CN108154588A - Unlocking method, system, readable storage medium storing program for executing and smart machine - Google Patents
Unlocking method, system, readable storage medium storing program for executing and smart machine Download PDFInfo
- Publication number
- CN108154588A CN108154588A CN201711486572.5A CN201711486572A CN108154588A CN 108154588 A CN108154588 A CN 108154588A CN 201711486572 A CN201711486572 A CN 201711486572A CN 108154588 A CN108154588 A CN 108154588A
- Authority
- CN
- China
- Prior art keywords
- duration
- sound bite
- unlock
- unlocking
- sound
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
Abstract
The present invention relates to a kind of unlocking method, system, readable storage medium storing program for executing and smart machine, the method includes:Unlock instruction input by user is obtained, the unlock instruction includes multiple sound bites of sequential;Sequentially judge the interval duration between the corresponding voice duration of each sound bite and two sound bites of arbitrary neighborhood, if be consistent respectively with corresponding default voice duration and predetermined interval duration;If so, confirm one unlock pass signal of generation.The unlocking method of the present invention has higher security performance in practical applications, meets practical application request.
Description
Technical field
The present invention relates to unlocking technology field, more particularly to a kind of unlocking method, system, readable storage medium storing program for executing and intelligence are set
It is standby.
Background technology
It is well known that door lock refers to one kind for door lock to be lived, to prevent other people from opening a kind of safeguard of door.
It is extremely universal in daily life, provide great convenience for daily life.
Generally, existing door lock is mostly mechanical door lock.According to the difference of lockmaking technology, can substantially be divided into following
Several classes:(1) ball shaped door lock, the handle of the door lock is spherical shape, and manufacture craft is relatively easy, and cost is relatively low.Due to safety compared with
Difference is generally used for indoor door lock;(2) three rod type knob locks, the handle of such door lock is door handle, and manufacture craft is relatively simple
It is single, low cost.Since safety is poor, it is generally also commonly used for interior door lock;(3) mortise knob lock, such door lock can be divided into point
Body is locked and Body linked lock, and Product Safety is relatively good, is usually used in entry door or room door;(4) glass door lock, advantage are need not to open
Hole, security performance are preferable.
However, the security performance of existing door lock is still to be improved, there are some potential safety problemss in practical applications.
Invention content
Based on this, it is an object of the invention to propose a kind of unlocking method that can improve security performance, system, readable deposit
Storage media machine and smart machine, to meet practical application request.
The present invention proposes a kind of unlocking method, wherein, described method includes following steps:
Unlock instruction input by user is obtained, the unlock instruction includes multiple sound bites of sequential;
Sequentially judge two sound bites of the corresponding voice duration of each sound bite and arbitrary neighborhood
Between interval duration, if be consistent respectively with corresponding default voice duration and predetermined interval duration;
If so, confirm one unlock pass signal of generation.
Unlocking method proposed by the present invention, after unlock instruction input by user is received, by sequentially judging the unlock
Whether the corresponding voice duration of each sound bite in instruction and the interval duration between two sound bites of arbitrary neighborhood
It is equal with preset duration, if equal, confirm one unlock pass signal of generation, complete unlock.Due to solution proposed by the present invention
Locking method, combines the phonetic entry feature of user, integrated voice segment and is spaced the time span of duration and is unlocked and sentences
It is disconnected, the security performance of door lock is substantially increased, meets practical application request.
The unlocking method, wherein, the quantity for the note that the sound bite includes is one or two.Wherein, by language
The note quantity of tablet section is set as one or two, which is adapted to the daily tongue of user, contributes to practical language
Sound unlocks.
The unlocking method, wherein, the quantity of the interval duration is multiple, and it is corresponding that duration is spaced described in any two
Time span is equal or unequal.The setting is primarily to be adapted to longer unlock instruction, so as to improve the entirety of password
Safety.
