CN105644500A - Car door opening control method based on wireless security and protection system - Google Patents

Car door opening control method based on wireless security and protection system Download PDF

Info

Publication number
CN105644500A
CN105644500A CN201610082367.1A CN201610082367A CN105644500A CN 105644500 A CN105644500 A CN 105644500A CN 201610082367 A CN201610082367 A CN 201610082367A CN 105644500 A CN105644500 A CN 105644500A
Authority
CN
China
Prior art keywords
value
steps
image
region
encryption module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610082367.1A
Other languages
Chinese (zh)
Other versions
CN105644500B (en
Inventor
海狄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Radio and TV University
Original Assignee
Chongqing Radio and TV University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Radio and TV University filed Critical Chongqing Radio and TV University
Priority to CN201610082367.1A priority Critical patent/CN105644500B/en
Publication of CN105644500A publication Critical patent/CN105644500A/en
Application granted granted Critical
Publication of CN105644500B publication Critical patent/CN105644500B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/23Means to switch the anti-theft system on or off using manual input of alphanumerical codes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/20Means to switch the anti-theft system on or off
    • B60R25/25Means to switch the anti-theft system on or off using biometry

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Facsimile Transmission Control (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a car door opening control method based on a wireless security and protection system and belongs to the field of vehicle security and protection. The car door opening control method comprises the steps that a face image of a user is obtained in advance, stored and encrypted; the face image is matched with a mobile phone of the user through a Bluetooth receiving and dispatching module, and an unlock password is input by the user; a face image is collected through image collecting equipment, and an image to be matched is obtained; after the stored and encrypted face image is decrypted, the to-be-matched image obtained through the image collecting equipment is matched with the decrypted face image; and when the to-be-matched image obtained through the image collecting equipment is successfully matched with the decrypted face image, an electric car door lock is controlled to be opened through a controller. According to the car door opening control method based on the wireless security and protection system, Bluetooth pairing is conducted between the generated password and the wireless security and protection system, after matching is successful, face recognition and matching are conducted, and then the car door lock is unlocked; compared with an existing car door opening control method, the car door opening control method based on the wireless security and protection system is safer.

