CN109889899A - A kind of method of controlling child lock and system - Google Patents

A kind of method of controlling child lock and system Download PDF

Info

Publication number
CN109889899A
CN109889899A CN201910006670.7A CN201910006670A CN109889899A CN 109889899 A CN109889899 A CN 109889899A CN 201910006670 A CN201910006670 A CN 201910006670A CN 109889899 A CN109889899 A CN 109889899A
Authority
CN
China
Prior art keywords
safety
lock
safety post
child lock
function items
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910006670.7A
Other languages
Chinese (zh)
Inventor
郭巍巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Coship Electronics Co Ltd
Original Assignee
Shenzhen Coship Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Coship Electronics Co Ltd filed Critical Shenzhen Coship Electronics Co Ltd
Priority to CN201910006670.7A priority Critical patent/CN109889899A/en
Publication of CN109889899A publication Critical patent/CN109889899A/en
Pending legal-status Critical Current

Links

Landscapes

  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention belongs to field of communication technology, it is related to a kind of method of controlling child lock and system.The method of controlling child lock includes reading child lock to open situation, when child lock is in close state, opens child lock;When child lock is in the open state, the first safety post, and being compared with the first input information by the first safety post are transferred, into function items after comparing successfully;Read functions item safety lock open state, when function items safety lock is in close state, direct execution function items;When function items safety lock is in the open state, by executing function items after the success of function items safety check;The child lock is in the open state, further includes modifying the process of targeted security target after the first input information and the comparison success of the first safety post.The present invention use multi-level safety verification mode, with really it is specifically used in safety;Simultaneously using a variety of safety posts, it is applicable to more application scenarios.