The unlocking method, wherein, judge that the method that the sound bite is consistent with default sound bite includes following step
Suddenly:
The sound bite is parsed and obtains corresponding voice print database, and whether judge the voice print database to extract
Voice print database corresponding with default unlock instruction is consistent;
If so, judge that the sound bite is consistent with the default sound bite.Wherein, due to each user speech
Uniqueness when being unlocked, carries out differentiating the safety that can improve coded lock with reference to voice print database.
The unlocking method, wherein, judge that the sound bite is further included with the method that default sound bite is consistent:
Speech recognition is carried out, and parsed to obtain corresponding semantic text data to the sound bite;
Judge that semantic text data semantic text data whether corresponding with the default sound bite match;
If so, judge that the sound bite is consistent with the default sound bite.Wherein, by being carried out to sound bite
The mode that speech recognition obtains semantic text is unlocked differentiation so that the coded lock is provided with " wisdom ", further improves
Its security performance.
The unlocking method, wherein, the unlock instruction further includes character fragments, and the character in the character fragments is word
Female or number, each character fragments are corresponding with a character input duration, and the method further includes:
Sequentially judge each sound bite corresponding voice duration, each corresponding character of the character fragments
Input the interval duration between duration and any two segment, if respectively with corresponding default voice duration, default
Character input duration and the predetermined interval duration are consistent;
The unlock pass signal is generated if so, confirming.
Wherein, by the way that character fragments in a manner that sound bite is combined, to be substantially increased to the security performance of coded lock.
The unlocking method, wherein, before the step of acquisition unlock instruction input by user, the method is also wrapped
It includes:
After a unlocking request signal is received, according to one unlock inquiry message of unlocking request signal generation;
When receiving the confirmation message that one is directed to the unlock inquiry message, will be stored in described in the first memory block
Unlock instruction is copied in the second memory block, wherein the data reading speed of second memory block is more than first memory block
Data reading speed.The setting improves user experience primarily to improve processing speed of the coded lock to data.
The present invention also proposes a kind of system for unlocking, wherein, the system for unlocking includes:
Instruction acquisition module, for obtaining unlock instruction input by user, the unlock instruction includes the more of sequential
A sound bite;
Judgment module is unlocked, for sequentially judging the corresponding voice duration of each sound bite and arbitrary neighborhood
Interval duration between two sound bites, if respectively with appearance when corresponding default voice duration and predetermined interval
Symbol;
Execution module is unlocked, for working as two that determine the corresponding voice duration of the sound bite and arbitrary neighborhood
Interval duration between the sound bite, when being consistent respectively with corresponding default voice duration and predetermined interval duration, then
Confirm one unlock pass signal of generation.
The present invention also proposes a kind of readable storage medium storing program for executing, is stored thereon with computer program, wherein, the program is by processor
Unlocking method as described above is realized during execution.
The present invention also proposes a kind of smart machine, on a memory and can locate including memory, processor and storage
The computer program run on reason device, wherein, the processor realizes unlocking method as described above, institute when performing described program
Smart machine is stated as an intelligent lock.
The additional aspect and advantage of the present invention will be set forth in part in the description, and will partly become from the following description
It obtains significantly or is recognized by the practice of the present invention.
Description of the drawings
Fig. 1 is the flow chart for the unlocking method that first embodiment of the invention proposes;
Fig. 2 is the flow chart for the unlocking method that second embodiment of the invention proposes;
Fig. 3 is the structure diagram for the system for unlocking that third embodiment of the invention proposes;
Fig. 4 is the structure diagram for the system for unlocking that fourth embodiment of the invention proposes;
Fig. 5 is the structure diagram for the intelligent lock that fifth embodiment of the invention proposes.
Specific embodiment
For the ease of understanding the present invention, the present invention is described more fully below with reference to relevant drawings.In attached drawing
Give the preferred embodiment of the present invention.But the present invention can realize in many different forms, however it is not limited to this paper institutes
The embodiment of description.On the contrary, the purpose for providing these embodiments is made to the disclosure more thorough and comprehensive.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention
The normally understood meaning of technical staff is identical.Term used in the description of the invention herein is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.Term as used herein " and/or " including one or more phases
The arbitrary and all combination of the Listed Items of pass.
