, voice unlocking cipher is identified, text unlocking cipher, subsequent terminal are obtained Equipment judges whether text unlocking cipher matches with default unlocking cipher.
S214, if matching, changes into unlock voice for text unlocking cipher.
It is above explained to be, text is converted speech into, verify by text and pre-set text, it is correct in verifying Afterwards, convert text to voice again, i.e. text unlocking cipher is changed into unlock voice by terminal device, the unlock voice be temporarily not Encryption, and non-semantic processes.
It is the flow diagram of unlocking cipher generation method In yet another embodiment with reference to attached drawing 5, encrypted message includes Text password information and Crypted password information, key information include key sound.Encrypted message is subjected to processing and generates key letter The step S200 of breath includes:
S201, judges whether Crypted password information has corresponding Encryption Algorithm;
S202, if so, transferring the corresponding Encryption Algorithm of Crypted password information;
S203 carries out encryption to text password information according to Encryption Algorithm and generates text key;
S204 is modulated text key and generates key sound.
Above-mentioned S201 and S220 principle is identical, S202 is identical as S2221 principle, and this will not be repeated here.Text password information Inputted from user to the screen key of terminal device comprising text information, digital information, symbolic information, in graphical information It is one or more, it for convenience of understanding, is shown with citing, the unlocking cipher information that terminal device obtains the unencryption of user's input is " 123 ", Crypted password information are " 456 ", and whether terminal device have corresponding Encryption Algorithm according to " 456 ", if so, then transferring pair The Encryption Algorithm answered, if the function of Encryption Algorithm is that unlocking cipher information is changed into letter, terminal device is added " 123 " The close text key for obtaining " ABC ", and encryption unlock sound, the i.e. audio of " ABC " are generated, and carry out to " ABC " audio semantic It is further processed, is modulated into the white noise that key sound is " ABC ".In another embodiment, according to Encryption Algorithm to text Encrypted message carries out
Whether S400, analysis text password information match with default unlocking cipher.
Above-mentioned S400, identical as S213 principle, this will not be repeated here.
In another embodiment, before the step S300 that output key information identifies and unlocks for smart lock also Include: S201, compression preservation is carried out to key information.The advanced row of white noise is saved, when the user clicks the play button, then Execute step S300.This implementation can be by the audios lattice such as format of key information boil down to audio, such as WAV, WMA, MP3, AMR Formula.
In conclusion terminal device of the invention obtains the encrypted message of user's input, encrypted message is subjected to processing life At key information, key information is exported to smart lock, so that smart lock identifies and unlocks, to solve outside identification equipment Dew and vulnerable to destroying and the problem of high equipment cost, while the process of audio-frequency information is generated by voice messaging encryption, it is anti- Only intelligent lock cipher is easy the problem of being cracked, and improves the safety of password.
It is the structural block diagram of unlocking cipher generating means with reference to attached drawing 6, unlocking cipher generating means are applied to above-mentioned end End equipment comprising encrypted message acquiring unit 10, Key information generation unit 20, private key information output unit 30.
Encrypted message acquiring unit 10, for obtaining the encrypted message of user;
Terminal device obtains the encrypted message of user by encrypted message acquiring unit 10, and above-mentioned encrypted message can be logical The biological information for crossing detection user is identified and is analyzed and acquires, can also be by receiving user's operation terminal device Physical button or the information of display screen input acquire in turn, and biological information is for example including face, iris, fingerprint, voice etc.. Specifically, terminal device can prestore biological information mapping library corresponding with encrypted message, when terminal device passes through message in cipher After breath acquiring unit 10 detects the biological information of user, which is identified, and according to obtaining after identification Biological information obtains corresponding encrypted message from mapping library, if getting encrypted message, by Key information generation unit 20 Encrypted message is subjected to processing and generates key information, is obtained less than then issuing prompt.Encrypted message of the invention includes voice letter One of breath, text information, digital information, symbolic information, graphical information are a variety of, wherein voice messaging is audio, number Information is Arabic numerals, and text information can be letter, text, and symbolic information is spcial character etc., and mixing complex information can Think the combination not of the same race of above-mentioned digital information and text information.
Key information generation unit 20 generates key information for encrypted message to be carried out processing;
Terminal device is encrypted encrypted message by Key information generation unit 20, to generate key information. Encrypted message is encrypted by symmetry encryption algorithm, it is preferred to use SM4 is (used in WAPI wireless network standards Encryption Algorithm) encrypted message is encrypted.After Crypted password information, terminal device obtains key information.If directly by end End equipment plays out encrypted message, is received by smart lock, and in the process, safety is too low, other people can directly obtain Know encrypted message, therefore terminal device is needed to encrypt encrypted message, achievees the effect that prevent encrypted message from divulging a secret.By above-mentioned It is found that encrypted message includes any one of digital information, text information, mixing complex information, such as: digital information " 123 ", text Information " A123 " or mixing complex information "@A123 " encrypt encrypted message by using SM4 or SM7, add to reach The effect of close above-mentioned encrypted message.
In another embodiment, present invention proposition is related to a kind of language encryption application software on the terminal device, above-mentioned Language encrypts application software, executes key information generation method for assisting, such as: user touches the screen of terminal device to press Starting sound-recording function in lower language encryption application software is recorded with the voice to user, identifies to obtain encrypted message, then Encryption generates key information.