Description

A kind of method of controlling child lock and system
Technical field
The invention belongs to intelligent appliance technical field, it is related to a kind of method of controlling child lock and system.
Background technique
With the continuous development of intelligent TV set, the function that smart television can be realized is also more and more, on-line subscription electricity It can also be realized by smart television depending on functions such as program, shopping;Simultaneously with the development of network, the provided section of smart television Mesh type is also more and more diversified.However for children, some function items of smart television are not appropriate for child resistant and one A little program categories are also not appropriate for children's viewing, that is, needing to be arranged corresponding child lock and carrying out limiting child makes smart television With.Existing television child lock, is mostly using verification modes such as single Password Inputs, safety coefficient is lower, is easy to by youngster Child passes through verification.
Summary of the invention
In view of the above-mentioned deficiencies in the prior art, it is an object of the present invention to provide a kind of method of controlling child lock that safety coefficient is high And system.
To achieve the goals above, the invention adopts the following technical scheme:
A kind of method of controlling child lock, comprising the following steps:
It reads child lock and opens situation, when child lock is in close state, open child lock;When child lock is in the open state, The first safety post, and being compared with the first input information by the first safety post are transferred, enters function items after comparing successfully;
Read functions item safety lock open state, when function items safety lock is in close state, direct execution function items;Work as function Item safety lock is in the open state, by executing function items after the success of function items safety check.
Further, the step of unlatching child lock includes opening child lock, typing safety post and to safety post It is saved after encryption.
Further, the function items safety check includes transferring the second safety post, and by the second safety post and Two input information are compared, and execute function items after comparing successfully.
Further, the child lock is in the open state further includes, the comparison of the first input information and the first safety post The process of the first safety post of resetting is executed after failure,
The process of the first safety post of the resetting includes transferring being compared with third input information for spare third safety post It is right, the first safety post is reset after comparing successfully, compares failure end operation.
Further, the child lock is in the open state, after the comparison success of the first input information and the first safety post It further include modifying the process of targeted security target;
The process of the modification targeted security target includes choosing the targeted security target to be modified, transferring the 4th safety post With the 4th input information comparison, compares successfully after modification targeted security target, and to modified targeted security target encrypt after It saves.
In addition, the present invention also provides a kind of children's lock control system, including memory and processor, the memory packet Children's lock control program and data center module are included, following step is realized when which is executed by the processor It is rapid:
It reads child lock and opens situation, when child lock is in close state, open child lock;When child lock is in the open state, The first safety post, and being compared with the first input information by the first safety post are transferred, enters function items after comparing successfully;
Read functions item safety lock open state, when function items safety lock is in close state, direct execution function items;Work as function Item safety lock is in the open state, by executing function items after the success of function items safety check.
Further, the step of unlatching child lock includes opening child lock, typing safety post and to safety post It is saved after encryption.
Further, the function items safety check includes transferring the second safety post, and by the second safety post and Two input information are compared, and execute function items after comparing successfully.
Further, the child lock is in the open state further includes, the comparison of the first input information and the first safety post The process of the first safety post of resetting is executed after failure,
The process of the first safety post of the resetting includes transferring being compared with third input information for spare third safety post It is right, the first safety post is reset after comparing successfully, compares failure end operation.
Further, the child lock is in the open state, after the comparison success of the first input information and the first safety post It further include modifying the process of targeted security target;
The process of the modification targeted security target includes choosing the targeted security target to be modified, transferring the 4th safety post With the 4th input information comparison, compares successfully after modification targeted security target, and to modified targeted security target encrypt after It saves.
Beneficial effects of the present invention:
The verification of settable two layers of the safety post of system of the invention, i.e., the verification of once safety target and function after child lock unlatching The verification of second of safety post under energy item safety lock open state, can be improved the safety of children's lock control system, avoids Virgin maloperation or the appearance for indulging problem;The verification of a variety of safety posts, such as iris recognition, fingerprint can be used to know for the present invention simultaneously The physical verifications mode such as bio-identifications and password, figure such as not, keeps the verification of the safety post of control system more diversified, can Suitable for more application scenarios.
Detailed description of the invention
Attached drawing 1 is the structural schematic diagram of children's lock control system in an embodiment;
Attached drawing 2 is the flow chart of one embodiment of method of controlling child lock;
Attached drawing 3 is the flow chart of another embodiment of method of controlling child lock;
Attached drawing 4 is the flow chart for modifying targeted security target.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments, Ying Li Solution, example embodiment of the application not by description disclosed herein are limited.Based on the embodiment in the application, the common skill in this field Art personnel every other embodiment obtained without making creative work belongs to the model of the application protection It encloses.
It is the structural schematic diagram in an embodiment of children's lock control system provided by the invention referring to shown in attached drawing 1.
Children's lock control system includes memory 10 and processor 20, and the memory 10 includes children's lock control journey Sequence 11 and data center module 12.
In embodiment, the memory 10 includes the readable storage medium storing program for executing of at least one type.At least one type The non-volatile memory mediums such as readable storage medium storing program for executing such as flash memory, hard disk, multimedia card.In some embodiments, described readable Storage medium can be the internal storage unit of children's lock control system, such as the storage hard disk of set-top box.Other one In a little embodiments, the storage medium can also be that children's lock control system exterior storage medium, such as grafting enter children Mobile hard disk, intelligent memory card, flash card of lock control system etc..