In view of the security performance of existing door lock is still to be improved, asking there are some potential safety problems in practical applications
Topic, the present invention propose a kind of novel unlocking method.Referring to Fig. 1, for the unlocking method in first embodiment of the invention, it should
For an intelligent lock, wherein, described method includes following steps:
S101, obtains unlock instruction input by user, and the unlock instruction includes multiple sound bites of sequential.
In the present embodiment, which is equipped with a voice input device, which uses for typing
The unlock instruction of family input.In the present embodiment, which instructs for speech unlocking, including multiple sound bites.
This is pointed out that for each sound bite each sound bite is made of note, and the quantity of note can be one
It is a, two or more.In the present embodiment, the note quantity of sound bite is two.Wherein, by the note quantity of sound bite
One or two is set as, the setting is primarily to cater to the daily tongue of user.For example, speech unlocking is instructed
For " open sesame ", it includes two sound bites " sesame " and " enablings ".For sound bite " sesame ", it includes
Note is " sesame " and " fiber crops ", for sound bite " enabling ", it includes note be "ON" and " door ".
S102 sequentially judges two voices of the corresponding voice duration of each sound bite and arbitrary neighborhood
Interval duration between segment, if be consistent respectively with corresponding default voice duration and predetermined interval duration.
For above-mentioned speech unlocking instruction, as described above, it includes multiple sound bites.In addition it also notes
It is that there are an interval durations between two adjacent sound bites.For example, for above-mentioned sound bite " sesame " and
" enabling ", there are an interval durations, such as a length of 1s during the interval among it.In addition, each sound bite correspondence also has a language
Sound duration, such as in the present embodiment, a length of 2s during voice corresponding to sound bite " sesame ", sound bite " enabling " institute are right
The voice duration answered also is 2s.In addition, for above-mentioned interval duration, when there are during multiple intervals in speech unlocking instruction
When long, it is each be spaced the duration corresponding time can it is equal can not also be equal, the voice typing depending on voice typing person is special
Sign, the setting can widen practical user group, be adapted to the crowd of different word speeds.
In this step, after the unlock instruction for receiving user, each sound bite in the unlock instruction is judged successively
Whether corresponding voice duration and each interval duration are equal with default voice duration and predetermined interval duration respectively.For example,
In the present embodiment, in speech unlocking instruction " open sesame ", the voice of sound bite " sesame " and sound bite " enabling "
Shi Changwei 2s, a length of 1s during interval.Therefore in this step, it is only necessary to more corresponding voice duration and interval duration whether
It is equal with duration corresponding in the unlock instruction of advance typing.
S103, if so, confirming one unlock pass signal of generation.
As described previously for unlock instruction " open sesame ", the language of sound bite " sesame " and sound bite " enabling "
A length of 2s during sound, a length of 1s during interval.When determining in voice of the speech unlocking currently inputted the instruction with advance typing, correspond to
Voice duration and interval duration when being equal, then can be confirmed and unlock successfully at this time, it is corresponding to generate one and unlock pass signal,
Complete unlock.
Unlocking method proposed by the present invention, after unlock instruction input by user is received, by sequentially judging the unlock
Whether the corresponding voice duration of each sound bite in instruction and the interval duration between two sound bites of arbitrary neighborhood
It is equal with preset duration, if equal, confirm one unlock pass signal of generation, complete unlock.Due to solution proposed by the present invention
Locking method, combines the phonetic entry feature of user, integrated voice segment and is spaced the time span of duration and is unlocked and sentences
It is disconnected, the security performance of door lock is substantially increased, meets practical application request.
Referring to Fig. 2, for the unlocking method that second embodiment of the invention proposes, this hair embodiment is in order to improve smart lock
The security performance of tool has carried out lockset in a manner that voice is combined encryption locking using character.