Private key information output unit 30, for exporting key information so that smart machine identifies and unlocks.
Terminal device is played out key information by private key information output unit 30, and smart lock receives the key information Discriminance analysis is control smart lock unlocking after matched password.The key information can directly can understand its semanteme for normal person Password sound, or normal person can not directly understand its semantic password sound.
In another embodiment, if user stays out, but user allows guest to enter room, then first terminal equipment Key information is sent to second terminal equipment (terminal device of guest) by (terminal device of owner), and second terminal equipment can incite somebody to action Key information plays out, to be unlocked after smart lock receives key information, it will be understood that first terminal equipment can lead to It crosses the modes such as QQ, wechat and key information is sent to second terminal equipment.By this embodiment, smart lock is reached without being equipped with The effect of more keys.Wherein, first terminal equipment can be mobile phone, plate, wearable device, computer, intelligent sound, intelligent machine Device people, intelligent vehicle-carried etc., and second terminal can be mobile phone, plate, wearable device etc., wearable device is for example are as follows: wrist-watch, hand Ring, intelligent glasses, intelligent shoe etc..
In yet another embodiment, user is when inputting encrypted message to terminal device, other people around user in order to prevent Encrypted message is eavesdropped, proposes a kind of mode of key text generation audio-frequency information.Mode step is that it is defeated that terminal device obtains user The text information entered, terminal device according to text information generate the second encrypted message, according to Handshake Protocol bind text information with Second encrypted message, terminal device export the second audio-frequency information;According to aforesaid way, realize user pass through it is defeated to terminal device Enter text, is also able to achieve the effect of smart lock unlocking.
In another embodiment, Key information generation unit 20 includes:
Speech processing module forms unlock voice for carrying out processing to encrypted message;
The present embodiment encrypted message is chosen as the text information that user is manually entered, and terminal device passes through speech processing module Text information carries out speech processes, and text information is converted to unlock voice.
Key production module, for generating key information to unlock voice encryption.
Unlock voice is encrypted by key production module, the mode of encryption can be to carry out at semanteme to semanteme Reason.Unlock voice is can be by conventional semantic understanding after normal person hears, the present invention is semantic by carrying out to unlock voice After processing, the key information of 30 final output of private key information output unit can make normal person that can not directly distinguish its semanteme, thus The safety that password can be improved is proposed, specifically, the output form of key information is that the form of white noise is exported, and makes normal person It can not distinguish its semanteme, guarantee that key information is not leaked, the output area of the white noise includes low frequency and high-frequency, wherein Low frequency is 0.3~3.4KHZ, and high-frequency is 10~15KHZ, it will be understood that terminal device exports the audio frequency of white noise most Low is 0.3KHZ, up to 15KHZ, the i.e. frequency band of limitation white noise output, and to reduce bit error rate when sound transmission, terminal is set It is standby that the key information exported in the form of white noise is propagated into smart lock, so that the key that smart lock is exported according to white noise form Information is unlocked, and in such a way that such audio is propagated, so that the outer surface of smart lock is only needed to be arranged radio reception/broadcast hole, both Unlocking work can be completed, without installing the identity recognition devices such as keyboard, fingerprint, iris, while reducing cost Improve safety.
In one embodiment, encrypted message includes unlocking cipher information and Crypted password information.Key production module packet It includes:
Encryption Algorithm judging submodule, for judging whether Crypted password information has corresponding Encryption Algorithm;
Unlocking cipher information is the encrypted message of unencryption that user input to terminal device, Crypted password information for for The encrypted message of above-mentioned unlocking cipher information is encrypted, and Crypted password information understandable inputs message in cipher to terminal device for user When breath, the Encryption Algorithm of user's selection.Unlocking cipher information and Crypted password information all can be digital information, text information, Mix any one of complex information.
Key generates submodule, for if so, according to the corresponding Encryption Algorithm dual lock encrypted message of Crypted password information It is encrypted to generate key information.
If nothing, terminal device issues prompt information, or random selection Encryption Algorithm dual lock encrypted message is encrypted To generate key information.
In another embodiment, key information can be key sound, and key generates submodule and includes:
Algorithm transfers subelement, for transferring the corresponding Encryption Algorithm of Crypted password information;
It is digitally generated encryption sub-unit operable, generates encryption unlock for carrying out encryption according to Encryption Algorithm dual lock encrypted message Sound;
It is shown with citing, encrypted message acquiring unit 10 obtains the unlocking cipher information of the unencryption of user's input, passes through Above-mentioned Encryption Algorithm dual lock encrypted message is encrypted, i.e., such as: unlocking cipher information is " 123 ", by Encryption Algorithm to this " 123 ", which are encrypted, to be obtained " ABC " and generates close digital audio, i.e. the audio of " ABC ".
Sound modulation subunit generates key sound for being modulated to encryption unlock sound.
Sound modulation subunit is modulated encryption unlock sound and generates key sound, i.e., as above-mentioned, to " ABC " audio Semantic processes are carried out, the white noise that key sound is " ABC " is obtained.
