Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for unlocking hand behavior based three-dimensional password lock

A password lock and behavioral technology, applied in the field of information security, can solve the problems of not being safe enough, not simple enough, easy to be cracked and used, etc., and achieve the effect of improving security and high randomness

Inactive Publication Date: 2015-09-09
GUANGDONG UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These unlocking methods have their own characteristics. For example, the number symbol password method is usually unlocked by the traditional input method that the user clicks on the keyboard. It is very easy to use, but the keyboard input unlocking method may be stolen by a virus Trojan horse by intercepting user input. password, not secure enough
Unlocking methods such as voice, pupil, lip print, palm print, fingerprint, ear shape unlocking, etc. also have the problem of being easily cracked or not easy to use due to insufficient security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for unlocking hand behavior based three-dimensional password lock
  • Method for unlocking hand behavior based three-dimensional password lock
  • Method for unlocking hand behavior based three-dimensional password lock

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0041] The hand behavior three-dimensional password lock of the present invention comprises a hand behavior detection component, a computer system, a control component and a lock structure.

[0042] Wherein, the hand behavior detection component is used to detect the hand movement performed by the user and generate a corresponding password. During specific implementation, the hand behavior detection component can use infrared hand detection equipment, such as Lead Motion. Lead Motion is Somatosensory controller A model produced by manufacturing company Leap Somatosensory controller , the Chinese name is "Lidong", which can accurately detect the user's gestures, with high detection accuracy and can even accurately detect one-tenth of the fingertip's movements.

[0043] The computer system is used to detect the hand behavior detection part according to the learned gesture password, and then cooperate with the control part according to the detection result to control the lock...

Embodiment 2

[0046] This embodiment introduces the formation principle of the unlocking method of the hand behavior three-dimensional password of the present invention.

[0047] The position of the hand is in three-dimensional space. Due to the specificity and complexity of hand behavior, it is difficult to locate the position of the hand only by computer. Therefore, there are few researches on gesture unlocking.

[0048] In view of the deficiencies of the above-mentioned prior art, the present invention adopts three-dimensional coordinates and uses hand recognition as the password input object, including the attributes of the hand operation state and hand gestures, and unlocks after comparison by the computer system, thereby providing users with Provides an easy-to-use and safe gesture unlocking method.

[0049] The hand behavior code of the present invention is composed of three parts, including hand shape code, sequence code and position code.

[0050]The hand shape code means that th...

Embodiment 3

[0055] The present invention is based on the password generated by hand behavior, and is a three-dimensional password lock with gesture action formed by combining a computer system and hand behavior detection components (such as leap motion). The hand behavior three-dimensional combination lock utilizes the hand behavior detection component to detect the hand behavior, so as to decompose the three-dimensional hand behavior into codes.

[0056] In specific implementation, the unlocking process of the combination lock based on hand behavior includes:

[0057] (1) Pre-defined—used to define and store the unlocking gestures of the 3D password lock.

[0058] When the three-dimensional combination lock is activated, the user needs to pre-define a specific gesture in the three-dimensional combination lock to unlock the three-dimensional combination lock (the specific gesture includes the specific shape, specific order and specific position information of the hands). Take the three-d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for unlocking a hand behavior based three-dimensional password lock, comprising: a computer system learning under a set gesture-based unlocking condition, forming a first hand behavior password, and storing the first hand behavior password in a database; a hand behavior detection component collecting hand movement data of a user, performing detection, generating a second hand behavior password according to a detection result, and sending the second hand behavior password to a computer system; and the computer system determining whether the first hand behavior password and the second hand behavior password are the same; if yes, unlocking the hand behavior based three-dimensional password lock by using a control component; and otherwise, making the hand behavior based three-dimensional password lock remain in a locked state by using the control component. According to the method of the invention, a hand behavior password based unlocking manner is used, there are more password combinations, security is higher, users are not required to perform touching, no dedicated password input device is required, use convenience is high, and the method can be widely applied to the information security field.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for unlocking a hand action three-dimensional password lock. Background technique [0002] In the field of information security, such as security departments, home anti-theft, car unlocking, etc., there is a problem of how to unlock safely through system intervention. [0003] The current safe unlocking methods mainly include digital passwords such as one-dimensional digital symbols, voice and two-dimensional images, pupils, lip prints, palm prints, fingerprints, and ear shape unlocking. These unlocking methods have their own characteristics. For example, the number symbol password method is usually unlocked by the traditional input method that the user clicks on the keyboard. Password, not secure enough. Unlocking methods such as voice, pupil, lip print, palm print, fingerprint, and ear shape unlocking also have the problem of being easily cracked or not easy to us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 余永权刘丹云
Owner GUANGDONG UNIV OF TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More