First, in the present embodiment, " starting a to unlock " button, when user presses, intelligence at this time are equipped in intelligent lock
Control system on energy lockset receives a unlocking request signal, and control system can generate a solution according to the unlocking request signal
Lock inquiry message.The unlock inquiry message is shown on the miniature display screen of intelligent lock, including two options, i.e., " is determined out
Begin to unlock " and " abandoning unlocking ", for selection by the user.When user selects " determining to start to unlock " option, then control at this time
System processed, which enters, unlocks standby pattern.
Herein it should be added that, since before unlock, user is in the control system of the warp-wise intelligent lock
There is provided unlocking pins, which includes sound bite information and character fragments information, and is stored in the first storage
Qu Zhong.It is hard storage medium however, as first memory block, the speed that data are read from first memory block is relatively slow,
This is likely to affect the comparison time of user input signal.
In order to solve this problem, in the present embodiment, after user presses " determining to start to unlock " key namely the control
When system processed receives the confirmation message that one is directed to unlock inquiry message, then the unlock word that will be stored in the first memory block at this time
Symbol signal and unlock voice signal are copied in the second memory block.Since the data reading speed of second memory block is more than the
The data reading speed of one memory block, therefore can ensure the normal comparison of unlock instruction input by user.
In the present embodiment, above-mentioned character fragments can be letter or number.For example, can be " 1 ", " A ", " 5 "
Or " F " etc.;And sound bite is then made of note, such as sound bite can be " hello ", " please open the door ".It needs to illustrate herein
, for the sound bite, in specific releasing process, it is unlocked the voice sheet that the object compared can be input
Body biological characteristics such as (also and) vocal prints including voice, or the sound bite corresponding semantic text letter after parsing
Corresponding semantic text is " hello " or " please open the door " after breath, such as parsing.It should be understood that pass through vocal print and semantic text
Know otherwise, the safety of coded lock can be greatly improved, so as to meet practical application request.
When user is unlocked the intelligent lock, solution of the input one comprising character fragments and sound bite can be corresponded to
Lock instruction.As described above, it can be freely combined between character fragments and sound bite.For example, unlock input by user refers to
It enables and is:" 1 " " hello " " F " " please open the door " " A ", and then the control system in the intelligent lock can refer to unlock input by user
It enables, judgement comparison is carried out with preset unlock secret key.
Further, after user has input a unlock instruction, the control system at this time in intelligent lock is defeated by user
The unlock instruction entered carries out judging to compare with preset unlock secret key.Specifically, sequentially judge the corresponding language of each sound bite
Interval duration between the corresponding character input duration of sound duration, each character fragments and any two segment, if respectively
It is consistent with corresponding default voice duration, preset characters input duration and predetermined interval duration;If so, confirm one solution of generation
Lock pass signal.
For example, the cipher instruction of typing in advance " please open the door " " A " for " 1 " " hello " " F ".The then control of the intelligent lock at this time
Unlock instruction input by user can be compared successively for system processed, only when the signal fusing of current order success could carry out
The signal fusing of next order.For example, first of preset cipher instruction is " 1 ", only when number input by user is also
When " 1 ", it can just compare whether sound bite input by user is consistent with preset sound bite.It should be understood that only when whole
A sequence just can determine that after all comparing successfully and unlock successfully.Herein it may also be noted that between two adjacent segments
Interval duration also to have to pre-set interval duration identical.If conversely, during multilevel iudge, simply by the presence of one
A character fragments or sound bite are differed with preset password, then can be determined that unlock is unsuccessful, directly exit unlock operation.
In addition, in the present embodiment, judging whether a sound bite is consistent with the sound bite of advance typing, there are differences
Several ways:(1) it is a kind of for only by the voice print database corresponding to sound bite input by user and preset unlock voice letter
Number corresponding voice print database is compared, if being consistent, confirms that sound bite compares successfully;(2) it is another for user is inputted
Sound bite parsed, obtain corresponding semantic text data, if the semantic text data with it is preset unlock voice letter
Number corresponding semantic text data are consistent, then confirm that sound bite compares successfully;(3) also have a kind of to need to meet vocal print simultaneously
Data and semantic text data are consistent with preset unlock voice signal just judges that the sound bite compares success.In reality
In, it can specifically be set according to the demand of security level.