In another embodiment, encrypted message is speech cipher information, and speech processing module includes:
Unlocking cipher identifies submodule, for identification the voice unlocking cipher in speech cipher information;
In this embodiment, encrypted message is the speech cipher information that user inputs to terminal device voice, unlocking cipher Identification submodule identifies that submodule the processing modes such as amplifies, filters and removes noise to identify voice by unlocking cipher Voice unlocking cipher in encrypted message, such as: it includes " 123 " that encrypted message acquiring unit 10, which receives user speech input, Voice and with the sound such as the noise of user surrounding environment, unlocking cipher identifies that submodule passes through to sound using amplification, filtering Etc. processing modes remove the noise of ambient enviroment to obtain " 123 " voice.
Text conversion submodule, for voice unlocking cipher to be changed into text unlocking cipher;
I.e. such as: " 123 " of above-mentioned speech form are converted to the 123 of text (i.e. text) form by text conversion submodule.
Whether matched sub-block matches for analyzing text unlocking cipher with default unlocking cipher;
To be further ensured that encrypted message will not be revealed, default unlocking cipher is previously set to terminal device in user, close After code information acquisition unit 10 gets the voice unlocking cipher of user's input, it is close that unlocking cipher identifies that submodule unlocks to voice Code is translated, and obtains text unlocking cipher, and subsequent matched sub-block judge whether are text unlocking cipher and default unlocking cipher Matching.
Voice transform subblock turns text unlocking cipher if matching for text unlocking cipher with default unlocking cipher At unlock voice.
Above explained to be, voice transform subblock converts speech into text, passes through the progress of text and pre-set text Verifying after verifying is correct, converts text to voice, i.e. voice conversion submodule unlocks text after verifying is correct again Password changes into unlock voice, which is temporary unencryption, and non-semantic processes.
In one embodiment, encrypted message includes text password information and Crypted password information, and key information includes close Key sound.Key generating unit 20 includes:
Algorithm judgment module, for judging whether Crypted password information has corresponding Encryption Algorithm;
Algorithm transfers module, if having corresponding Encryption Algorithm for Crypted password information, it is corresponding to transfer Crypted password information Encryption Algorithm;
Algorithm for encryption module generates text key for carrying out encryption to text password information according to Encryption Algorithm;
Sound modulation module generates key sound for being modulated to text key.
Screen key input of the text password information from user to terminal device comprising text information, digital information, symbol One of number information, graphical information are a variety of.It for convenience of understanding, is shown with citing, encrypted message acquiring unit 10, which obtains, to be used The unlocking cipher information of the unencryption of family input is " 123 ", and Crypted password information is " 456 ", and algorithm judgment module is according to " 456 " Whether corresponding Encryption Algorithm is had, if so, algorithm for encryption module then transfers corresponding Encryption Algorithm, if the function of Encryption Algorithm is Unlocking cipher information is changed into letter, algorithm for encryption module is then encrypted " 123 " to obtain the text key of " ABC ", sound The text key of " ABC " is generated encryption unlock sound, the i.e. audio of " ABC " by modulation module, and is carried out to " ABC " audio semantic It is further processed, is modulated into the white noise that key sound is " ABC ".
With reference to attached drawing 7, the method that the present invention proposes a kind of unlock of password is applied to smart machine, which can be with For smart lock or terminal device, smart lock can be intelligent door lock, intelligent padlock, and terminal device can be mobile phone, plate, wearing Equipment, computer, intelligent sound, intelligent robot, intelligent vehicle-carried, intelligent appliance etc. are mainly used for applied to terminal device to setting It is equipped with password just openable application, for example, device password booting application and other APP application etc.), it is existing for convenience of understanding It is illustrated by taking smart lock as an example.Attached drawing 3 is the flow diagram of the method for password unlock, the method for password unlock of the invention Include:
S001 receives external voice;
External voice can be understood as including any of the above-described key information as described in the examples, or also comprising intelligence Ambient noise is locked, excellent key information of the invention is white noise.
S002 handles to obtain key information external voice;
This step can first amplify external voice, after clearly identifying key sound and ambient noise, then Ambient noise filters out, to obtain pure key information.
Key information is carried out processing and generates encrypted message by S003;
In the embodiment of above-mentioned unlocking cipher generation method, key information can be by Crypted password information by encryption, White noise made of modulation, and in the present embodiment, smart lock can carry out back-modulation (as demodulating), decryption to white noise, To obtain encrypted message.
S004 generates unlock instruction according to encrypted message and is unlocked with controlling.
After smart lock gets encrypted message, the encrypted message and preset password information are subjected to matching verifying, if It is identical, then smart lock generate unlock instruction, such as: encrypted message be " abc123 ", preset password information be " abc123 ", After comparison, the two is identical, generates unlock instruction, and smart lock controls smart lock according to unlock instruction and unlocks.
Key information is handled for the flow diagram of another embodiment of the method for password unlock with reference to attached drawing 8 Generate the step S003 of encrypted message, comprising:
S013 is decrypted key information to form unlock voice.