Description

Based on the car door opening control method of wireless security system
Technical field
The invention belongs to security of vehicle field, particularly relate to a kind of car door opening control method.
Background technology
In order to prevent vehicle stolen, the reliable switch problem of car door is considered as the technology that can not be ignored by vehicular manufacturer. With regard to the current state of the art, although car door switch is of a great variety, but, what great majority adopted is machinery or electronics password technology. Have been reported display, because the password of car door lock is cracked and make stolen articles or vehicle in car stolen, of common occurrence. Therefore, the vehicle having a set of intelligent switch car door obviously becomes the reality that people wish day by day.
In prior art, common are and utilize the car door switch car key switch of cipher inputting keyboard and former automobile as input sensor, and coordinate with error code identification circuit, spoon control identify circuit, enabling Time-delayed trigger circuit etc., add door opening timing alarm, press the warning of password key by mistake, miss functions such as inserting car key warning, damage preventing alarm, anti-robbery warning. The prior art is only that " add door opening timing alarm, press the warning of password key by mistake, miss functions such as inserting car key warning, damage preventing alarm, anti-robbery warning ", in order to improve " antitheft function ", does not have real intelligent anti-theft function.
Summary of the invention
Because the above-mentioned defect of prior art, technical problem to be solved by this invention is to provide and a kind of can realize the safer control method of car door opening.
For achieving the above object, the present invention provides a kind of car door opening control method based on wireless security system, and described automobile wireless safety-protection system comprises image capture device, bluetooth transceiver module, the first wireless signal transceiver module, the 2nd wireless signal transceiver module, controller and electronics car door lock; The signal output terminal of described image capture device connects the signal input terminus of described controller; Described controller and described bluetooth transceiver module are bi-directionally connected; Described controller and the first wireless signal transceiver module are bi-directionally connected, and it is mutual that described first wireless signal transceiver module and the 2nd wireless signal transceiver module carry out wireless data, and described 2nd wireless signal transceiver module and upper computer are bi-directionally connected; The control signal output terminal of described controller connects the control signal input terminus of described electronics car door lock; Comprise the following steps:
Step one, obtain user's facial image and carry out storage encryption;
Step 2, being matched by bluetooth transceiver module and user mobile phone, user inputs unlocking pin;
Step 3, by the facial image of image capture device collection close to car door person, obtain image to be matched;
Step 4, to store face encryption image be decrypted;
Step 5, the image to be matched obtained by image capture device mate with the facial image after deciphering; When the match is successful for the facial image after the image to be matched that image capture device obtains with deciphering, upper computer sends a signal to controller, and controller transmits control signal and makes it open to described electronics car door lock; Terminate when the image to be matched that image capture device obtains mates unsuccessful with the facial image after deciphering;
Obtain user's facial image described in step one and carry out in storage encryption, the encryption of user's facial image is carried out according to the following steps:
Steps A 1, obtained resolving power by image capture device be the square facial image of a*a, and described a is positive integer;
Steps A 2, to set any pixel in described facial image be Pij, obtain pixel PijRgb value, described i, j are positive integer, and 1��i��a, 1��j��a;
Steps A 3, by pixel PijR value, G value and B value be converted to corresponding hexadecimal values respectively;
Judge pixel PijSexadecimal number system R value, sexadecimal number system G value and sexadecimal number system B value whether reach two;
As pixel PijSexadecimal number system R value, sexadecimal number system G value or sexadecimal number system B value less than two time, add a character G at this less than the sexadecimal number system value left side of two, to form pixel PijTwo R value character strings, two G value character strings and two B value character strings, then perform steps A 4; As pixel PijSexadecimal number system R value, sexadecimal number system G value or sexadecimal number system B value be when reaching two, performs steps A 4;
Steps A 4, by pixel PijTwo R value character strings, two G value character strings and two B value character strings are arranged in order from left to right and form first step string;
Steps A 5, the hexadecimal values that i and j is converted to respectively correspondence;
Judge whether the sexadecimal number system value of i or the sexadecimal number system value of j reach four; When the sexadecimal number system value of i or the sexadecimal number system value of j are less than four, add character G at this less than the sexadecimal number system value left side of four, with four character strings of four character strings and j that form i, then perform steps A 6; When the sexadecimal number system value of i or the sexadecimal number system value of j reach four, perform steps A 6;
Steps A 6, the left side that the four of j character strings are added to described first step string, and the four of i character strings are added to the left side of four character strings of described j, to form second stage string;
Steps A 7, described facial image is divided into 16*16 square area T 1 , 1 T 1 , 2 ... ... T 1 , 16 T 2 , 1 T 2 , 2 ... ... T 2 , 16 ... ... ... ... ... ... ... ... T 16 , 1 T 16 , 2 ... ... T 16 , 16 , Choose described pixel PijThe region T at placeM, n, m, n are positive integer and 1��m��16,1��n��16;
Steps A 8, judge whether second stage string has character G; When comprising character G in the 2nd string, being replaced by the character G in the string of the second stage is 0, then performs steps A 9; When the 2nd string does not have character G, perform steps A 9;
Steps A 9, the figure place last setting described second stage string are Q1, the figure place second from the bottom setting described second stage string is Q2;
By Q1And Q2Be converted to decimal value respectively; Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21; Described 1��Q11�� 16, described 1��Q21�� 16;
Calculate T x , y = T m + 1 , n + 1 i f m &GreaterEqual; Q 11 a n d n &GreaterEqual; Q 21 T m + 1 , n - 1 i f m &GreaterEqual; Q 11 a n d n < Q 21 T m - 1 , n + 1 i f m < Q 11 a n d n &GreaterEqual; Q 21 T m - 1 , n - 1 i f m < Q 11 a n d n < Q 21 Obtain the first target area TX, y;
By TM, nWith TX, yReplace;
Steps A 10, the first row region and territory, zone are replaced; 2nd row region and four lines region are replaced; Fifth line region and the 7th row region are replaced; 6th row region and the 8th row region are replaced; 9th row region and the tenth a line region are replaced; Tenth row region and the 12 row region are replaced; Tenth territory, zone and the tenth five-element region are replaced; Tenth four lines region and the 16 row region are replaced;
Described second stage string is the unlocking pin in described step 2;
The face encryption image stored is decrypted by step 4 and carries out according to the following steps:
S1, encrypted image is divided into 16*16 square area T 1 , 1 T 1 , 2 ... ... T 1 , 16 T 2 , 1 T 2 , 2 ... ... T 2 , 16 ... ... ... ... ... ... ... ... T 16 , 1 T 16 , 2 ... ... T 16 , 16 , The first row to four lines region is the first encryption module, fifth line to the 8th row region be the 2nd encryption module, the 9th walk to the 12 row region be the 3rd encryption module, the 13 walk to the 16 row region be the 4th encryption module;
S2, the password receiving user's input;
Whether S3, the password judging described user and inputting are 14 figure place strings; When the password of user's input is 14 figure place string, perform step S4; When the password of user's input is not 14 figure place string, returns and perform step S2;
S4, judge input password in whether have character G; When comprising character G in password, being replaced by the character G in password is 0, then performs step S5; When password does not have character G, perform step S5;
S5, parallel carry out region determine and rgb value conversion;
Described region is determined to carry out according to the following steps:
B1, the 1 to 4 figure place extracting password from left to right form third stage string, and convert thereof into decimal value U1; The 5 to 8 figure place extracting password from left to right forms fourth stage string, and converts thereof into decimal value U2;
Extract the 14th figure place of password from left to right, and convert thereof into decimal value U3; Extract the 13rd figure place of password from left to right, and convert thereof into decimal value U4;
B2, choose region T to be changedR, t, r, t are positive integer and 1��r��16,1��t��16:
CalculateObtain r, calculateObtain t; Value according to r and t chooses region T to be changedR, t;
B3, calculating U31=U3+ 1 obtains U31, calculate U41=U4+ 1 obtains U41; Described 1��U31�� 16, described 1��U41�� 16;
Calculate T p , q = T r + 1 , t + 1 i f r &GreaterEqual; U 31 a n d t &GreaterEqual; U 41 T r + 1 , t - 1 i f r &GreaterEqual; U 31 a n d t < U 41 T r - 1 , t + 1 i f r < U 31 a n d t &GreaterEqual; U 41 T r - 1 , t - 1 i f r < U 31 a n d t < U 41 Obtain the 2nd target area TP, q; Described 1��p��16, described 1��q��16;
B4, selection TP, qCorresponding encryption module, and this encryption module is decrypted: the 3rd row of the first row of this encryption module and this encryption module is replaced, the four lines of the 2nd row of this encryption module and this encryption module is replaced;
B5, judgementWhether with TP, qIt is positioned at same encryption module; WhenWith TP, qWhen being positioned at same encryption module, perform step B6; WhenWith TP, qNot when same encryption module, willPlace encryption module is decrypted: willThe first row of place encryption module and the 3rd row of this encryption module are replaced, will2nd row of place encryption module and the four lines of this encryption module are replaced, and then perform step B6;
B6, by TR, tWith TP, qReplace;
The conversion of described rgb value carries out according to the following steps:
The the 9th and the 10th figure place extracting password from left to right forms Pyatyi string, and converts thereof into decimal value U5; The the 11st and the 12nd figure place extracting password from left to right forms the 6th grade of string, and converts thereof into decimal value U6; The the 13rd and the 14th figure place extracting password from left to right forms the 7th grade of string, and converts thereof into decimal value U7;
S6, carry out rgb value coupling:
Selected pixels point1��i��a, 1��j��a, and i, j, a be positive integer; WillR value, G value and B value respectively with U5��U6And U7Contrast; JudgeR value whether equal U5, whenR value be not equal to U5Time, terminate deciphering; WhenR value equal U5Time, judgeG value whether equal U6; WhenG value be not equal to U6Time, terminate deciphering; WhenG value equal U6Time, judgeB value whether equal U7; WhenB value be not equal to U7Time, terminate deciphering; WhenB value whether equal U7Time, perform step S7;
S7, successively judge first encryption module to the 4th encryption module, whether be decrypted; The encryption module not being decrypted is decrypted:
3rd row of the first row of non-enabling decryption of encrypted module and this encryption module is replaced, the four lines of the 2nd row of non-enabling decryption of encrypted module and this encryption module is replaced.
Adopt above technical scheme, it is possible to according to user's facial image adaptive generation password, and formation speed is fast, and can be encrypted in conjunction with the codon pair image of generation, so that the facial image stored is protected. Even if the data on backstage are stolen, the safety of whole system and car door opening control method also can be ensured. Meanwhile, user carries out Bluetooth pairing by password and the wireless security system generated, and carries out face coupling again after Bluetooth matching success, and then untie car door lock, comparing existing car door opening control mode, safer, bluetooth is once match after successfully, once corresponding Bluetooth signal be detected, later change can be dynamically connected certainly, owing to Bluetooth transmission is apart from short, therefore can expand and realize after car door, directly carry out recognition of face, improve ease of use further.
Preferably, it is characterized in that: described steps A 7 is chosen described pixel PijThe region T at placeM, nCarry out according to the following steps:
CalculateObtain m, calculateObtain n; Value chosen area T according to m and nM, n��
Preferably, in steps A 1, obtain, by image capture device, the square facial image that resolving power is a*a and carry out according to the following steps:
Obtaining resolving power by image capture device is the facial image of a*b, and a is the pixel quantity of horizontal direction, and b is the pixel quantity of vertical direction;
Judge whether a > b;
As a > b time, calculate W1=a-b, obtains number W to be increased1, then vertically add W1Individual rgb value is the pixel of 0,0,0, then performs steps A 2;
When a < during b, calculates W2=b-a, obtains number W to be increased2, then add W in the horizontal direction2Individual rgb value is the pixel of 0,0,0, and by the numerical value assignment of b to a, then performs steps A 2;
As a=b, perform steps A 2.
The invention has the beneficial effects as follows: the present invention can according to user's facial image adaptive generation password, and password formation speed is fast, and can be encrypted in conjunction with the codon pair image of generation, to be protected by image. The present invention does not need additionally image to be carried out artificial setting code, but automatically generate unique password by facial image, this password privacy degrees height and the restructuring with image adapt, later stage is when deciphering, image decryption can be directly carried out according to password, compared with traditional image decryption mode, the present invention need not retrodict according to ciphering process, it is to increase the security of image encryption. Meanwhile, user carries out Bluetooth pairing by password and the wireless security system generated, and carries out face coupling again, and then unties car door lock, compare existing car door opening control mode after Bluetooth matching success, safer.
Accompanying drawing explanation
Fig. 1 is the schematic circuit diagram of wireless security system of the present invention.
Embodiment
Below in conjunction with drawings and Examples, the invention will be further described:
As shown in Figure 1, a kind of wireless security system, described automobile wireless safety-protection system comprises image capture device 1, bluetooth transceiver module 2, first wireless signal transceiver module 3, the 2nd wireless signal transceiver module 4, controller 5 and electronics car door lock 6; The signal output terminal of described image capture device 1 connects the signal input terminus of described controller 5; Described controller 5 is bi-directionally connected with described bluetooth transceiver module 2; Described controller 5 and the first wireless signal transceiver module 3 are bi-directionally connected, and it is mutual that described first wireless signal transceiver module 3 and the 2nd wireless signal transceiver module 4 carry out wireless data, and described 2nd wireless signal transceiver module 4 is bi-directionally connected with upper computer 7; The control signal output terminal of described controller 5 connects the control signal input terminus of described electronics car door lock 6; In the present embodiment, image capture device is pinhole cameras. In the present embodiment, upper computer is computer. In the present embodiment, electronics car door lock 6 comprises electronic switch, rly. and machinery knocker, the control signal input port of electronic switch and the input interface of electronics car door lock, the control signal output terminal of described controller connects the control signal input terminus of described electronic switch, the source electrode of electronic switch and anode are connected with the positive pole of vehicle-mounted 24V volts DS, the drain electrode of electronic switch, namely negative electrode is connected with the positive pole of rly., the negative pole of rly. is connected with the negative pole of vehicle-mounted 24V volts DS, the action of rly. iron core servounit knocker. Described controller control electronics car door lock is opened as prior art, does not repeat them here.
A kind of car door opening control method based on wireless security system comprises the following steps:
Step one, obtain user's facial image and carry out storage encryption.
Step 2, being matched by bluetooth transceiver module 2 and user mobile phone, user inputs unlocking pin;
Step 3, gather the facial image close to car door person by image capture device 1, obtain image to be matched; Described close to car door person be the successful user of Bluetooth matching.
Step 4, to described in step one store face encryption image be decrypted.
Step 5, the image to be matched obtained by image capture device 1 mate with the facial image after deciphering; When the match is successful for the facial image after the image to be matched that image capture device 1 obtains with deciphering, upper computer 7 sends a signal to controller 5, and controller 5 transmits control signal and makes it open to described electronics car door lock 6; Terminate when the image to be matched that image capture device 1 obtains mates unsuccessful with the facial image after deciphering. In the present embodiment, the match is successful for facial image after image to be matched and deciphering for half or more of face image pixel point number after the facial image same pixel point after image to be matched and deciphering reaches deciphering is successfully, in other embodiments, facial image after image to be matched and deciphering the match is successful can also be image to be matched with decipher after facial image completely mutually equal, image to be matched mates for ripe prior art with the facial image after deciphering, it is not the inventive point of the present invention, does not repeat them here.
Obtain user's facial image described in step one and carry out in storage encryption, the encryption of user's facial image is carried out according to the following steps:
Steps A 1, obtained resolving power by image capture device be the square facial image of a*a, and described a is positive integer;
Steps A 2, to set any pixel in described facial image be Pij, obtain pixel PijRgb value, described i, j are positive integer, and 1��i��a, 1��j��a;
Steps A 3, by pixel PijR value, G value and B value be converted to corresponding hexadecimal values respectively;
Judge pixel PijSexadecimal number system R value, sexadecimal number system G value and sexadecimal number system B value whether reach two;
As pixel PijSexadecimal number system R value, sexadecimal number system G value or sexadecimal number system B value less than two time, add a character G at this less than the sexadecimal number system value left side of two, to form pixel PijTwo R value character strings, two G value character strings and two B value character strings, then perform steps A 4; As pixel PijSexadecimal number system R value, sexadecimal number system G value or sexadecimal number system B value be when reaching two, performs steps A 4;
Steps A 4, by pixel PijTwo R value character strings, two G value character strings and two B value character strings are arranged in order from left to right and form first step string;
Steps A 5, the hexadecimal values that i and j is converted to respectively correspondence;
Judge whether the sexadecimal number system value of i or the sexadecimal number system value of j reach four; When the sexadecimal number system value of i or the sexadecimal number system value of j are less than four, add character G at this less than the sexadecimal number system value left side of four, with four character strings of four character strings and j that form i, then perform steps A 6; When the sexadecimal number system value of i or the sexadecimal number system value of j reach four, perform steps A 6;
Steps A 6, the left side that the four of j character strings are added to described first step string, and the four of i character strings are added to the left side of four character strings of described j, to form second stage string;
Steps A 7, described facial image is divided into 16*16 square area T 1 , 1 T 1 , 2 ... ... T 1 , 16 T 2 , 1 T 2 , 2 ... ... T 2 , 16 ... ... ... ... ... ... ... ... T 16 , 1 T 16 , 2 ... ... T 16 , 16 , Choose described pixel PijThe region T at placeM, n, m, n are positive integer and 1��m��16,1��n��16;
Steps A 8, judge whether second stage string has character G; When comprising character G in the 2nd string, being replaced by the character G in the string of the second stage is 0, then performs steps A 9; When the 2nd string does not have character G, perform steps A 9;
Steps A 9, the figure place last setting described second stage string are Q1, the figure place second from the bottom setting described second stage string is Q2;
By Q1And Q2Be converted to decimal value respectively; Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21; Described 1��Q11�� 16, described 1��Q21�� 16;
Calculate T x , y = T m + 1 , n + 1 i f m &GreaterEqual; Q 11 a n d n &GreaterEqual; Q 21 T m + 1 , n - 1 i f m &GreaterEqual; Q 11 a n d n < Q 21 T m - 1 , n + 1 i f m < Q 11 a n d n &GreaterEqual; Q 21 T m - 1 , n - 1 i f m < Q 11 a n d n < Q 21 Obtain the first target area TX, y;
By TM, nWith TX, yReplace;
Steps A 10, the first row region and territory, zone are replaced; 2nd row region and four lines region are replaced; Fifth line region and the 7th row region are replaced; 6th row region and the 8th row region are replaced; 9th row region and the tenth a line region are replaced; Tenth row region and the 12 row region are replaced; Tenth territory, zone and the tenth five-element region are replaced; Tenth four lines region and the 16 row region are replaced;
Described second stage string is the unlocking pin in described step 2;
The face encryption image stored is decrypted by step 4 and carries out according to the following steps:
S1, encrypted image is divided into 16*16 square area T 1 , 1 T 1 , 2 ... ... T 1 , 16 T 2 , 1 T 2 , 2 ... ... T 2 , 16 ... ... ... ... ... ... ... ... T 16 , 1 T 16 , 2 ... ... T 16 , 16 , The first row to four lines region is the first encryption module, fifth line to the 8th row region be the 2nd encryption module, the 9th walk to the 12 row region be the 3rd encryption module, the 13 walk to the 16 row region be the 4th encryption module;
S2, the password receiving user's input;
Whether S3, the password judging described user and inputting are 14 figure place strings; When the password of user's input is 14 figure place string, perform step S4; When the password of user's input is not 14 figure place string, returns and perform step S2;
S4, judge input password in whether have character G; When comprising character G in password, being replaced by the character G in password is 0, then performs step S5; When password does not have character G, perform step S5;
S5, parallel carry out region determine and rgb value conversion;
Described region is determined to carry out according to the following steps:
B1, the 1 to 4 figure place extracting password from left to right form third stage string, and convert thereof into decimal value U1; The 5 to 8 figure place extracting password from left to right forms fourth stage string, and converts thereof into decimal value U2;
Extract the 14th figure place of password from left to right, and convert thereof into decimal value U3; Extract the 13rd figure place of password from left to right, and convert thereof into decimal value U4;
B2, choose region T to be changedR, t, r, t are positive integer and 1��r��16,1��t��16:
CalculateObtain r, calculateObtain t; Value according to r and t chooses region T to be changedR, t;
B3, calculating U31=U3+ 1 obtains U31, calculate U41=U4+ 1 obtains U41; Described 1��U31�� 16, described 1��U41�� 16;
Calculate T p , q = T r + 1 , t + 1 i f r &GreaterEqual; U 31 a n d t &GreaterEqual; U 41 T r + 1 , t - 1 i f r &GreaterEqual; U 31 a n d t < U 41 T r - 1 , t + 1 i f r < U 31 a n d t &GreaterEqual; U 41 T r - 1 , t - 1 i f r < U 31 a n d t < U 41 Obtain the 2nd target area TP, q; Described 1��p��16, described 1��q��16;
B4, selection TP, qCorresponding encryption module, and this encryption module is decrypted: the 3rd row of the first row of this encryption module and this encryption module is replaced, the four lines of the 2nd row of this encryption module and this encryption module is replaced;
B5, judgementWhether with TP, qIt is positioned at same encryption module; WhenWith TP, qWhen being positioned at same encryption module, perform step B6; WhenWith TP, qNot when same encryption module, willPlace encryption module is decrypted: willThe first row of place encryption module and the 3rd row of this encryption module are replaced, will2nd row of place encryption module and the four lines of this encryption module are replaced, and then perform step B6;
B6, by TR, tWith TP, qReplace;
The conversion of described rgb value carries out according to the following steps:
The the 9th and the 10th figure place extracting password from left to right forms Pyatyi string, and converts thereof into decimal value U5; The the 11st and the 12nd figure place extracting password from left to right forms the 6th grade of string, and converts thereof into decimal value U6; The the 13rd and the 14th figure place extracting password from left to right forms the 7th grade of string, and converts thereof into decimal value U7;
S6, carry out rgb value coupling:
Selected pixels point1��i��a, 1��j��a, and i, j, a be positive integer; WillR value, G value and B value respectively with U5��U6And U7Contrast; JudgeR value whether equal U5, whenR value be not equal to U5Time, terminate deciphering; WhenR value equal U5Time, judgeG value whether equal U6; WhenG value be not equal to U6Time, terminate deciphering; WhenG value equal U6Time, judgeB value whether equal U7; WhenB value be not equal to U7Time, terminate deciphering; WhenB value whether equal U7Time, perform step S7;
S7, successively judge first encryption module to the 4th encryption module, whether be decrypted; The encryption module not being decrypted is decrypted:
3rd row of the first row of non-enabling decryption of encrypted module and this encryption module is replaced, the four lines of the 2nd row of non-enabling decryption of encrypted module and this encryption module is replaced.
In the present embodiment, described steps A 7 is chosen described pixel PijThe region T at placeM, nCarry out according to the following steps:
CalculateObtain m, calculateObtain n; Value chosen area T according to m and nM, n��
In the present embodiment, in steps A 1, obtain, by image capture device, the square facial image that resolving power is a*a and carry out according to the following steps:
Obtaining resolving power by image capture device is the facial image of a*b, and a is the pixel quantity of horizontal direction, and b is the pixel quantity of vertical direction;
Judge whether a > b;
As a > b time, calculate W1=a-b, obtains number W to be increased1, then vertically add W1Individual rgb value is the pixel of 0,0,0, then performs steps A 2;
When a < during b, calculates W2=b-a, obtains number W to be increased2, then add W in the horizontal direction2Individual rgb value is the pixel of 0,0,0, and by the numerical value assignment of b to a, then performs steps A 2;
As a=b, perform steps A 2.
Below the preferred embodiment of the present invention is described in detail. It is to be understood that the those of ordinary skill of this area just can make many modifications and variations according to the design of the present invention without the need to creative work. Therefore, the technical scheme that all technician in the art can be obtained by logical analysis, reasoning, or a limited experiment under this invention's idea on the basis of existing technology, all should by the determined protection domain of claim book.

Claims (3)

1. the car door opening control method based on wireless security system, described automobile wireless safety-protection system comprises image capture device (1), bluetooth transceiver module (2), the first wireless signal transceiver module (3), the 2nd wireless signal transceiver module (4), controller (5) and electronics car door lock (6); The signal output terminal of described image capture device (1) connects the signal input terminus of described controller (5); Described controller (5) and described bluetooth transceiver module (2) are bi-directionally connected; Described controller (5) and the first wireless signal transceiver module (3) are bi-directionally connected, it is mutual that described first wireless signal transceiver module (3) and the 2nd wireless signal transceiver module (4) carry out wireless data, and described 2nd wireless signal transceiver module (4) and upper computer (7) are bi-directionally connected; The control signal output terminal of described controller (5) connects the control signal input terminus of described electronics car door lock (6); It is characterized in that comprising the following steps:
Step one, obtain user's facial image and carry out storage encryption;
Step 2, being matched by bluetooth transceiver module (2) and user mobile phone, user inputs unlocking pin;
Step 3, by image capture device (1) gather facial image, obtain image to be matched;
Step 4, to store face encryption image be decrypted;
Step 5, the image to be matched obtained by image capture device (1) mate with the facial image after deciphering; When the match is successful for the facial image after the image to be matched that image capture device (1) obtains with deciphering, upper computer (7) sends a signal to controller (5), and controller (5) transmits control signal and makes it open to described electronics car door lock (6); Terminate when the image to be matched that image capture device (1) obtains mates unsuccessful with the facial image after deciphering;
Obtain user's facial image described in step one and carry out in storage encryption, the encryption of user's facial image is carried out according to the following steps:
Steps A 1, obtained resolving power by image capture device be the square facial image of a*a, and described a is positive integer;
Steps A 2, to set any pixel in described facial image be Pij, obtain pixel PijRgb value, described i, j are positive integer, and 1��i��a, 1��j��a;
Steps A 3, by pixel PijR value, G value and B value be converted to corresponding hexadecimal values respectively;
Judge pixel PijSexadecimal number system R value, sexadecimal number system G value and sexadecimal number system B value whether reach two;
As pixel PijSexadecimal number system R value, sexadecimal number system G value or sexadecimal number system B value less than two time, add a character G at this less than the sexadecimal number system value left side of two, to form pixel PijTwo R value character strings, two G value character strings and two B value character strings, then perform steps A 4; As pixel PijSexadecimal number system R value, sexadecimal number system G value or sexadecimal number system B value be when reaching two, performs steps A 4;
Steps A 4, by pixel PijTwo R value character strings, two G value character strings and two B value character strings are arranged in order from left to right and form first step string;
Steps A 5, the hexadecimal values that i and j is converted to respectively correspondence;
Judge whether the sexadecimal number system value of i or the sexadecimal number system value of j reach four; When the sexadecimal number system value of i or the sexadecimal number system value of j are less than four, add character G at this less than the sexadecimal number system value left side of four, with four character strings of four character strings and j that form i, then perform steps A 6; When the sexadecimal number system value of i or the sexadecimal number system value of j reach four, perform steps A 6;
Steps A 6, the left side that the four of j character strings are added to described first step string, and the four of i character strings are added to the left side of four character strings of described j, to form second stage string;
Steps A 7, described facial image is divided into 16*16 square area T 1 , 1 T 1 , 2 ... ... T 1 , 16 T 2 , 1 T 2 , 2 ... ... T 2 , 16 ... ... ... ... ... ... ... ... T 16 , 1 T 16 , 2 ... ... T 16 , 16 , Choose described pixel PijThe region T at placeM, n, m, n are positive integer and 1��m��16,1��n��16;
Steps A 8, judge whether second stage string has character G; When comprising character G in the 2nd string, being replaced by the character G in the string of the second stage is 0, then performs steps A 9; When the 2nd string does not have character G, perform steps A 9;
Steps A 9, the figure place last setting described second stage string are Q1, the figure place second from the bottom setting described second stage string is Q2;
By Q1And Q2Be converted to decimal value respectively; Calculate Q11=Q1+ 1 obtains Q11, calculate Q21=Q2+ 1 obtains Q21; Described 1��Q11�� 16, described 1��Q21�� 16;
Calculate T x , y = T m + 1 , n + 1 i f m &GreaterEqual; Q 11 a n d n &GreaterEqual; Q 21 T m + 1 , n - 1 i f m &GreaterEqual; Q 11 a n d n < Q 21 T m - 1 , n + 1 i f m < Q 11 a n d n &GreaterEqual; Q 21 T m - 1 , n - 1 i f m < Q 11 a n d n < Q 21 Obtain the first target area TX, y;
By TM, nWith TX, yReplace;
Steps A 10, the first row region and territory, zone are replaced; 2nd row region and four lines region are replaced; Fifth line region and the 7th row region are replaced; 6th row region and the 8th row region are replaced; 9th row region and the tenth a line region are replaced; Tenth row region and the 12 row region are replaced; Tenth territory, zone and the tenth five-element region are replaced; Tenth four lines region and the 16 row region are replaced;
Described second stage string is the unlocking pin in described step 2;
The face encryption image stored is decrypted by step 4 and carries out according to the following steps:
S1, encrypted image is divided into 16*16 square area T 1 , 1 T 1 , 2 ... ... T 1 , 16 T 2 , 1 T 2 , 2 ... ... T 2 , 16 ... ... ... ... ... ... ... ... T 16 , 1 T 16 , 2 ... ... T 16 , 16 , The first row to four lines region is the first encryption module, fifth line to the 8th row region be the 2nd encryption module, the 9th walk to the 12 row region be the 3rd encryption module, the 13 walk to the 16 row region be the 4th encryption module;
S2, the password receiving user's input;
Whether S3, the password judging described user and inputting are 14 figure place strings; When the password of user's input is 14 figure place string, perform step S4; When the password of user's input is not 14 figure place string, returns and perform step S2;
S4, judge input password in whether have character G; When comprising character G in password, being replaced by the character G in password is 0, then performs step S5; When password does not have character G, perform step S5;
S5, parallel carry out region determine and rgb value conversion;
Described region is determined to carry out according to the following steps:
B1, the 1 to 4 figure place extracting password from left to right form third stage string, and convert thereof into decimal value U1; The 5 to 8 figure place extracting password from left to right forms fourth stage string, and converts thereof into decimal value U2;
Extract the 14th figure place of password from left to right, and convert thereof into decimal value U3; Extract the 13rd figure place of password from left to right, and convert thereof into decimal value U4;
B2, choose region T to be changedR, t, r, t are positive integer and 1��r��16,1��t��16:
CalculateObtain r, calculateObtain t; Value according to r and t chooses region T to be changedR, t;
B3, calculating U31=U3+ 1 obtains U31, calculate U41=U4+ 1 obtains U41; Described 1��U31�� 16, described 1��U41�� 16;
Calculate T p , q = T r + 1 , t + 1 i f r &GreaterEqual; U 31 a n d t &GreaterEqual; U 41 T r + 1 , t - 1 i f r &GreaterEqual; U 31 a n d t < U 41 T r - 1 , t + 1 i f r < U 31 a n d t &GreaterEqual; U 41 T r - 1 , t - 1 i f r < U 31 a n d t < U 41 Obtain the 2nd target area TP, q; Described 1��p��16, described 1��q��16;
B4, selection TP, qCorresponding encryption module, and this encryption module is decrypted: the 3rd row of the first row of this encryption module and this encryption module is replaced, the four lines of the 2nd row of this encryption module and this encryption module is replaced;
B5, judgementWhether with TP, qIt is positioned at same encryption module; WhenWith TP, qWhen being positioned at same encryption module, perform step B6; WhenWith TP, qNot when same encryption module, willPlace encryption module is decrypted: willThe first row of place encryption module and the 3rd row of this encryption module are replaced, will2nd row of place encryption module and the four lines of this encryption module are replaced, and then perform step B6;
B6, by TR, tWith TP, qReplace;
The conversion of described rgb value carries out according to the following steps:
The the 9th and the 10th figure place extracting password from left to right forms Pyatyi string, and converts thereof into decimal value U5; The the 11st and the 12nd figure place extracting password from left to right forms the 6th grade of string, and converts thereof into decimal value U6; The the 13rd and the 14th figure place extracting password from left to right forms the 7th grade of string, and converts thereof into decimal value U7;
S6, carry out rgb value coupling:
Selected pixels point1��i��a, 1��j��a, and i, j, a be positive integer; WillR value, G value and B value respectively with U5��U6And U7Contrast; JudgeR value whether equal U5, whenR value be not equal to U5Time, terminate deciphering; WhenR value equal U5Time, judgeG value whether equal U6; WhenG value be not equal to U6Time, terminate deciphering; WhenG value equal U6Time, judgeB value whether equal U7; WhenB value be not equal to U7Time, terminate deciphering; WhenB value whether equal U7Time, perform step S7;
S7, successively judge first encryption module to the 4th encryption module, whether be decrypted; The encryption module not being decrypted is decrypted:
3rd row of the first row of non-enabling decryption of encrypted module and this encryption module is replaced, the four lines of the 2nd row of non-enabling decryption of encrypted module and this encryption module is replaced.
2., as claimed in claim 1 based on the car door opening control method of wireless security system, it is characterized in that: described steps A 7 is chosen described pixel PijThe region T at placeM, nCarry out according to the following steps:
CalculateObtain m, calculateObtain n; Value chosen area T according to m and nM, n��
3. as claimed in claim 1 based on the car door opening control method of wireless security system, it is characterized in that: in steps A 1, obtain, by image capture device, the square facial image that resolving power is a*a and carry out according to the following steps:
Obtaining resolving power by image capture device is the facial image of a*b, and a is the pixel quantity of horizontal direction, and b is the pixel quantity of vertical direction;
Judge whether a > b;
As a > b time, calculate W1=a-b, obtains number W to be increased1, then vertically add W1Individual rgb value is the pixel of 0,0,0, then performs steps A 2;
When a < during b, calculates W2=b-a, obtains number W to be increased2, then add W in the horizontal direction2Individual rgb value is the pixel of 0,0,0, and by the numerical value assignment of b to a, then performs steps A 2;
As a=b, perform steps A 2.
CN201610082367.1A 2016-02-05 2016-02-05 Car door opening control method based on wireless security system Expired - Fee Related CN105644500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610082367.1A CN105644500B (en) 2016-02-05 2016-02-05 Car door opening control method based on wireless security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610082367.1A CN105644500B (en) 2016-02-05 2016-02-05 Car door opening control method based on wireless security system

Publications (2)

Publication Number Publication Date
CN105644500A true CN105644500A (en) 2016-06-08
CN105644500B CN105644500B (en) 2018-02-23

Family

ID=56488392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610082367.1A Expired - Fee Related CN105644500B (en) 2016-02-05 2016-02-05 Car door opening control method based on wireless security system

Country Status (1)

Country Link
CN (1) CN105644500B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375941A (en) * 2016-09-18 2017-02-01 广州小鹏汽车科技有限公司 Intelligent automobile unlocking method and system
CN108009411A (en) * 2017-12-21 2018-05-08 江西爱驰亿维实业有限公司 Method, apparatus and computing device based on recognition of face control automobile
CN108528390A (en) * 2018-01-24 2018-09-14 新日(无锡)发展有限公司 Electric vehicle unlocking control system based on recognition of face
CN108749767A (en) * 2018-05-31 2018-11-06 浙江吉利控股集团有限公司 A kind of face recognition vehicle system for unlocking, unlocking method and vehicle
CN109803250A (en) * 2019-03-11 2019-05-24 宋健 Bluetooth communications link controlling terminal
CN110217196A (en) * 2018-03-02 2019-09-10 上海博泰悦臻网络技术服务有限公司 Door control system and method
CN110789492A (en) * 2019-10-23 2020-02-14 上海能塔智能科技有限公司 Test driving processing method and device, external equipment, electronic equipment and storage medium
CN111469805A (en) * 2019-03-11 2020-07-31 宋健 Bluetooth communication link control device
CN112399935A (en) * 2019-06-17 2021-02-23 谷歌有限责任公司 Seamless driver authentication using an in-vehicle camera in conjunction with a trusted mobile computing device
CN112633230A (en) * 2020-12-30 2021-04-09 深圳云天励飞技术股份有限公司 Face encryption method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202686280U (en) * 2012-06-06 2013-01-23 浙江吉利汽车研究院有限公司杭州分公司 Vehicle anti-theft and start-up system based on face recognition
CN103693012A (en) * 2013-12-23 2014-04-02 杭州电子科技大学 Automobile anti-theft system
CN203854622U (en) * 2014-04-18 2014-10-01 深圳市威富安防有限公司 Vehicle anti-theft system
CN105109451A (en) * 2015-08-26 2015-12-02 邹民勇 Automobile security system and method for guarding against theft through automobile security system
WO2015180237A1 (en) * 2014-05-28 2015-12-03 东莞盛世科技电子实业有限公司 Method for checking password in fuzzy mode and password checking device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202686280U (en) * 2012-06-06 2013-01-23 浙江吉利汽车研究院有限公司杭州分公司 Vehicle anti-theft and start-up system based on face recognition
CN103693012A (en) * 2013-12-23 2014-04-02 杭州电子科技大学 Automobile anti-theft system
CN203854622U (en) * 2014-04-18 2014-10-01 深圳市威富安防有限公司 Vehicle anti-theft system
WO2015180237A1 (en) * 2014-05-28 2015-12-03 东莞盛世科技电子实业有限公司 Method for checking password in fuzzy mode and password checking device
CN105109451A (en) * 2015-08-26 2015-12-02 邹民勇 Automobile security system and method for guarding against theft through automobile security system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375941B (en) * 2016-09-18 2021-04-13 广州小鹏汽车科技有限公司 Intelligent unlocking method and system for automobile
CN106375941A (en) * 2016-09-18 2017-02-01 广州小鹏汽车科技有限公司 Intelligent automobile unlocking method and system
CN108009411A (en) * 2017-12-21 2018-05-08 江西爱驰亿维实业有限公司 Method, apparatus and computing device based on recognition of face control automobile
CN108528390A (en) * 2018-01-24 2018-09-14 新日(无锡)发展有限公司 Electric vehicle unlocking control system based on recognition of face
CN110217196A (en) * 2018-03-02 2019-09-10 上海博泰悦臻网络技术服务有限公司 Door control system and method
CN110217196B (en) * 2018-03-02 2022-05-06 上海博泰悦臻网络技术服务有限公司 Vehicle door control system and method
CN108749767A (en) * 2018-05-31 2018-11-06 浙江吉利控股集团有限公司 A kind of face recognition vehicle system for unlocking, unlocking method and vehicle
CN109803250A (en) * 2019-03-11 2019-05-24 宋健 Bluetooth communications link controlling terminal
CN111469805A (en) * 2019-03-11 2020-07-31 宋健 Bluetooth communication link control device
CN109803250B (en) * 2019-03-11 2020-10-23 诸暨山争网络科技有限公司 Bluetooth communication link control terminal
CN112399935A (en) * 2019-06-17 2021-02-23 谷歌有限责任公司 Seamless driver authentication using an in-vehicle camera in conjunction with a trusted mobile computing device
CN110789492A (en) * 2019-10-23 2020-02-14 上海能塔智能科技有限公司 Test driving processing method and device, external equipment, electronic equipment and storage medium
CN112633230A (en) * 2020-12-30 2021-04-09 深圳云天励飞技术股份有限公司 Face encryption method and device, electronic equipment and storage medium
CN112633230B (en) * 2020-12-30 2024-06-11 深圳云天励飞技术股份有限公司 Face encryption method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN105644500B (en) 2018-02-23

Similar Documents

Publication Publication Date Title
CN105644500A (en) Car door opening control method based on wireless security and protection system
CN106968511B (en) A kind of smart home door lock
CN105966354B (en) A kind of network electric car safe and intelligent control method
CN107633580B (en) Intelligent lock, control method thereof and intelligent safe box
CN105313837A (en) Intelligent key matching method and system
CN104809776B (en) Intelligent automatically-controlled door and its Figure recognition unlocking method and autocontrol method
CN106846592A (en) A kind of intelligent lock system with high security
CN103778703A (en) Portable electric appliance
CN104867214A (en) Acoustic wave recognition based door opening method and system
CN104574611A (en) Intelligent door lock and control method thereof
CN105205888A (en) Security system with combination lock
CN103106714B (en) Based on method for unlocking and the system of hand-held terminal device PDA and fingerprint identification technology
CN105389874B (en) A kind of control system and control method for smart lock
CN107845172A (en) A kind of smart lock security system and method for work with autonomous classification ability
CN206470843U (en) Intelligent travelling crane control system
CN108053218A (en) A kind of safe method of mobile payment
CN110374413A (en) A kind of intelligent wireless door-locking system
CN103593141A (en) Hand gesture recognizing unlocking device and method
CN103413364A (en) Face-recognition, card-swiping, password, fingerprint, remote-control and mobile-phone multiple control device for frame-lock building door
CN107017982A (en) A kind of automobile remote-control radio frequency encryption matching process with high theftproof performance
CN110111463A (en) Touch screen intelligent door lock user password display input method
CN104895447A (en) Vehicle safe case face recognition anti-theft alarming system
CN106411532A (en) Bluetooth unlocking method and terminal
CN203012830U (en) Unlocking system based on handheld terminal equipment PDA (personal digital assistant) and fingerprint identification technique
CN105788039A (en) Remote door opening control method based on mobile phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180223

Termination date: 20190205