Referring to Fig. 3, for third embodiment of the invention propose system for unlocking, wherein, the system for unlocking include according to
Instruction acquisition module 10, unlock judgment module 20 and the unlock execution module 30 of secondary connection;
Wherein described instruction acquisition module 10 is specifically used for:
Unlock instruction input by user is obtained, the unlock instruction includes multiple sound bites of sequential;
The unlock judgment module 20 is specifically used for:
Sequentially judge two sound bites of the corresponding voice duration of each sound bite and arbitrary neighborhood
Between interval duration, if be consistent respectively with corresponding default voice duration and predetermined interval duration;
The unlock execution module 30 is specifically used for:
When determining between the corresponding voice duration of the sound bite and two sound bites of arbitrary neighborhood
Interval duration, when being consistent respectively with corresponding default voice duration and predetermined interval duration, then confirm generation one unlock into
Function signal.
Referring to Fig. 4, for the system for unlocking that fourth embodiment of the invention proposes, wherein, the solution proposed in the present embodiment
Lock system includes sequentially connected instruction acquisition module 10, unlock judgment module 20, unlock execution module 30 and storage scheduling
Module 40;
Wherein described instruction acquisition module 10 is specifically used for:
Unlock instruction input by user is obtained, the unlock instruction includes multiple sound bites of sequential;
The unlock judgment module 20 is specifically used for:
Sequentially judge two sound bites of the corresponding voice duration of each sound bite and arbitrary neighborhood
Between interval duration, if be consistent respectively with corresponding default voice duration and predetermined interval duration;
The unlock execution module 30 is specifically used for:
When determining between the corresponding voice duration of the sound bite and two sound bites of arbitrary neighborhood
Interval duration, when being consistent respectively with corresponding default voice duration and predetermined interval duration, then confirm generation one unlock into
Function signal;
The storage scheduler module 40 is specifically used for:
After a unlocking request signal is received, according to one unlock inquiry message of unlocking request signal generation;
When receiving the confirmation message that one is directed to the unlock inquiry message, will be stored in described in the first memory block
Unlock instruction is copied in the second memory block, wherein the data reading speed of second memory block is more than first memory block
Data reading speed.
It is described unlock judgment module 20 also particularly useful for:
The sound bite is parsed and obtains corresponding voice print database, and whether judge the voice print database to extract
Voice print database corresponding with default unlock instruction is consistent;
If so, judge that the sound bite is consistent with the default sound bite.
It is described unlock judgment module 20 also particularly useful for:
Speech recognition is carried out, and parsed to obtain corresponding semantic text data to the sound bite;
Judge that semantic text data semantic text data whether corresponding with the default sound bite match;
If so, judge that the sound bite is consistent with the default sound bite.
It is described unlock judgment module 20 also particularly useful for:
Sequentially judge each sound bite corresponding voice duration, each corresponding character of the character fragments
Input the interval duration between duration and any two segment, if respectively with corresponding default voice duration, default
Character input duration and the predetermined interval duration are consistent;
The unlock pass signal is generated if so, confirming.
Referring to Fig. 5, for the intelligent lock 200 that fifth embodiment of the invention proposes, which includes storage
Device, processor and storage on a memory and the computer program that can run on a processor, wherein, the processor execution
Unlocking method as described above is realized during described program, an electronic display is equipped in the centre position on the top of the intelligent lock 200
Display screen 202 is respectively equipped with a voice input device 201 in the both sides of the electronic display 202, which leads
It is used for typing unlock instruction input by user.In addition, being additionally provided with a key zone 203 on the intelligent lock 200, wherein this is pressed
Keypad 203 includes alphabet key area 2031 and digital keys area 2032.Wherein, alphabet key area 2031 includes 26 letters,
Digital keys area 2032 includes ten digital keys.User can carry out a variety of independent assortments when progress secret key is default,
This undoubtedly substantially increases the security performance of intelligent lock.