By description above S200 it is found that key information is that voice is modulated processing, semantic processes make language to unlock Justice and original real unlocking cipher are corresponding but not identical, and in the present embodiment, smart lock passes through the interior audio analysis prestored Program analyzes whether key information is the audio crossed by modulation treatment.Audio analysis program can analyze low frequency audio and high frequency audio Frequently, the audio that frequency is 0.3~3.4KHZ is defined as low frequency audio by the present invention, and frequency is that the audio of 10~15KHZ is defined as High-frequency audio, when it is low frequency audio or high-frequency audio that audio analysis program, which analyzes key information, smart lock can determine that key Information is normal person or smart lock not can recognize its semantic audio, is modulated at this time to key information and passes through decipherment algorithm It is handled, unlock voice is parsed from key information, so that normal person or smart lock can identify its semanteme.
S023 carries out processing to unlock voice and forms encrypted message;
Because unlock voice is the form of audio, this step is the unlock voice conversion by audio form in textual form Encrypted message.Specifically, smart lock semantics recognition unlocks voice, and above-mentioned unlock voice is interpreted as to the message in cipher of textual form Breath.
Shape is decrypted to key information for the flow diagram of another embodiment of the method for password unlock with reference to attached drawing 9 Include: at the step S013 for unlocking voice
S112 demodulates key information to parse encryption unlock sound;
Key information in the present embodiment is normal person or smart lock directly can not normally identify its semantic low frequency audio Or high-frequency audio, therefore need to carry out key information demodulation herein and restore to be generated as normal person or smart lock and directly can normally identify Its semantic encryption unlocks sound.For example, key information is buzzing or white noise, generating encryption unlock sound afterwards upon mediation is The audio of " ABC ", and the audio for being somebody's turn to do " ABC " is that normal person directly can normally identify that its semanteme, smart lock are soft by speech recognition Part can also Direct Recognition go out its semanteme.
S113, judges whether encryption unlock sound has the corresponding decipherment algorithm prestored;
Such as above-mentioned steps S221 and S222, key information can be corresponding by Crypted password information for unlocking cipher information The encryption that Encryption Algorithm obtains after being encrypted unlocks sound, and the present embodiment is the process reversely decrypted to key information. Specifically, whether smart lock analysis encryption unlock sound and the decipherment algorithm prestored are identical, if they are the same, execute lower step.Wherein, Prestored in the algorithms library of smart lock multiple encryptions unlock sound and with its one-to-one decipherment algorithm.It reaches in this manner To the formula of judgement selection decryption, the safety of password is promoted.
S213, if so, being then decrypted encryption unlock sound to parse unlock voice according to the decipherment algorithm prestored.
Such as in above-mentioned S222 step, encryption unlock sound can carry out the information that semantic processes are crossed to be encrypted algorithm, So in the present embodiment, if smart lock determine encryption unlock sound have it is corresponding prestore decipherment algorithm, calculated by prestoring decryption Encryption unlock sound is decrypted in method, to obtain the unlock voice of openable smart lock.Specifically, encryption unlock sound example For example " ABC " audio, through the corresponding unlock voice for prestoring generation " 123 " after decipherment algorithm is decrypted.
In another embodiment, encryption unlock sound is decrypted to generate solution according to the decipherment algorithm prestored Lock voice step S213 include:
Unlock voice is changed into text unlocking cipher by S123;
Smart lock is stored with the speech recognition program of 0~9 specific voice (or nonspecific voice), by the solution of audio form Lock speech recognition is translated as the text unlocking cipher of textual form.
Whether S223, analysis text unlocking cipher match with default unlocking cipher;
Prestored in smart lock unlocking cipher and with the one-to-one text unlocking cipher of the unlocking cipher.
S323, if matching, is determined as encrypted message for text unlocking cipher.
Smart lock, if successful match, generates unlock by matching text unlocking cipher with default unlocking cipher Instruction, carries out the unlocking of smart lock.
In yet another embodiment, to unlock voice carry out processing formed encrypted message step S023 include:
Whether S0231, analysis unlock voice match with default unlocking voice;
Specifically, whether the vocal print that smart lock can analyze unlock voice matches with the vocal print of default unlocking voice, can also To analyze whether the audio band of the audio band and default unlocking voice of unlock voice coincide.
Unlock voice is determined as encrypted message if matching by S0231.
It is the flow diagram of one embodiment of the method for password unlock, at external voice with reference to attached drawing 10 Reason is to obtain the step S002 of key information, comprising:
S012 carries out enhancing processing to external voice to obtain key information;
Enhancing processing includes any one or more processing of filtering processing, sound enhanced processing or sound equalization processing.
Further, external voice is handled to obtain the step S012 of key information and include:
S022 carries out enhancing processing to external voice to obtain enhancing key;
By above-mentioned S012 mode, enhancing processing is carried out to external voice, obtains enhancing key, enhancing key is to handle Key information afterwards.
S032, judge to enhance key whether with the cipher key match that prestores;
S042 determines that enhancing key is key information if matching.
In one embodiment, before the step S001 for receiving external voice, comprising:
S101 obtains the unlock enabled instruction of user's input;
S102 generates the voice reminder for reminding user to keep quite within a preset time according to unlock enabled instruction Information, and start reception external voice.
Purpose is to remind user to keep quite within a preset time when terminal device exports key sound, above-mentioned default Time is preferably in 1 second to 10 seconds.
