A kind of intelligent unlocking method and corresponding device

An unlocking and intelligent technology, applied in the field of security identification, can solve problems such as being easily stolen

Active Publication Date: 2021-07-06
HUAZHONG UNIV OF SCI & TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the above defects or improvement needs of the prior art, the present invention provides an intelligent unlocking method and a corresponding device, the purpose of which is that the present invention adopts a combination of at least two verification methods, which has higher security and avoids the single verification method Easy to be stolen and copied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of intelligent unlocking method and corresponding device
  • A kind of intelligent unlocking method and corresponding device
  • A kind of intelligent unlocking method and corresponding device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] See figure 1 This embodiment provides a smart unlocking method, the intelligent unlocking method comprising the steps of:

[0063] Step 10: Get the first identification information of the operator, verify the first identification information.

[0064] In an alternative embodiment, the first identification information can be the operator's document, wherein the documents applicable to the present embodiment include, but are not limited to, ID cards, passports, Hong Kong and Macao pass, Taiwanese cards, Hong Kong and Macao to Township, Hong Kong and Macao Table resident residence permit and driver's license.

[0065] When the first identification information is a document, the verification process of the first identification information is the fault process of the certificate, and the first identification information is verified when the document is verified by the authentication.

[0066] In the actual application scenario, the operator has often occurred in the case where t...

Embodiment 2

[0127] Bonded below Figure 5 ~ 7 , Specifically, the first identification information is implemented in the implementation of the verification code.

[0128] In one embodiment, see Figure 5 with Figure 7 Step 10 includes the steps of:

[0129] Step 1021: Receive the trigger request of the operator, obtain the contact information of the user corresponding to the electronic lock, based on the trigger request.

[0130] The trigger request can be unique identification information of the electronic lock input by the operator, or a face image corresponding to the electronic lock selected by the operator.

[0131] Among them, the contact information can be a telephone, WeChat, QQ or other type of social approach.

[0132] Step 1022: Verification code corresponding to the electronic lock by the contact manner.

[0133] Step 1023: Deconed whether the verification code entered in the preset time is correct, if it is correct, the first identification information is verified.

[0134] In the ...

Embodiment 3

[0148] The foregoing embodiment mainly illustrates the process of verifying unlocking, and below Figure 8 Briefly describe a process for a user to register using an electronic lock.

[0149] Such as Figure 8 As shown, first, according to the passage of the included in the first embodiment, the documents are authenticated and consistency, and after the operator's documents passed the fake and consistency, the operator's real-time face image is collected, and the real-time person The face image is processed to obtain a face image F3, wherein the face image F3 can be referred to in Example 1, and details are not described herein again.

[0150] The consistency between the face image F3 and the face image (F1 and F2) in the documents, when the face image F3 is consistent with the face images (F1 and F2) in the documents, receive the operator (user) The biometric information and contact information is entered, and the authorization period of the operator (user) is set. After the licens...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent unlocking method and a corresponding device. The intelligent unlocking method includes: obtaining the first identification information of the operator, and verifying the first identification information; Biometric information: verify the biometric information, and perform the unlocking operation after the biometric information is verified. The present invention adopts a combination scheme of at least two authentication methods, which has higher security and avoids the problem that a single authentication method is easily stolen and imitated. At the same time, after the first verification method is passed, the biometric information of the operator is verified, which further improves the security. In addition, the present invention provides multiple verification methods for the operator to choose, which improves the flexibility of the system. The method of the invention is simple and flexible in operation, has high verification accuracy, and significantly improves the security of the electronic lock verification system.

Description

Technical field [0001] The present invention belongs to the field of safety identification, and more particularly to an intelligent unlocking method and a corresponding device. Background technique [0002] Electronic locks as locked parts in the access control system, is an essential tool for safeguarding property and personal safety in daily life. [0003] With the advancement of science and technology, there are more and more types of electronic locks on the market, such as password lock, electronic magnetic card lock, fingerprint lock, and face recognition lock, etc. However, accompanied by the development of technology, and the way the unscrupulous molecules use technology unlocking also increases. For password lock and electronic magnetic card lock, once the password or electronic magnetic card is lost, such electronic locks can be easily unspeakable, the security is low; and the penalty lock is required to obtain the user's fingerprint information. Gloves are unlocked; for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
CPCG07C9/00563G07C9/00571
Inventor 尤新革彭勤牧韩曦
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products