The present invention also proposes a kind of readable storage medium storing program for executing, is stored thereon with computer program, wherein, the program is by processor
Unlocking method as described above is realized during execution.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
The system of row system, device or equipment instruction fetch and execute instruction) it uses or combines these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass
Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment
It puts.
The more specific example (non-exhaustive list) of computer-readable medium is including following:It is connected up with one or more
Electrical connection section (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art
Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function
Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
One of ordinary skill in the art will appreciate that all or part of the steps of the method in the foregoing embodiments are can be with
Relevant hardware is instructed to complete by program.The program can be stored in a computer read/write memory medium.
The program when being executed, including the step described in the above method.The storage medium, including:ROM/RAM, magnetic disc, CD
Deng.
Embodiment described above only expresses the several embodiments of the present invention, and description is more specific and detailed, but simultaneously
Cannot the limitation to the scope of the claims of the present invention therefore be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to the guarantor of the present invention
Protect range.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. a kind of unlocking method, which is characterized in that described method includes following steps:
Unlock instruction input by user is obtained, the unlock instruction includes multiple sound bites of sequential;
Sequentially judge between the corresponding voice duration of each sound bite and two sound bites of arbitrary neighborhood
Interval duration, if be consistent respectively with corresponding default voice duration and predetermined interval duration;
If so, confirm one unlock pass signal of generation.
2. unlocking method according to claim 1, which is characterized in that the quantity for the note that the sound bite includes is one
It is a or two.
3. unlocking method according to claim 2, which is characterized in that the quantity of the interval duration is multiple, and arbitrary two
The corresponding time span of a interval duration is equal or unequal.
4. unlocking method according to claim 2, which is characterized in that judge the sound bite and default sound bite phase
The method of symbol includes the following steps:
The sound bite is parsed with extract obtain corresponding voice print database, and judge the voice print database whether in advance
If corresponding voice print database is consistent in unlock instruction;
If so, judge that the sound bite is consistent with the default sound bite.
5. unlocking method according to claim 4, which is characterized in that judge the sound bite and default sound bite phase
The method of symbol further includes:
Speech recognition is carried out, and parsed to obtain corresponding semantic text data to the sound bite;
Judge that semantic text data semantic text data whether corresponding with the default sound bite match;
If so, judge that the sound bite is consistent with the default sound bite.
6. unlocking method according to claim 4, which is characterized in that the unlock instruction further includes character fragments, described
Character in character fragments is letter or number, and each character fragments are corresponding with a character input duration, and the method is also
Including:
Sequentially judge each sound bite corresponding voice duration, each corresponding character input of the character fragments
The interval duration between duration and any two segment, if respectively with corresponding default voice duration, preset characters
Input duration and the predetermined interval duration are consistent;
The unlock pass signal is generated if so, confirming.
7. unlocking method according to claim 1, which is characterized in that in the step for obtaining unlock instruction input by user
Before rapid, the method further includes:
After a unlocking request signal is received, according to one unlock inquiry message of unlocking request signal generation;
When receiving the confirmation message that one is directed to the unlock inquiry message, the unlock of the first memory block will be stored in
Instruction is copied in the second memory block, wherein the data reading speed of second memory block is more than the number of first memory block
According to reading speed.
8. a kind of system for unlocking, which is characterized in that the system for unlocking includes:
Instruction acquisition module, for obtaining unlock instruction input by user, the unlock instruction includes multiple languages of sequential
Tablet section;
Judgment module is unlocked, for sequentially judging two of the corresponding voice duration of each sound bite and arbitrary neighborhood
Interval duration between the sound bite, if be consistent respectively with corresponding default voice duration and predetermined interval duration;
Execution module is unlocked, is determined described in two of the corresponding voice duration of the sound bite and arbitrary neighborhood for working as
Interval duration between sound bite when being consistent respectively with corresponding default voice duration and predetermined interval duration, then confirms
One unlock pass signal of generation.
