Method for unlocking hand behavior based three-dimensional password lock

A password lock and behavioral technology, applied in the field of information security, can solve the problems of not being safe enough, not simple enough, easy to be cracked and used, etc., and achieve the effect of improving security and high randomness

Inactive Publication Date: 2015-09-09
GUANGDONG UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These unlocking methods have their own characteristics. For example, the number symbol password method is usually unlocked by the traditional input method that the user clicks on the keyboard. It is very easy to use, but the keyboard input unlocking method may be stolen by

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for unlocking hand behavior based three-dimensional password lock
  • Method for unlocking hand behavior based three-dimensional password lock
  • Method for unlocking hand behavior based three-dimensional password lock

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0039] Example one

Example

[0040] Reference figure 2 , The first embodiment of the present invention:

[0041] The three-dimensional code lock for hand behavior of the present invention includes a hand behavior detection component, a computer system, a control component and a lock structure.

[0042] Among them, the hand behavior detection component is used to detect the hand motion performed by the user and generate a corresponding password. In specific implementation, the hand behavior detection component can use an infrared hand detection device, such as Lead Motion. Lead Motion is Somatosensory controller A model produced by the manufacturing company Leap Somatosensory controller , The Chinese name is "Lidong", which can accurately detect the user's gestures with high detection accuracy and even accurately detect one-tenth fingertip movements.

[0043] The computer system is used to detect the hand behavior detection component according to the learned gesture password, and then cooperate with the contr...

Example Embodiment

[0045] Example two

[0046] This embodiment introduces the formation principle of the unlocking method of the three-dimensional password of the hand behavior of the present invention.

[0047] The position of the hand is in a three-dimensional space. Due to the specificity and complexity of hand behavior, it is difficult to locate the position of the hand only through a computer. Therefore, there are few researches on gesture unlocking.

[0048] In view of the above-mentioned shortcomings of the prior art, the present invention uses hand recognition as the password input object through three-dimensional coordinate, including the operating state of the hand and the attributes of the hand gesture, and the computer system is compared and unlocked, thereby providing the user Provides an easy to use and safe gesture unlocking method.

[0049] The hand behavior code of the present invention is composed of three parts, including hand shape code, sequence code and position code.

[0050] Hand...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for unlocking a hand behavior based three-dimensional password lock, comprising: a computer system learning under a set gesture-based unlocking condition, forming a first hand behavior password, and storing the first hand behavior password in a database; a hand behavior detection component collecting hand movement data of a user, performing detection, generating a second hand behavior password according to a detection result, and sending the second hand behavior password to a computer system; and the computer system determining whether the first hand behavior password and the second hand behavior password are the same; if yes, unlocking the hand behavior based three-dimensional password lock by using a control component; and otherwise, making the hand behavior based three-dimensional password lock remain in a locked state by using the control component. According to the method of the invention, a hand behavior password based unlocking manner is used, there are more password combinations, security is higher, users are not required to perform touching, no dedicated password input device is required, use convenience is high, and the method can be widely applied to the information security field.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for unlocking a hand action three-dimensional password lock. Background technique [0002] In the field of information security, such as security departments, home anti-theft, car unlocking, etc., there is a problem of how to unlock safely through system intervention. [0003] The current safe unlocking methods mainly include digital passwords such as one-dimensional digital symbols, voice and two-dimensional images, pupils, lip prints, palm prints, fingerprints, and ear shape unlocking. These unlocking methods have their own characteristics. For example, the number symbol password method is usually unlocked by the traditional input method that the user clicks on the keyboard. Password, not secure enough. Unlocking methods such as voice, pupil, lip print, palm print, fingerprint, and ear shape unlocking also have the problem of being easily cracked or not easy to us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 余永权刘丹云
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products