Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An access control voice coding and decoding system and method

A technology of speech coding and coding algorithm, which is applied in the field of access control speech coding and decoding systems, which can solve the problem that the door control lock control security access control terminal system cannot be used, and achieve the effect of improving security

Inactive Publication Date: 2019-02-12
SOUTHWEST PETROLEUM UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem of the security of door control lock control and the problem that the access control terminal system cannot be used in the scene without network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access control voice coding and decoding system and method
  • An access control voice coding and decoding system and method
  • An access control voice coding and decoding system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Such as figure 2 . image 3 Shown: a voice encoding and decoding system for access control, including: a mobile terminal, the mobile terminal is also connected to a server and an access control system, and the server is also connected to the access control system; the access control system includes a voice collection module, and the voice collection module is also connected to a central Processing unit, the central processing unit is also connected with 485 communication module, TF memory card and electric control lock; a further solution is: the access control system also includes an independent keyboard, power module, voice output module and TFT display; independent keyboard, power supply Module, voice output module and TFT display screen are connected with the central processing unit.

[0049] Figure 4 As shown: the central processing unit adopts Freescale's ARM processor MK60DN512; the voice output module adopts the ISD1760 voice module; the mobile terminal is a...

Embodiment 2

[0053] On the basis of the first embodiment, the function mod is a remainder function. mod((T+a1),62) means to take the remainder of the parameter (T+a1) to 62.

[0054] In order to prevent users from reserving the same access control on the same day to generate the same key, the key is designed as a random encryption code, and the password is composed of A+B+C+D format. Among them, A is three random numbers, B is a 6-digit date format (such as: 161108), C is the reservation access control number (the number of digits is variable), D is the login account data, each random number is 0-9, a-z , A-Z, one of the 62 characters in total, it can be precisely because of this, convert A into the ASCII code value of a 3-digit character string as the encoding variable, use the encoding variable to perform mixed encryption encoding on each digit in time B, and obtain The string X composed of 0-9, a-z, A-Z, such as: 7GmjyiOBO, followed by the access control number and user name is the initi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control voice encoding and decoding method. The method comprises the following steps: I. presetting a same encryption algorithm for a server and an access control terminal system; II. using a mobile terminal to log in the server, and sending out a reservation key request signal; III. using the server to receive the reservation key request signal, and using the encryption algorithm to generate a key; IV. using the server to covert the key into binary data, and carrying out audio carrier 2FSK modulation processing according to the binary data to obtain a reservation audio key formed by sine waves; V. using the server to send the reservation audio key to the mobile terminal; VI. after the reservation audio key is received by the mobile terminal, using the mobile terminal to play the audio key so as to output a voice signal; enabling the access control terminal system to receive the voice signal for carrying out FSK modulation so as to obtain an initial key; using the access control terminal system to obtain an underlying match code by applying the initial key and the encryption algorithm; matching the obtained underlying match code with a preset underlying match code. The access control vice encoding and decoding method can control an electric control lock in a way of audio decoding, thus being higher in safety.

Description

technical field [0001] The invention relates to the field of intelligent control, in particular to an access control voice coding and decoding system and method. Background technique [0002] At present, relatively mature products on the market include door locks opened by technical methods such as passwords, fingerprints, radio frequency cards, voice recognition, and image recognition. The security of such door lock control systems and methods is not high and the cost is too high. The unlocking method is a closed-loop control, which requires communication to complete the unlocking verification, which cannot overcome the problem that it cannot be unlocked due to network failures and other reasons. Contents of the invention [0003] The purpose of the present invention is to solve the problem of the security of door lock control and the problem that the door system cannot be used in a scene without a network. In order to achieve the above object, the technical scheme adopt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00H04L9/08
CPCG07C9/27H04L9/0869
Inventor 陈云生周云旭赵书朵卢进悟吴盛荣张少军杨森
Owner SOUTHWEST PETROLEUM UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products