9. a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that real when the program is executed by processor
The now unlocking method as described in 1 to 7 any one of the claims.
10. a kind of smart machine including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor is realized when performing described program such as 1 to 7 any one institute of the claims
The unlocking method stated, the smart machine are an intelligent lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711486572.5A CN108154588B (en) | 2017-12-29 | 2017-12-29 | Unlocking method and system, readable storage medium and intelligent device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711486572.5A CN108154588B (en) | 2017-12-29 | 2017-12-29 | Unlocking method and system, readable storage medium and intelligent device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108154588A true CN108154588A (en) | 2018-06-12 |
CN108154588B CN108154588B (en) | 2020-11-27 |
Family
ID=62460046
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711486572.5A Active CN108154588B (en) | 2017-12-29 | 2017-12-29 | Unlocking method and system, readable storage medium and intelligent device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108154588B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109636953A (en) * | 2018-10-24 | 2019-04-16 | 厦门科路德科技有限公司 | A kind of specific instruction bullet cabinet control method and device based on speech recognition |
CN109801409A (en) * | 2018-12-11 | 2019-05-24 | 平安科技(深圳)有限公司 | Voice method for unlocking, electronic equipment |
CN112711780A (en) * | 2019-10-25 | 2021-04-27 | 中车株洲电力机车研究所有限公司 | Memory unlocking method, system, storage medium and computer equipment |
CN112789662A (en) * | 2018-10-02 | 2021-05-11 | 索尼公司 | Information processing apparatus, information processing method, computer program, and package reception support system |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1662956A (en) * | 2002-06-19 | 2005-08-31 | 皇家飞利浦电子股份有限公司 | Mega speaker identification (ID) system and corresponding methods therefor |
JP2006154484A (en) * | 2004-11-30 | 2006-06-15 | Sony Corp | Apparatus and method for speech processing, program, and recording medium |
CN101467204A (en) * | 2005-05-27 | 2009-06-24 | 普提克斯科技股份有限公司 | Method and system for bio-metric voice print authentication |
CN102124515A (en) * | 2008-06-17 | 2011-07-13 | 声感有限公司 | Speaker characterization through speech analysis |
CN103366745A (en) * | 2012-03-29 | 2013-10-23 | 三星电子(中国)研发中心 | Method for protecting terminal equipment based on speech recognition and terminal equipment |
CN103729584A (en) * | 2012-10-16 | 2014-04-16 | 北京千橡网景科技发展有限公司 | Method and device used for unlocking screen |
CN105185379A (en) * | 2015-06-17 | 2015-12-23 | 百度在线网络技术(北京)有限公司 | Voiceprint authentication method and voiceprint authentication device |
CN106098068A (en) * | 2016-06-12 | 2016-11-09 | 腾讯科技(深圳)有限公司 | A kind of method for recognizing sound-groove and device |
CN106205610A (en) * | 2016-06-29 | 2016-12-07 | 联想(北京)有限公司 | A kind of voice information identification method and equipment |
CN106548779A (en) * | 2015-09-21 | 2017-03-29 | 中兴通讯股份有限公司 | Child lock starts method and device |
US9646607B2 (en) * | 2014-03-10 | 2017-05-09 | Dell Products, L.P. | Managing wake-on-voice buffer quality based on system boot profiling |
CN107221333A (en) * | 2016-03-21 | 2017-09-29 | 中兴通讯股份有限公司 | A kind of identity authentication method and device |
-
2017
- 2017-12-29 CN CN201711486572.5A patent/CN108154588B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1662956A (en) * | 2002-06-19 | 2005-08-31 | 皇家飞利浦电子股份有限公司 | Mega speaker identification (ID) system and corresponding methods therefor |
JP2006154484A (en) * | 2004-11-30 | 2006-06-15 | Sony Corp | Apparatus and method for speech processing, program, and recording medium |
CN101467204A (en) * | 2005-05-27 | 2009-06-24 | 普提克斯科技股份有限公司 | Method and system for bio-metric voice print authentication |