In another embodiment, smart lock is equipped with key, after user presses the button, obtains unlock enabled instruction.
In conclusion smart lock receives external voice;External voice is handled to obtain key information;Key is believed Breath carries out processing and generates encrypted message;Unlock instruction is generated according to encrypted message to unlock to control;To solve identification equipment It is exposed and vulnerable to destroying and the problem of high equipment cost, while the process for generating audio-frequency information is encrypted by voice messaging, Intelligent lock cipher is prevented to be easy the problem of being cracked.
With reference to attached drawing 11, a kind of structural block diagram of the device of password unlock is proposed for the present invention, the device of password unlock is answered For in above-mentioned smart machine comprising:
Sound reception unit 01, for receiving external voice;
External voice can be understood as including any of the above-described key information as described in the examples, or also comprising intelligence Ambient noise is locked, excellent key information of the invention is white noise.
Key handling unit 02, for being handled external voice to obtain key information;
Key handling unit 02 can first amplify external voice, clearly to identify that key sound and surrounding are miscellaneous After sound, to obtain pure key sound.
Cryptography processing units 03 generate encrypted message for key information to be carried out processing;
In the embodiment of above-mentioned unlocking cipher generation method, key information can be by Crypted password information by encryption, White noise made of modulation, and in the present embodiment, cryptography processing units 03 to white noise carry out back-modulation (as demodulating), Decryption, to obtain encrypted message.
Unlocking unit 04 generates unlock instruction according to encrypted message and is unlocked with controlling.
After cryptography processing units 03 generate encrypted message, which match testing with preset password information Card, if they are the same, then unit 04 of unlocking generate unlock instruction, such as: encrypted message is " abc123 ", and preset password information is " abc123 ", after matching comparison, the two is identical, then unit 04 of unlocking generates unlock instruction, and smart lock makes according to unlock instruction Control smart lock is unlocked.
In one embodiment, cryptography processing units 03 include:
Cipher key decryption block to form unlock voice for key information to be decrypted.
Key information is that voice is modulated processing, semantic processes make semantic and original real unlocking cipher to unlocking It is corresponding but not identical, in the present embodiment, smart lock by the interior audio analysis program prestored analyze key information whether be by The audio that frequency is 0.3~3.4KHZ is defined as low frequency audio by the audio that modulation treatment is crossed, the present invention, and frequency is 10~ The audio of 15KHZ is defined as high-frequency audio, when it is low frequency audio or high-frequency audio that audio analysis program, which analyzes key information, Cipher key decryption block can determine that key information is that normal person or smart lock not can recognize its semantic audio, at this time to key information It is modulated and is handled by decipherment algorithm, unlock voice is parsed from key information, so as to normal person or intelligence Lock can identify its semanteme.
Speech processing module is unlocked, forms encrypted message for carrying out processing to unlock voice;
Because unlock voice is the form of audio, unlock speech processing module converts the unlock speech processes of audio form In the encrypted message of textual form.Specifically, unlock speech processing module semantics recognition unlocks voice, by above-mentioned unlock voice solution It is translated into the encrypted message of textual form.
In one embodiment, unlock speech processing module includes:
Sound demodulation submodule, for being demodulated to key information to parse encryption unlock sound;
Key information in the present embodiment is normal person or smart lock directly can not normally identify its semantic low frequency audio Or high-frequency audio, therefore need that key information is carried out demodulation by sound demodulation submodule herein to restore to be generated as normal person or intelligence Encryption unlock sound that directly can normally identify that it is semantic can be locked.For example, key information is buzzing or white noise, give birth to afterwards upon mediation It is that normal person directly can normally identify its semanteme, intelligence at the audio that encryption unlock sound is the audio of " ABC ", and is somebody's turn to do " ABC " Lock by speech recognition software can also Direct Recognition to go out its semantic.
Decipherment algorithm submodule corresponding prestores decipherment algorithm for judging whether clear crytpographic key information has;
Key information obtains after being encrypted for unlocking cipher information by the corresponding Encryption Algorithm of Crypted password information The encryption unlock sound arrived, the present embodiment is the process reversely decrypted to key information.Specifically, smart lock analysis encryption Whether unlock sound and the decipherment algorithm prestored are identical, if they are the same, execute lower step.Wherein, it is prestored in the algorithms library of smart lock Have multiple encryptions unlock sound and with its one-to-one decipherment algorithm.Reach the public affairs of judgement selection decryption in this manner Formula promotes the safety of password.
Speech production submodule is unlocked, if so, being decrypted encryption unlock sound to solve according to the decipherment algorithm prestored Unlock voice is precipitated.
Encryption unlock sound can carry out the information that semantic processes are crossed to be encrypted algorithm, so in the present embodiment, if intelligence Can lock determine encryption unlock sound have it is corresponding prestore decipherment algorithm, then by prestore decipherment algorithm to encryption unlock sound carry out Decryption, to obtain the unlock voice of openable smart lock.Specifically, encryption unlock sound is, for example, " ABC " audio, through correspondence Prestore decipherment algorithm decryption after generate " 123 " unlock voice.
In another embodiment, unlock speech processing module includes:
Text submodule changes into text unlocking cipher for that will unlock voice;
Text submodule is stored with the speech recognition program of 0~9 specific voice (or nonspecific voice), by audio form Unlock speech recognition be translated as the text unlocking cipher of textual form.
Whether matching verifying submodule, match for analyzing text unlocking cipher with default unlocking cipher;
Matching verifying submodule in prestore unlocking cipher and with the one-to-one text unlocking cipher of the unlocking cipher.
Text decision sub-module, if text unlocking cipher is determined as encrypted message for matching.
Text decision sub-module is by matching text unlocking cipher with default unlocking cipher, if successful match, Unlock instruction is generated, the unlocking of smart lock is carried out.
In yet another embodiment, unlock speech processing module includes:
Whether voice submodule matches for analyzing unlock voice with default unlocking voice;
Specifically, whether the vocal print that voice submodule can analyze unlock voice matches with the vocal print of default unlocking voice, Whether the audio band that also can analyze the audio band and default unlocking voice of unlock voice coincide.
Unlock voice is determined as encrypted message if matching by voice decision sub-module.
In one embodiment, cipher key unit 02 includes:
Key enhances module, for carrying out enhancing processing to external voice to obtain key information;
Enhancing processing includes any one or more processing of filtering processing, sound enhanced processing or sound equalization processing.
Further, cipher key unit 02 includes:
Enhance module, enhancing processing is carried out to obtain enhancing key to external voice;
Enhancing module carries out enhancing processing to external voice, obtains enhancing key, and enhancing key is treated key Information.
Enhance cipher key match module, for judge enhancing key whether with the cipher key match that prestores;
Enhance key determination module, if determining that enhancing key is key information for matching.
In one embodiment, the device of password unlock includes:
Enabled instruction acquiring unit, for obtaining the unlock enabled instruction of user's input;
Quiet reminding unit, for generating for reminding user to keep pacifying within a preset time according to unlock enabled instruction Quiet voice reminder information, and start reception external voice.
Purpose is to remind user to keep quite within a preset time when terminal device exports key sound, above-mentioned default Time is preferably 1 second to 10 seconds.
In another embodiment, smart lock is equipped with key, after user presses the button, obtains unlock enabled instruction.
With reference to attached drawing 12, it is the structural block diagram of terminal device provided by the invention, including memory 11 and processor 21, deposits Computer program 12 is stored in reservoir 11, processor 21 realizes above-mentioned unlocking cipher generation method when executing computer program 12 The step of.
The step of executing unlocking cipher generation method by terminal device, step includes:
Obtain the encrypted message of user's input;
Encrypted message is subjected to processing and generates key information;
Output key information is so that smart lock identifies and unlocks.
Terminal device obtains the encrypted message of user's input, and encrypted message is carried out processing and generates key information, is exported close Key information is to smart lock, so that smart lock identifies and unlocks, thus solve identification equipment it is exposed and vulnerable to destroying and The problem of high equipment cost, while the process for generating audio-frequency information is encrypted by voice messaging, prevent intelligent lock cipher to be easy The problem of being cracked.
The present invention also provides terminal device readable storage medium storing program for executing, are stored thereon with computer program, and computer program is located Reason device realizes the step of unlocking cipher generation method of above-mentioned password unlock when executing.
With reference to attached drawing 13, it is the structural block diagram of smart machine provided by the invention, including memory 22 and processor 21, deposits Computer program 13 is stored in reservoir 21, processor 22 realizes the method for above-mentioned password unlock when executing computer program 13 Step.
The step of executing unlocking cipher generation method by smart machine, step includes:
Receive external voice;
The external voice is handled to obtain key information;
Key information is subjected to processing and generates encrypted message;
Unlock instruction is generated according to the encrypted message to unlock to control.
Smart machine receives external voice, and identifies whether external voice has key information;If external voice is with close Key information, then decryption key information is to obtain digital audio;Judge digital audio whether with preset number information matches;If digital Sound and preset number information matches then generate unlock instruction, and unlock instruction is for instructing intelligent door lock to unlock;To solve It identifies that equipment is exposed vulnerable to destroying and the problem of high equipment cost, while being encrypted by voice messaging and generating audio-frequency information Process, prevent intelligent lock cipher to be easy the problem of being cracked.
The present invention also provides a kind of smart lock readable storage medium storing program for executing, are stored thereon with computer program, computer program quilt Processor realizes the step of method of above-mentioned password unlock when executing.
With reference to attached drawing 14, the structural block diagram for the intelligent unlocking system that the present invention also proposes, as seen from the figure, intelligent unlocking system Applied to intelligent terminal and smart machine, intelligent terminal is used to execute the unlocking cipher generation side in above-mentioned any one embodiment Method, the method that smart machine is used to execute the password unlock in above-mentioned any one embodiment, for example, intelligent unlocking system includes:
Intelligent terminal obtains the encrypted message of user's input;
Encrypted message is carried out processing and generates key information by intelligent terminal;
Intelligent terminal exports key information so that smart lock identifies and unlocks.
The received external voice of smart machine, external voice are at least partly exported by intelligent terminal;
Smart machine is handled external voice to obtain the key information of intelligent terminal output;
Key information is carried out processing and generates encrypted message by smart machine;
Smart machine generates unlock instruction according to encrypted message and is unlocked with controlling.
It is the realization principle block diagram of intelligent unlocking system proposed by the present invention with reference to attached drawing 15, specific real-time mode is above-mentioned It has been described, therefore does not repeat them here.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (10)

1. a kind of unlocking cipher generation method is applied to intelligent terminal, which is characterized in that comprising steps of
Obtain the encrypted message of user's input;
The encrypted message is subjected to processing and generates key information;
The key information is exported so that smart machine identifies and carry out control unlocking.
2. unlocking cipher generation method according to claim 1, which is characterized in that it is described will be at the encrypted message Managing the step of generating key information includes:
Processing is carried out to encrypted message and forms unlock voice;
To the unlock voice encryption and handle the generation key information.
3. unlocking cipher generation method according to claim 2, which is characterized in that the encrypted message includes unlocking cipher Information and Crypted password information.Described pair of unlock voice encryption generates the step of key information and includes:
Whether judgement plus the close encrypted message have corresponding Encryption Algorithm;
If so, being encrypted according to the corresponding Encryption Algorithm of the Crypted password information to the unlocking cipher information and handling life At key information.
4. unlocking cipher generation method according to claim 3, which is characterized in that the key information is key sound, It is described the unlocking cipher information is encrypted according to the Crypted password information corresponding Encryption Algorithm it is described close to generate The step of key information includes:
Transfer the corresponding Encryption Algorithm of the Crypted password information;
Encryption is carried out to the unlocking cipher information according to the Encryption Algorithm and generates encryption unlock sound;
Encryption unlock sound is modulated and generates the key sound.
5. unlocking cipher generation method according to claim 2, which is characterized in that the encrypted message is speech cipher letter Breath, it is described to the encrypted message carry out processing formed digital speech the step of include:
Identify the voice unlocking cipher in the speech cipher information;
The voice unlocking cipher is changed into text unlocking cipher;
Analyze whether the text unlocking cipher matches with default unlocking cipher;
If matching, changes into the unlock voice for text unlocking cipher.
6. unlocking cipher generation method according to claim 1, which is characterized in that the encrypted message includes text password Information and Crypted password information, the key information include key sound.It is described by the encrypted message carry out processing generate it is close The step of key information includes:
Judge whether the Crypted password information has corresponding Encryption Algorithm;
If so, transferring the corresponding Encryption Algorithm of the Crypted password information;
Encryption is carried out to the text password information according to the Encryption Algorithm and generates text key;
The text key is modulated and generates the key sound.
7. unlocking cipher generation method according to claim 1, which is characterized in that it is described according to the Encryption Algorithm to institute Include: before stating the step of text password information carries out encryption generation text key
Analyze whether the text password information matches with default unlocking cipher.
8. a kind of unlocking cipher generating means characterized by comprising
Encrypted message acquiring unit, for obtaining the encrypted message of user's input;
Key information generation unit generates key information for the encrypted message to be carried out processing;
Private key information output unit, for exporting the key information so that smart machine identifies and carry out control unlocking.
9. a kind of terminal device, including memory and processor, it is stored with computer program in the memory, feature exists In the processor realizes unlocking cipher generation method described in any one of claims 1 to 7 when executing the computer program The step of.
10. a kind of intelligent unlocking system, which is characterized in that be applied to terminal device and smart machine, the terminal device executes Unlocking cipher generation method described in any one of claims 1 to 7.
CN201910049881.9A 2019-01-18 2019-01-18 Unlocking cipher generation method, device, terminal device and system Pending CN109840974A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910049881.9A CN109840974A (en) 2019-01-18 2019-01-18 Unlocking cipher generation method, device, terminal device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910049881.9A CN109840974A (en) 2019-01-18 2019-01-18 Unlocking cipher generation method, device, terminal device and system

Publications (1)

Publication Number Publication Date
CN109840974A true CN109840974A (en) 2019-06-04

Family

ID=66883915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910049881.9A Pending CN109840974A (en) 2019-01-18 2019-01-18 Unlocking cipher generation method, device, terminal device and system

Country Status (1)

Country Link
CN (1) CN109840974A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114005208A (en) * 2021-12-30 2022-02-01 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN114582054A (en) * 2022-03-09 2022-06-03 浙江钟铮锁业有限公司 Key feedback method applied to coded lock

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103402203A (en) * 2013-07-30 2013-11-20 深圳市中兴移动通信有限公司 Biological recognition-based rapid access method and device
CN103684773A (en) * 2012-09-24 2014-03-26 国民技术股份有限公司 Secret lock device, portable terminal and audio unlocking method based on portable terminal
CN103761779A (en) * 2013-11-29 2014-04-30 北京国信灵通网络科技有限公司 Mobile terminal and control method for electronic lock at mobile terminal
JP5522875B1 (en) * 2013-06-28 2014-06-18 楽天株式会社 Information processing method, portable device, and information processing program
CN104103110A (en) * 2014-07-11 2014-10-15 孙景鑫 Voice-activated lock and unlocking method thereof
CN105303659A (en) * 2015-10-10 2016-02-03 深圳市雨滴科技有限公司 Method and device for identifying access control identity based on ultrasonic waves
CN105374090A (en) * 2014-09-02 2016-03-02 冯林 Lock and unlocking method based on mobile terminal
CN105577361A (en) * 2015-04-20 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information processing method and device thereof
CN105809790A (en) * 2016-03-10 2016-07-27 上海斐讯数据通信技术有限公司 Acoustic wave lock system and automatic unlocking method
CN105869244A (en) * 2016-03-31 2016-08-17 青岛歌尔声学科技有限公司 Voice cipher unlocking method and cipher lock
CN106447835A (en) * 2016-07-25 2017-02-22 罗新亮 Door lock sound wave control system and method
CN106548548A (en) * 2016-08-16 2017-03-29 中山微宇电器科技有限公司 An unlocking method of an intelligent lock and an intelligent lock system
CN106714170A (en) * 2015-11-13 2017-05-24 深圳市光峰光电技术有限公司 Projection device, user terminal, and method for accessing projection device into local area network
CN207611426U (en) * 2017-12-25 2018-07-13 上海跃众文化传媒有限公司 A kind of electronic lock, electronic lock system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684773A (en) * 2012-09-24 2014-03-26 国民技术股份有限公司 Secret lock device, portable terminal and audio unlocking method based on portable terminal
JP5522875B1 (en) * 2013-06-28 2014-06-18 楽天株式会社 Information processing method, portable device, and information processing program
CN103402203A (en) * 2013-07-30 2013-11-20 深圳市中兴移动通信有限公司 Biological recognition-based rapid access method and device
CN103761779A (en) * 2013-11-29 2014-04-30 北京国信灵通网络科技有限公司 Mobile terminal and control method for electronic lock at mobile terminal
CN104103110A (en) * 2014-07-11 2014-10-15 孙景鑫 Voice-activated lock and unlocking method thereof
CN105374090A (en) * 2014-09-02 2016-03-02 冯林 Lock and unlocking method based on mobile terminal
CN105577361A (en) * 2015-04-20 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information processing method and device thereof
CN105303659A (en) * 2015-10-10 2016-02-03 深圳市雨滴科技有限公司 Method and device for identifying access control identity based on ultrasonic waves
CN106714170A (en) * 2015-11-13 2017-05-24 深圳市光峰光电技术有限公司 Projection device, user terminal, and method for accessing projection device into local area network
CN105809790A (en) * 2016-03-10 2016-07-27 上海斐讯数据通信技术有限公司 Acoustic wave lock system and automatic unlocking method
CN105869244A (en) * 2016-03-31 2016-08-17 青岛歌尔声学科技有限公司 Voice cipher unlocking method and cipher lock
CN106447835A (en) * 2016-07-25 2017-02-22 罗新亮 Door lock sound wave control system and method
CN106548548A (en) * 2016-08-16 2017-03-29 中山微宇电器科技有限公司 An unlocking method of an intelligent lock and an intelligent lock system
CN207611426U (en) * 2017-12-25 2018-07-13 上海跃众文化传媒有限公司 A kind of electronic lock, electronic lock system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114005208A (en) * 2021-12-30 2022-02-01 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN114005208B (en) * 2021-12-30 2022-03-18 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN114582054A (en) * 2022-03-09 2022-06-03 浙江钟铮锁业有限公司 Key feedback method applied to coded lock

Similar Documents

Publication Publication Date Title
US8699944B2 (en) Device pairing using device generated sound
CN105303659B (en) A kind of gate inhibition's personal identification method and device based on ultrasonic wave
EP1481535B1 (en) System and method for wireless two factor authentication
US8730009B2 (en) Smart card and mobile communication device comprising the smart card
WO2017152815A1 (en) Identity authentication method and system
CN109830013A (en) Method, apparatus, smart machine and its system of password unlock
CN104851164B (en) Intelligent lock with biological feature recognition function and control method thereof
CN105939197A (en) Identity authentication method and system
CN106463120B (en) Method and device for identifying or authenticating people and/or objects through dynamic acoustic safety information
CN104709238A (en) Vehicle remote control method and mobile device
US20060267860A1 (en) Device pairing via human initiated contact
CN102412970A (en) Pervasive-network-oriented remote identity authentication system and method
CN105205894A (en) An access control-based audio recognition method and an audio recognition access control system
CN109600343A (en) Control method, device, mobile terminal, vehicle and the remote server of vehicle
CN109840974A (en) Unlocking cipher generation method, device, terminal device and system
CN104660307B (en) Based near field magnetic relaying and the soft replacement encrypted wireless communication system of user
CN104734750B (en) Shield and its method of work, Mobile terminal signature method, mobile terminal and system
CN104929443B (en) Smart lock and its method for unlocking and device
CN109671192A (en) A kind of method and earphone using earphone unlock intelligent door lock
JP2001241229A (en) Keyless entry system
JP2002112340A (en) Personal authentication system for mobile device and its method
WO2018028308A1 (en) Method, system, and unlocking device for device unlocking and device to be unlocked
CN107978049A (en) Control method and device, the vehicle of smart lock
KR100971443B1 (en) Recognition system and method using mobile communication terminal
CN106447835A (en) Door lock sound wave control system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190604