Door-lock unlocking method, device and computer-readable storage medium

A car door lock and computer program technology, applied in the field of biometric identification, can solve the problems of low security, the key cannot open the car door, the mechanical key is easy to be copied, etc., to achieve high security, high convenience, and avoid easy to be copied. Effect

Inactive Publication Date: 2019-01-25
DEEPBLUE SHENGSHI TECH SUZHOU CO LTD
17 Cites 2 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0003] The inventor found that there are at least the following problems in the prior art: both the mechanical key and the remote control key are physical keys, and if the key is lost or forgotten, the car door cannot be opened; the mechanical key is easy to be copied, and the security is...
View more

Abstract

The embodiment of the invention relates to the technical field of biometrics and discloses a door lock unlocking method. In the invention, the door lock unlocking method comprises the following steps:acquiring the hand pulse information of the vehicle owner, wherein, the hand pulse information is acquired through the palm of the vehicle owner; Judging the validity of the hand pulse information; when it is determined that the palm pulse information is valid, the door lock is controlled to be unlocked. The invention also provides a door lock unlocking device and a computer-readable storage medium. The invention provides a door lock unlocking method, a device and a computer-readable storage medium, which enable a vehicle owner to unlock a vehicle door without using a physical key, and has high safety and convenience.

Application Domain

Anti-theft devicesCharacter and pattern recognition +1

Technology Topic

Embedded systemCar door +1

Image

  • Door-lock unlocking method, device and computer-readable storage medium
  • Door-lock unlocking method, device and computer-readable storage medium
  • Door-lock unlocking method, device and computer-readable storage medium

Examples

  • Experimental program(1)

Example Embodiment

[0018] In order to make the objectives, technical solutions, and advantages of the embodiments of the present invention clearer, the following describes the embodiments of the present invention in detail with reference to the accompanying drawings. However, a person of ordinary skill in the art can understand that, in each embodiment of the present invention, many technical details are proposed for the reader to better understand the present invention. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solution claimed by the present invention can be realized.
[0019] The first embodiment of the present invention relates to a method for opening a vehicle door lock, and the specific process is as follows figure 1 Shown, including:
[0020] S101: Obtain the palm information of the vehicle owner.
[0021] Regarding step S101, specifically, a hand pulse controller and hand pulse sensor are installed on the side door of the car. The hand pulse information can be the palm vein image of the vehicle owner. When the vehicle owner approaches the car, the hand pulse controller is activated and the authentication program is activated. The palm vein sensor captures the image of the palm vein of the vehicle owner.
[0022] S102: Judging the validity of the MPG information, and controlling the door lock to open when it is determined that the MPG information is valid.
[0023] Regarding step S102, specifically, the judging the validity of the MPG information, when it is judged that the MPG information is valid, the way of controlling the door lock to open may be: judging whether the palm vein image meets a preset condition; The palm vein image is determined to be valid if it meets the preset conditions. Further, before judging whether the palm vein image satisfies a preset condition, feature information used to characterize the identity of the vehicle owner in the palm vein image (ie, hand pulse information) may also be extracted, and the determining whether the palm vein image Satisfying the preset condition is: judging whether the feature information matches the preset feature information, and if the palm vein image meets the preset condition, it is determined to be valid, that is: if the feature information matches the preset feature information If it matches, it is determined to be valid. The extracting feature information used to characterize the identity of the vehicle owner in the palm vein image specifically includes: binarizing the palm vein image to obtain a palm contour image; extracting the palm contour image from the palm contour image , Obtain the MPG ROI area map; divide the MPG ROI area map into blocks, and output feature value codes after wavelet decomposition and multi-scale processing. Specifically, the process of segmenting the ROI region map of the hand pulse is as follows:
[0024] (1) Perform normalization processing on the ROI region map of the hand pulse, and normalize the collected images through scale normalization and gray normalization.
[0025] (2) Perform image enhancement on the normalized MPG ROI area map. In order to facilitate subsequent MPG matching, it is necessary to distinguish between palm vein patterns and surrounding tissues as much as possible to improve the contrast of the image, and use the CLAHE algorithm to Image enhancement processing.
[0026] (3) Perform image denoising on the enhanced palm vein ROI area map. Since the noise of the enhanced image is also enhanced, the image is filtered to obtain an image with obvious palm vein pattern contrast and low noise.
[0027] 4. Perform image refinement on the palm vein ROI area map after image denoising. After image enhancement and noise reduction, a high-quality binary ROI image is obtained, but the quality of the palm vein image collected will be different. At the same time, the thickness of the lines is different, so in order to reduce the amount of data and the complexity of the matching algorithm, the above-mentioned image is refined through the field refinement algorithm to obtain a refined palm ROI image with clear lines.
[0028] It should be noted that the preset feature information in this embodiment is the feature information in the palm vein image pre-stored by the car owner. As shown in Table 1, the car owner can register the hand pulse information through a hand pulse registration machine, which is through the network Send the data to the car machine. At this time, the MPG information of the car owner has been stored in the MPG control board. When unlocking, the user walks into the car, the hand pulse controller is activated, the authentication program enables the hand pulse sensor to take pictures, the user let go of recognition, and the door is unlocked after the authentication is successful.
[0029]
[0030] Table 1
[0031] Compared with the prior art, the embodiment of the present invention obtains the hand pulse information of the vehicle owner, wherein the hand pulse information is obtained through the palm of the vehicle owner, and then the validity of the hand pulse information is judged. When it is determined that the hand pulse information is valid, Control the door lock to open. In other words, when the car owner needs to open the door, he does not need any media, and can open the door by simply swiping his palm. On the one hand, the owner’s unique hand pulse information (obtained through the owner’s palm swiping) will not be copied, and the safety is high; On the one hand, the hand pulse information is not a physical object and can be obtained at any time to open the door at any time. There will be no loss or forgotten keys, and there is no need to replace the battery regularly and pay attention to the environment where the keys are placed. It is highly convenient and avoids the existing technology. "Mechanical keys are easy to be copied" and "remote control keys need to be replaced regularly. They must not be put in water or placed in a high temperature environment. They may even affect signal transmission when installed with other electronic devices."
[0032] The second embodiment of the present invention relates to a method for unlocking a vehicle door lock. The second embodiment is a further improvement on the basis of the first embodiment. The specific improvement lies in: before acquiring the palm information of the vehicle owner, it also includes: real-time detection of whether an object is approaching within a preset range, If so, turn on the working state, and then execute the acquisition of the vehicle owner's hand pulse information. By real-time detection of whether there is an object approaching within the preset range before the acquisition of the vehicle owner’s hand pulse information, if so, the working state is turned on, so that the system is not always in a working state that consumes more energy and is within the preset range When there is no object approaching, it will be in a standby state with low energy consumption, which reduces energy consumption and prolongs the service life of the door lock opening device.
[0033] The specific process of the method for unlocking the door lock of this embodiment is as follows: figure 2 Shown, including:
[0034] S201: Turn on the working state when an object approaching within the preset range is detected.
[0035] Regarding step S201, specifically, the proximity sensor can be used to detect in real time whether there is an object continuously approaching within the preset range. The proximity sensor replaces the contact detection method such as limit switch, and is a general term for the sensor for the purpose of detecting without touching the detection object. . The movement information and existence information of the detected object are converted into electrical signals. The detection methods that are converted to electrical signals include the method of using eddy currents generated in the metal body of the detection target caused by electromagnetic induction, the method of capturing the change in the electrical signal capacity caused by the proximity of the sensing body, the method of sharp stone and the guide switch. .