CN102124515A (en) * | 2008-06-17 | 2011-07-13 | 声感有限公司 | Speaker characterization through speech analysis |
CN103366745A (en) * | 2012-03-29 | 2013-10-23 | 三星电子(中国)研发中心 | Method for protecting terminal equipment based on speech recognition and terminal equipment |
CN103729584A (en) * | 2012-10-16 | 2014-04-16 | 北京千橡网景科技发展有限公司 | Method and device used for unlocking screen |
US9646607B2 (en) * | 2014-03-10 | 2017-05-09 | Dell Products, L.P. | Managing wake-on-voice buffer quality based on system boot profiling |
CN105185379A (en) * | 2015-06-17 | 2015-12-23 | 百度在线网络技术(北京)有限公司 | Voiceprint authentication method and voiceprint authentication device |
CN106548779A (en) * | 2015-09-21 | 2017-03-29 | 中兴通讯股份有限公司 | Child lock starts method and device |
CN107221333A (en) * | 2016-03-21 | 2017-09-29 | 中兴通讯股份有限公司 | A kind of identity authentication method and device |
CN106098068A (en) * | 2016-06-12 | 2016-11-09 | 腾讯科技(深圳)有限公司 | A kind of method for recognizing sound-groove and device |
CN106205610A (en) * | 2016-06-29 | 2016-12-07 | 联想(北京)有限公司 | A kind of voice information identification method and equipment |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112789662A (en) * | 2018-10-02 | 2021-05-11 | 索尼公司 | Information processing apparatus, information processing method, computer program, and package reception support system |
CN109636953A (en) * | 2018-10-24 | 2019-04-16 | 厦门科路德科技有限公司 | A kind of specific instruction bullet cabinet control method and device based on speech recognition |
CN109801409A (en) * | 2018-12-11 | 2019-05-24 | 平安科技(深圳)有限公司 | Voice method for unlocking, electronic equipment |
CN112711780A (en) * | 2019-10-25 | 2021-04-27 | 中车株洲电力机车研究所有限公司 | Memory unlocking method, system, storage medium and computer equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108154588B (en) | 2020-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108154588A (en) | Unlocking method, system, readable storage medium storing program for executing and smart machine | |
US10360412B2 (en) | Contextual contemporaneous gesture and keyboard entry authentication | |
Hwang et al. | Keystroke dynamics-based authentication for mobile devices | |
Saevanee et al. | Continuous user authentication using multi-modal biometrics | |
EP1540869B1 (en) | System and method for user authentication with enhanced passwords | |
US7698563B2 (en) | Device and method for inputting password using random keypad | |
US7873995B2 (en) | Method and apparatus for generating and reinforcing user passwords | |
CN103383638B (en) | The method and apparatus of speech input information | |
US7305559B2 (en) | Software method for improved password entry | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
CN105096121A (en) | Voiceprint authentication method and device | |
CN206522020U (en) | A kind of intelligent door lock and system | |
CN107292205A (en) | A kind of input method and device, electronic equipment | |
CN105991281A (en) | Identity authentication method, equipment and system | |
CN105976470B (en) | It is a kind of to carry the intelligent lock and management method for being switched fast management | |
CN108604268B (en) | A kind of voice unlocking method and terminal of terminal | |
CN107295016A (en) | Auth method and device | |
CN105512526B (en) | The quick release method and device of terminal device | |
CN107944303A (en) | A kind of smart mobile phone cipher-code input method and device | |
CN210181680U (en) | Cloud intelligence lock based on network security technique | |
CN107239716A (en) | Anti-peeping input device and method | |
CN109256131A (en) | Smart machine control method and device | |
CN104869255A (en) | Application access method and device and mobile terminal | |
CN107092817A (en) | Input information analysis method and equipment, data inputting method and equipment | |
CN106303010A (en) | The communication apparatus personalized speech such as mobile phone/software icon button coupling combination controls |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |