Intelligent unlocking method and corresponding device

An unlocking and intelligent technology, applied in the field of security identification, can solve problems such as easy to be stolen, and achieve the effects of high security, high verification accuracy and simple operation.

Active Publication Date: 2019-12-13
HUAZHONG UNIV OF SCI & TECH
View PDF15 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the above defects or improvement needs of the prior art, the present invention provides an intelligent unlocking method and a corresponding device, the purpose of which is that the present invention adopts a combination of at least two verification methods, which has higher security and avoids the single verification method Easy to be stolen and copied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent unlocking method and corresponding device
  • Intelligent unlocking method and corresponding device
  • Intelligent unlocking method and corresponding device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] refer to figure 1 , the present embodiment provides an intelligent unlocking method, the intelligent unlocking method comprising the following steps:

[0063] Step 10: Obtain the first identification information of the operator, and verify the first identification information.

[0064] In an optional embodiment, the first identification information may be the certificate of the operator, where the certificates applicable to this embodiment include but are not limited to ID cards, passports, Hong Kong and Macao travel permits, Taiwan compatriots certificates, Hong Kong and Macao Taiwan resident residence permit and driver's license and other documents.

[0065] When the first identification information is a certificate, the process of verifying the first identification information is the verification process of the certificate. When the certificate passes the authenticity verification, the first identification information passes the verification.

[0066] In practical ...

Embodiment 2

[0127] Combine below Figure 5 ~ Figure 7 , specifically illustrating an implementation manner in which the first identification information is a verification code.

[0128] In one example, see Figure 5 and Figure 7 , step 10 includes the following steps:

[0129] Step 1021: Receive a trigger request from the operator, and obtain the contact information of the user corresponding to the electronic lock according to the trigger request.

[0130] Wherein, the trigger request may be the unique identification information of the electronic lock input by the operator, or the face image corresponding to the electronic lock selected by the operator.

[0131] Wherein, the contact method can be telephone, WeChat, qq or other types of social methods.

[0132] Step 1022: Send a verification code to the user corresponding to the electronic lock through the contact information.

[0133] Step 1023: Determine whether the verification code input by the operator within the preset time is ...

Embodiment 3

[0148] The foregoing embodiments mainly illustrate the process of verifying and unlocking, below in conjunction with Figure 8 , briefly explain the process of a user's initial registration and use of electronic locks.

[0149] Such as Figure 8 As shown, firstly, according to the certificate verification method in Example 1, the certificate is authenticated and verified for consistency. The face image is processed to obtain the face image F3, wherein, the manner of the face image F3 can refer to Embodiment 1, and will not be repeated here.

[0150] Verify the consistency between the face image F3 and the face images (F1 and F2) in the certificate. When the face image F3 is consistent with the face images (F1 and F2) in the certificate, the receiving operator (user) Enter the biometric information and contact information, and set the authorization period of the operator (user), after the authorization period is exceeded, the operator (user) information will be deleted from t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent unlocking method and a corresponding device. The intelligent unlocking method comprises the steps that first recognition information of an operator is acquired,and the first recognition information is verified; after the first recognition information passes verification, biological feature information of the operator is acquired; and the biological feature information is verified, and unlocking operation is executed after the biological feature information passes verification. According to the method, by adopting the scheme of combining at least two verification modes, the safety is higher, and the problem that a single verification mode is prone to being stolen and imitated is avoided. Meanwhile, the biological feature information of the operator isverified after passing of the first verification mode, and therefore the safety is further improved. Besides, multiple verification modes are provided for the operator to choose, so that the flexibility of a system is improved. The method is easy to operate, flexible and high in verification accuracy and remarkably improves the safety of the electronic lock verification system.

Description

technical field [0001] The invention belongs to the field of security identification, and more specifically relates to an intelligent unlocking method and a corresponding device. Background technique [0002] Electronic lock, as the door lock component in the access control system, is an indispensable tool for people to protect property and personal safety in daily life. [0003] With the advancement of science and technology, there are more and more types of electronic locks on the market, such as combination locks, electronic magnetic card locks, fingerprint locks and face recognition locks. But, along with the development of technology, the way that criminals adopt technology to unlock the lock also increases thereupon. For password locks and electronic magnetic card locks, once the password or electronic magnetic card is lost, such electronic locks can be easily unlocked, and the security is low; for fingerprint locks, criminals only need to obtain user fingerprint info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/00563G07C9/00571
Inventor 尤新革彭勤牧韩曦
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products