The storage medium of the memory 10 is stored with children's lock control program 11 and system parameter, system execute data Etc. information, the system parameter and system execute the data center module 12 that the information such as data are stored in memory 10.Some In embodiment, the system parameter includes the open state parameter, the information of safety post, function items safety lock opening state of child lock State parameter etc.;It includes that function items execute the information such as record that the system, which executes data,.
In embodiment, the processor 20 includes controller, and the verification which is used to control child lock compares and each The verification of function items safety lock compares and the execution of each function items.In some embodiments, the processor 20 can be center Processor, microprocessor or other data processing chips for the information in called data center module 12 and execute storage Children's lock control program 11 in device 10.
Memory 10, processor 20, children's lock control program 11 and the data of children's lock control system are illustrated only in Fig. 1 12 component of center module, reason it should be understood that, it is not required that the component of all implementations is shown, the implementation that can be substituted it is more or Less component.
In some embodiments, children's lock control system further includes input module such as keyboard, remote controler, microphone etc. Component, user can be by input modules to children's lock control system parameter setting, execution operation etc..
In some embodiments, children's lock control system may also include the network port, and the network port can be The communication interfaces such as radio network interface, wired network interface, wireless network card slot, so that user can be by mobile terminal to child lock Control system carries out the operation such as setting.
In the described embodiment, it can be realized such as when processor 20 executes the children's lock control program 11 stored in memory 10 Lower step:
It reads child lock and opens situation, when child lock is in close state, open child lock;When child lock is in the open state, The first safety post, and being compared with the first input information by the first safety post are transferred, enters function items after comparing successfully;
Read functions item safety lock open state, when function items safety lock is in close state, direct execution function items;Work as function Item safety lock is in the open state, by executing function items after the success of function items safety check.
About being discussed in detail for above-mentioned steps, stream of the following Fig. 2 to Fig. 4 about method of controlling child lock embodiment can refer to The explanation of journey figure.
Furthermore the present invention also provides a kind of method of controlling child lock.It is children described in embodiment referring to shown in attached drawing 2 The flow chart of lock control method, steps are as follows for execution:
For convenience of statement, the present embodiment is applied to state in the application scenarios of television channel selection, i.e., function items are to use The television channel of family selection.
Step S300 obtains the open state of child lock.
After television startup, the open state of child lock is transferred from data center module 12;When child lock is in opening state When state, continue directly to execute step S310;When child lock is in close state, step S301 is executed, opens child lock.
Step S301 opens child lock, encrypting storing typing safety post and to safety post.
When child lock is in close state, the function items of downlink, which are in, sets grey state;Open corresponding child lock Switch, typing safety post, and to data center module 11 is stored in after the encrypting of safety post, complete the unlatching of child lock Process continues to execute step S310.In some embodiments, the type of the safety post may include numerical ciphers, picture school It tests, the physics password such as graphical passwords.In some embodiments, the type of the safety post may also include fingerprint recognition, face is known Not, the biological informations password such as iris recognition, Application on Voiceprint Recognition;Other kinds of cryptogram form is not precluded in certain safety post.Afterwards The calling of safety post in continuous step process is transferred from the safety post of typing.
In some embodiments, when the safety post of typing is facial image, ciphering process is using Facebook The Deepface scheme of proposition specifically includes that using 3D model and does face alignment task;Depth convolutional neural networks for pair Human face characteristic point after neat carries out the classification learning of multiclass;Problem is carried out using classical cross entropy loss function (Softmax) Optimization;It is embedded in obtain the face feature vector of regular length finally by feature, and face feature vector is stored in data Core module 11.
In some embodiments, when the safety post of typing is iris image, ciphering process is using two-dimensional Gabor Small echo face recognition technology, main process includes: Image Acquisition, for obtaining iris image;Then, to the iris image of acquisition It is pre-processed, carries out the positioning of iris outer edge, normalization and enhancing processing;Feature extraction is carried out to iris image again, is obtained To the feature coding of iris texture;Characteristic matching is finally carried out, the iris feature of extraction is encoded and is matched with feature templates, To distinguish different irises.
The safety posts such as the middle numerical ciphers of the safety post, picture verification, fingerprint recognition ciphering process it is specific Implementation method is well known, its detailed process that details are not described herein.
Step S310 transfers the first safety post, and inputting with user by the first safety post from data center module 12 The first input information be compared, into function items after comparing successfully.
When child lock is in the open state, the first safety post is transferred from data center, user needs typing corresponding First input information, such as the first safety post transferred is numerical ciphers, user needs input numerical ciphers to be compared, when When the first safety post transferred is finger-print cipher, user needs to input corresponding fingerprint and is compared;When the of user's typing One input information and the first safety post compares successfully after enter downlink function items, execution step S320, at this time function items height It is bright.
In some embodiments, when the first safety post of user setting is the physics passwords such as numerical ciphers, picture verification, Because the physics passwords such as numerical ciphers, picture verification belong to the property lost password, that is, there is the case where user forgets Password, work as user When forgetting the password of the first safety post, the first input information of user's input and the comparison of the first safety post fail, Yong Huke It is logical to give cryptographic processes for change and give the first safety post for change, that is, reset the first safety post.
The process of the first safety post of the resetting includes: that spare third safety post is transferred from data center module 11, User inputs third and inputs information, and is compared with third safety post;The comparison of third input information and third safety post Success, the first new safety post of user's input, subsequently into the function items of downlink, execute step S320;Believe when third inputs When the comparison of breath and third safety post fails, end operation.The third safety post can be spare numerical ciphers, figure Password or safety problem etc.;The difference with the first safety post of the third safety post, such as the first safety post are set as several Word password 123456, third safety post are arranged to different numerical ciphers 654123 or other graphical passwords etc..Certainly, exist In other embodiment, the third safety post may also be arranged to the biological informations password such as fingerprint, facial image.