[0036] The preset range can be set according to actual needs, generally within 1 meter. It should be noted that the vehicle door in this embodiment is provided with a sensor combination module. The sensor combination module is packaged by a hand pulse sensor, a proximity sensor and a control circuit. The two lead wires are connected to the computing host through a plug to realize data And signal transmission. The sensor combination module is arranged in the side door frame outside the cab of the vehicle body B-pillar, and the calculation host is arranged in the side door, and the calculation host communicates with the vehicle through the CAN bus.
[0037] S202: Obtain the hand pulse information of the vehicle owner.
[0038] S203: Determine the validity of the MPG information, and when it is determined that the MPG information is valid, control the door lock to open.
[0039] Steps S202 to S203 in this embodiment are similar to steps S101 to S102 in the first embodiment, and in order to avoid repetition, they will not be repeated here.
[0040] For ease of understanding, the method for unlocking the door lock of this embodiment will be described as follows:
[0041] In this embodiment, when the car key system is in the standby state, the computing host is in the dormant state, and only the proximity sensor in the sensor combination module sends and receives distance sensing data. When an object continues to approach within the detection range, the computing host starts and the hand pulse The sensor waits to receive data, collects the owner's hand pulse information, runs the comparison algorithm, and finally outputs the unlock signal through the CAN bus.
[0042] Compared with the prior art, the embodiment of the present invention obtains the hand pulse information of the vehicle owner, wherein the hand pulse information is obtained through the palm of the vehicle owner, and then the validity of the hand pulse information is judged. When it is determined that the hand pulse information is valid, Control the door lock to open. That is to say, when the car owner needs to open the car door, there is no need for any media, and the car door can be opened by simply swiping the palm of the hand. On the one hand, the owner’s unique hand pulse information (obtained through the car owner’s palm swiping) will not be copied, and the safety is high; On the one hand, the hand pulse information is not a physical object and can be obtained at any time to open the door at any time. There will be no loss or forgotten keys, and there is no need to replace the battery regularly and pay attention to the environment where the keys are placed. It is highly convenient and avoids the existing technology. "Mechanical keys are easy to be copied" and "remote control keys need to be replaced regularly. They must not be put in water or placed in high temperature environments, and they may even affect signal transmission when installed with other electronic equipment."
[0043] The division of the steps of the various methods above is only for clarity of description. When implemented, it can be combined into one step or some steps can be split into multiple steps, as long as they include the same logical relationship, they are all within the protection scope of this patent. ; Adding insignificant modifications to the algorithm or process or introducing insignificant design, but not changing the core design of the algorithm and process are within the scope of protection of the patent.
[0044] The third embodiment of the present invention relates to a vehicle door lock opening device, such as image 3 As shown, it includes: at least one processor 301; and,
[0045] A memory 302 communicatively connected with at least one processor 301; wherein,
[0046] The memory 302 stores instructions that can be executed by the at least one processor 301, and the instructions are executed by the at least one processor 301, so that the at least one processor 301 can execute the aforementioned method for unlocking the vehicle door.
[0047] The memory 302 and the processor 301 are connected in a bus manner, and the bus may include any number of interconnected buses and bridges, and the bus connects one or more various circuits of the processor 301 and the memory 302 together. The bus can also connect various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all known in the art, and therefore, no further descriptions thereof are provided herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or multiple elements, such as multiple receivers and transmitters, providing a unit for communicating with various other devices on the transmission medium. The data processed by the processor 301 is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor 301.
[0048] The processor 301 is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interfaces, voltage regulation, power management, and other control functions. The memory 302 may be used to store data used by the processor 301 when performing operations.
[0049] The fourth embodiment of the present invention relates to a computer-readable storage medium storing a computer program. When the computer program is executed by the processor, the above method embodiment is realized.
[0050] That is, those skilled in the art can understand that all or part of the steps in the method of the above-mentioned embodiments can be implemented by a program instructing relevant hardware. The program is stored in a storage medium and includes several instructions to enable a device ( It may be a single chip microcomputer, a chip, etc.) or a processor (processor) that executes all or part of the steps of the methods described in the embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes.
[0051] Those of ordinary skill in the art can understand that the above-mentioned embodiments are specific examples for realizing the present invention, and in actual applications, various changes can be made in form and details without departing from the spirit and spirit of the present invention. range.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

A layering and partially filling coal mining method of thick seams

InactiveCN104832178Aimprove securityLower filling costs
Owner:CHINA UNIV OF MINING & TECH

Nano metal silver antibiotic paint and its preparing method

InactiveCN1616559Aimprove security
Owner:RESEARCH INSTITUTE OF TSINGHUA UNIVERSITY IN SHENZHEN

Cloud data security protection method

InactiveCN104767745Aimprove securitySolve user privacy leakage
Owner:INSPUR GROUP CO LTD

Classification and recommendation of technical efficacy words

  • Improve convenience
  • improve security

Image display method and apparatus

ActiveUS20130040623A1improve conveniencemaximize utility
Owner:LG ELECTRONICS INC

Voice control method and device

Owner:LE SHI ZHI XIN ELECTRONICS TECH TIANJIN

Continuously operable seat-reclining device for vehicles

InactiveUS20050110322A1actuate load be reduceimprove convenience
Owner:DAS CO LTD

Pesticide micro-capsule granules and preparation method thereof

InactiveCN102100229Alow toxicityimprove security
Owner:联合国南通农药剂型开发中心 +1

Method for achieving user authentication by utilizing camera

InactiveCN103678984Aimprove securityGuaranteed picture quality
Owner:湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products