Method, device and computer storage medium for wirelessly unlocking electronic equipment

An electronic device, a wireless technology, applied to a method of wireless unlocking equipment, devices and computer storage media, can solve the problems of inability to meet the unlocking requirements, achieve the effect of eliminating the possibility of pairing and enhancing security

Active Publication Date: 2022-04-12
SHANGHAI SUMI TECH CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the current Bluetooth unlocking method cannot meet the unlocking requirements between an unlocking device and multiple unlocked devices and / or between multiple unlocking devices and an unlocked device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and computer storage medium for wirelessly unlocking electronic equipment
  • Method, device and computer storage medium for wirelessly unlocking electronic equipment
  • Method, device and computer storage medium for wirelessly unlocking electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0060] This example can be found in figure 1 The exemplary implementation environment shown, or variations thereof.

[0061] In this embodiment, the portable electronic device 120 is selected to initiate a scan in the master mode to call the operable device 110 , while the operable device 110 is in the slave mode to initiate a broadcast and wait for the portable electronic device 120 to call. Once the connection 130 is established between the two, the portable electronic device 120 can unlock the operable device 110 .

[0062] Portable electronic device 120 needs to be able to obtain the address of operable device 110 in order to initiate a scan. To this end, the portable electronic device 120 is first paired with the operable device 110 , so as to obtain its address from the operable device 110 .

[0063] Figure 4 It is a flowchart of device pairing according to an embodiment of the present invention. refer to Figure 4 As shown, the pairing process includes the followi...

no. 2 example

[0096] In this embodiment, different from the first embodiment, before step 613, when the signal strength between the portable electronic device and the operable device (for example, the signal strength of the transmitted first identification) reaches the first threshold Only proceed to step 613 . Figure 7 It is a flow chart of device unlocking according to another embodiment of the present invention. refer to Figure 7 As shown, it may be judged in step 612c whether the signal strength reaches the first threshold (for example -60dB), and if so, proceed to step 613, otherwise return to step 611 to re-scan. Setting the signal strength ensures that the portable electronic device is close enough to the operable device to initiate a connection.

[0097]In a preferred embodiment, while maintaining the connection, the signal strength can also be monitored and judged, and unlocking is performed only when the signal strength further increases to a sufficient level. A further incre...

no. 3 example

[0104] This example can be found in figure 1 The exemplary implementation environment shown, or variations thereof.

[0105] In this embodiment, the portable electronic device 120 is selected to initiate a scan in the master mode to call the operable device 110 , while the operable device 110 is in the slave mode to initiate a broadcast and wait for the portable electronic device 120 to call. Once the connection 130 is established between the two, the portable electronic device 120 can unlock the operable device 110 .

[0106] Portable electronic device 120 needs to be able to obtain the address of operable device 110 in order to initiate a scan. To this end, the portable electronic device 120 may receive an input of one or more authorized operable device identifiers and store them in a list of authorized operable device identifiers. refer to figure 1 and image 3 As shown, each portable electronic device 120 (such as 120a, 120b, and 120c) can receive an identifier of an a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for unlocking an electronic device. The method includes the steps of: a first portable electronic device of the one or more portable electronic devices initiates a scan in master mode, and a first operable device of the one or more operable devices initiates a scan in slave mode mode initiates a broadcast, the broadcast includes the first identifier of the first operable device; the first portable electronic device judges whether the first identifier is in the authorized operable device identifier list, and if so, sends the The first operable device initiates a first connection, and maintains the first connection at the first operable device; sends an unlock message to the first operable device at the portable electronic device, and at the first The operable device is unlocked in response to the unlock message.

Description

technical field [0001] The present invention mainly relates to the field of wireless communication, in particular to a method, device and computer storage medium for wireless unlocking equipment. Background technique [0002] Some electronic devices involving sensitive information or private information are only allowed to be accessed by authorized persons. Therefore, after these electronic devices are locked, they need to be unlocked by authorized persons before they can be used. Conventional unlocking methods include entering passwords, using radio frequency card verification, and entering biometric information (such as voice, fingerprint, iris, face) verification, etc. These unlocking methods all require human interaction with electronic devices to complete. [0003] Wireless unlocking using the Bluetooth protocol has been proposed. For example, a wearable device (such as a wristband) is used to unlock the mobile terminal. This unlocking process is completed automatic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/00
CPCH04W8/005G06F21/35
Inventor 陈桂鸿
Owner SHANGHAI SUMI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products