In some embodiments, the first safety post of user setting is the biology letter such as fingerprint, facial image, iris image When ceasing password, it is not easy the property lost password because the biological informations password such as fingerprint, facial image, iris image belongs to, both there is no forgot The case where remembering password, therefore when the comparison of the first input information and the first safety post fails, end operation.
Step S320, from 11 read functions item open state of data center module.
In the present embodiment, the function items are to play television channel;After user selects broadcasting channel, from data center module 11 read the safety lock open state information of the television channel to be watched, when television channel safety lock is in close state, directly It taps into broadcasting link.When television channel safety lock is in the open state, need to carry out safety check, specifically:
Step S321 judges the limiter stage of television channel, is directly entered when selected television channel is not belonging to limiter stage Play link;When television channel belongs to limiter stage, the verification that step S322 carries out safety post is executed;
Step S322 transfers the second safety post, and is compared with the second input information;
Transfer the second safety post from data center module 11, user's input the second input information, compare the second input information with Second safety post, it compares failure and then returns to channel selection process;Enter after comparing successfully and play link, is i.e. execution function items S330。
In some embodiments, the rank of the television channel may be configured as be suitble to adult viewing at grade, be suitble to Multiple ranks such as child's grade that the juvenile grade of teenager's viewing and suitable child watch, then at grade and teenager for child Grade belongs to limiter stage, need to be allowed for access by the verification of the second safety post when choosing limiter stage when selecting channel and play link, Verification failure not can enter broadcasting link then, and make to return to channel selection process.In specifically used, user be may choose whether out Open television channel safety lock.
In some embodiments, second safety post and the first safety post can be set to identical safety post, I.e. identical numerical ciphers or identical graphical passwords etc..Certainly, in other embodiments, the sum of the second safety post of Suo Hu First safety post can be configured as different safety post.
In embodiment, the safety post with input information comparison during include safety post decrypting process, institute The inverse operation of the decrypting process encryption engineering of safety post each other is stated, details are not described herein.
It is the flow chart of another embodiment of method of controlling child lock with reference to shown in attached drawing 3 and Fig. 4.It is specific to execute step It is as follows:
For convenience of statement, the present embodiment is applied to state in the application scenarios of payment function, i.e., function items be user into Row payment function.
S400 obtains the open state of child lock.
After television startup, the open state of child lock is transferred from data center module 12;When child lock is in opening state When state, continue directly to execute step S410;When child lock is in close state, step S401 is executed, opens child lock.
Step S401 opens child lock, encrypting storing typing safety post and to safety post.
When child lock is in close state, the function items of downlink, which are in, sets grey state;Open corresponding child lock Switch, typing safety post, and to data center module 11 is stored in after the encrypting of safety post, complete the unlatching of child lock Process continues to execute step S410.In some embodiments, the type of the safety post may include numerical ciphers, picture school It tests, the physics password such as graphical passwords.In some embodiments, the type of the safety post may also include fingerprint recognition, face is known Not, the biological informations password such as iris recognition, Application on Voiceprint Recognition.Peace of the calling of safety post during subsequent step from typing It is transferred in full target.
Step S410 transfers the first safety post, and inputting with user by the first safety post from data center module 12 The first input information be compared, into function items after comparing successfully.
When child lock is in the open state, the first safety post is transferred from data center, user needs typing corresponding First input information, such as the first safety post transferred is numerical ciphers, user needs input numerical ciphers to be compared, when When the first safety post transferred is finger-print cipher, user needs to input corresponding fingerprint and is compared;When the of user's typing One input information and the first safety post compares successfully after enter downlink function items, execution step S420, at this time function items height It is bright.
Step S420, from 11 read functions item open state of data center module.
In the present embodiment, the function items are payment function;After user selects payment function, read from data center module 11 The open state information for taking payment function safety lock is directly entered flow of payments when payment function safety lock is in close state Journey, user can be done directly delivery operation.When payment function safety lock is in the open state, need by safety check step S430。
Step S430 transfers the second safety post, by being compared for the second input information and the second safety post.
Specifically, transferring the second safety post from data center module 11, user's input the second input information compares second Information and the second safety post are inputted, when comparing failure, end operation;When comparing successfully, execute function items S440, i.e., into Enter payment function, completes delivery operation.When specifically used, user may choose whether to open the safety lock of payment function.
In some embodiments, when some or all of safety post of user's typing is physics password, when user opens TV is opened after the verification of the first safety post, can also carry out the amendment step S450 of the safety post of physics password type.
Step S450 modifies targeted security target.
User selects the targeted security target to be modified, carries out that targeted security target can be carried out after verifying successfully to user Modification process.In some embodiments, the targeted security target can be the first safety post, the second safety post, third One or more of safety post.
Specifically, transfer the 4th safety post from data center module 11, the 4th input information of user's input and with the 4th The comparison of safety post can modify targeted security target, and encrypt to modified targeted security target after comparing successfully, It is stored in data center module 11;When the comparison of the 4th input information of user's input and the 4th safety post fails, then return Upper level executes step.In some embodiments, the 4th safety post can be identical with the first safety post, i.e., when modification the One safety post when, the 4th safety post is synchronized to modify.In other embodiments, the 4th safety post can be with The difference of one safety post.
In some embodiments, the function items may also include Anti-addiction, and when TV is opened after a certain period of time, progress is safe Verification, can carry out continuing to watch after.
The embodiment for needing to enumerate in specification is a part in embodiment, and the implementation steps in each embodiment can It is combined with each other, realizes different implementation processes.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence " including one ... ", it is not excluded that There is also other identical elements in the process, method, article or apparatus that includes the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can Without departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest Range.

Claims (10)

1. a kind of method of controlling child lock, which comprises the following steps:
It reads child lock and opens situation, when child lock is in close state, open child lock;When child lock is in the open state, The first safety post, and being compared with the first input information by the first safety post are transferred, enters function items after comparing successfully;
Read functions item safety lock open state, when function items safety lock is in close state, direct execution function items;Work as function Item safety lock is in the open state, by executing function items after the success of function items safety check.
2. method of controlling child lock according to claim 1, which is characterized in that the step of unlatching child lock includes, Open child lock, typing safety post and to being saved after the encryption of safety post.
3. method of controlling child lock according to claim 1 or 2, which is characterized in that the function items safety check includes, The second safety post, and being compared with the second input information by the second safety post are transferred, executes function items after comparing successfully.
4. method of controlling child lock according to claim 1, which is characterized in that the child lock is in the open state also to wrap It includes, the process of the first safety post of resetting is executed after the comparison failure of the first input information and the first safety post,
The process of the first safety post of the resetting includes transferring being compared with third input information for spare third safety post It is right, the first safety post is reset after comparing successfully, compares failure end operation.
5. method of controlling child lock according to claim 1, which is characterized in that the child lock is in the open state, the It further include modifying the process of targeted security target after one input information and the comparison success of the first safety post;
The process of the modification targeted security target includes choosing the targeted security target to be modified, transferring the 4th safety post With the 4th input information comparison, compares successfully after modification targeted security target, and to modified targeted security target encrypt after It saves.
6. a kind of children's lock control system, including memory and processor, which is characterized in that the memory includes children's lock control Processing procedure sequence and data center module, children's lock control program realize following steps when being executed by the processor:
It reads child lock and opens situation, when child lock is in close state, open child lock;When child lock is in the open state, The first safety post, and being compared with the first input information by the first safety post are transferred, enters function items after comparing successfully;
Read functions item safety lock open state, when function items safety lock is in close state, direct execution function items;Work as function Item safety lock is in the open state, by executing function items after the success of function items safety check.
7. children's lock control system according to claim 6, which is characterized in that the step of unlatching child lock includes, Open child lock, typing safety post and to being saved after the encryption of safety post.
8. children's lock control system according to claim 6, which is characterized in that the function items safety check includes adjusting The second safety post, and being compared with the second input information by the second safety post are taken, executes function items after comparing successfully.
9. children's lock control system according to claim 6, which is characterized in that the child lock is in the open state also to wrap It includes, the process of the first safety post of resetting is executed after the comparison failure of the first input information and the first safety post,
The process of the first safety post of the resetting includes transferring being compared with third input information for spare third safety post It is right, the first safety post is reset after comparing successfully, compares failure end operation.
10. children's lock control system according to claim 6, which is characterized in that the child lock is in the open state, the It further include modifying the process of targeted security target after one input information and the comparison success of the first safety post;
The process of the modification targeted security target includes choosing the targeted security target to be modified, transferring the 4th safety post With the 4th input information comparison, compares successfully after modification targeted security target, and to modified targeted security target encrypt after It saves.
CN201910006670.7A 2019-01-04 2019-01-04 A kind of method of controlling child lock and system Pending CN109889899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910006670.7A CN109889899A (en) 2019-01-04 2019-01-04 A kind of method of controlling child lock and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910006670.7A CN109889899A (en) 2019-01-04 2019-01-04 A kind of method of controlling child lock and system

Publications (1)

Publication Number Publication Date
CN109889899A true CN109889899A (en) 2019-06-14

Family

ID=66925508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910006670.7A Pending CN109889899A (en) 2019-01-04 2019-01-04 A kind of method of controlling child lock and system

Country Status (1)

Country Link
CN (1) CN109889899A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113835349A (en) * 2021-09-23 2021-12-24 珠海格力电器股份有限公司 Child lock control method and device, electronic equipment and computer-readable storage medium
CN114694228A (en) * 2022-04-07 2022-07-01 北京零零易科技有限公司 Recognition management system and method for unregistered personnel

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005340972A (en) * 2004-05-24 2005-12-08 Funai Electric Co Ltd Broadcasting receiver
CN101662659A (en) * 2009-09-08 2010-03-03 中兴通讯股份有限公司 Internet protocol television child lock control method and electronic program guide server
CN104837062A (en) * 2014-02-11 2015-08-12 潘林星 Method for controlling encryption of digital television
CN105844122A (en) * 2016-01-26 2016-08-10 乐视致新电子科技(天津)有限公司 Unlocking password setting method, terminal equipment, and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005340972A (en) * 2004-05-24 2005-12-08 Funai Electric Co Ltd Broadcasting receiver
CN101662659A (en) * 2009-09-08 2010-03-03 中兴通讯股份有限公司 Internet protocol television child lock control method and electronic program guide server
CN104837062A (en) * 2014-02-11 2015-08-12 潘林星 Method for controlling encryption of digital television
CN105844122A (en) * 2016-01-26 2016-08-10 乐视致新电子科技(天津)有限公司 Unlocking password setting method, terminal equipment, and server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113835349A (en) * 2021-09-23 2021-12-24 珠海格力电器股份有限公司 Child lock control method and device, electronic equipment and computer-readable storage medium
CN113835349B (en) * 2021-09-23 2023-09-05 珠海格力电器股份有限公司 Child lock control method, device, electronic equipment and computer readable storage medium
CN114694228A (en) * 2022-04-07 2022-07-01 北京零零易科技有限公司 Recognition management system and method for unregistered personnel

Similar Documents

Publication Publication Date Title
US9268990B2 (en) Apparatus and method for producing an identification device
CN108922074A (en) Without card withdrawal method, apparatus, computer equipment and storage medium
WO2020006252A1 (en) Biometric authentication
CN109325327A (en) For updating the process of the template used in face recognition
EP1879127A1 (en) User authentication method and system and password management system
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
CN101494690A (en) Mobile terminal and unlocking method thereof
US20140143860A1 (en) Two tier verification system and method
CN109147104A (en) A kind of electronic lock and its verification method of double verification
TWI785292B (en) Authentication system, authentication device, authentication method, and program product
CN103903318A (en) Identity authentication system and identity authentication method in home care based on gesture recognition
TW201545125A (en) Access control apparatus and register system and register method thereof
CN207198943U (en) Finger vein identification access control system based on intelligent management
CN109858220A (en) Electronic contract signs method, apparatus, terminal device and storage medium
CN207780878U (en) A kind of access control system based on characteristics of human body's identification
CN109889899A (en) A kind of method of controlling child lock and system
CN101504784A (en) Bio-authentication control method
Addy et al. Physical access control based on biometrics and GSM
CN109147108A (en) A kind of method and apparatus of entrance guard management
CN106600246A (en) Anti-theft method of bank card
CN209199180U (en) Provide the smart bluetooth locker of bracelet card
CN210605840U (en) Multi-functional safety lock device based on multi-module authentication
EP3270313B1 (en) Optical authorization method for programs and files
Manju et al. Improving net banking security with face recognition based bio-metric verification
Efremov et al. Security and Electronic Identification Technologies in Latin Countries

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190614