CN115188104A - Intelligent password control method based on baseless handle and related components - Google Patents

Intelligent password control method based on baseless handle and related components Download PDF

Info

Publication number
CN115188104A
CN115188104A CN202210803234.4A CN202210803234A CN115188104A CN 115188104 A CN115188104 A CN 115188104A CN 202210803234 A CN202210803234 A CN 202210803234A CN 115188104 A CN115188104 A CN 115188104A
Authority
CN
China
Prior art keywords
password
operation program
key
currently
key position
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210803234.4A
Other languages
Chinese (zh)
Other versions
CN115188104B (en
Inventor
刘治国
钟鸣
王琥崴
吴海隆
何明峰
梁利波
张黎明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hopo Window Control Technology Co Ltd
Original Assignee
Shenzhen Hopo Window Control Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hopo Window Control Technology Co Ltd filed Critical Shenzhen Hopo Window Control Technology Co Ltd
Priority to CN202210803234.4A priority Critical patent/CN115188104B/en
Publication of CN115188104A publication Critical patent/CN115188104A/en
Application granted granted Critical
Publication of CN115188104B publication Critical patent/CN115188104B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses an intelligent password control method based on a baseless handle and related components. The method comprises the following steps: receiving trigger information and exiting a low power consumption state; detecting and acquiring currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing corresponding password operation, wherein the executed password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program; and after the current password operation program is finished and no operation is performed within the preset time, the low-power-consumption state is entered. The intelligent coded lock is designed on the base-free handle, and has the advantages of being anti-misopening and high in safety.

Description

Intelligent password control method based on baseless handle and related components
Technical Field
The invention relates to the technical field of handles, in particular to an intelligent password control method based on a baseless handle and a related assembly.
Background
At present, handles on doors and windows are mostly common handles which are manually opened and closed, the handles are easy to be opened by mistake, in a high-rise residence, the safety of the doors and the windows is very important, especially the safety of the windows is very important, and a plurality of potential safety hazards often appear due to insufficient intelligence.
Disclosure of Invention
The invention aims to provide an intelligent password control method based on a baseless handle and a related assembly, and aims to solve the problems that the handle on the existing door and window is easy to open by mistake and the safety is not high enough.
In a first aspect, an embodiment of the present invention provides an intelligent password control method based on a baseless handle, including:
receiving trigger information and exiting a low power consumption state;
detecting and acquiring currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
and after the current password operation program is finished and no operation is performed within the preset time, the low-power-consumption state is entered.
In a second aspect, an embodiment of the present invention provides an intelligent password control system based on a baseless handle, which is characterized by including:
the trigger unit is used for receiving trigger information and exiting a low power consumption state;
the operation unit is used for detecting and acquiring currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
and the dormancy unit is used for completing the current password operation program and entering a low power consumption state after no operation is performed within a preset time.
In a third aspect, an embodiment of the present invention provides a baseless handle, including: the handle comprises a handle body, a password module, a touch chip, a main control chip and an unlocking mechanism, wherein the password module, the touch chip, the main control chip and the unlocking mechanism are arranged on the handle body;
the password module is used for receiving triggering information and transmitting the triggering information to the main control chip through the touch chip;
the main control chip is used for executing exiting from the low power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
The embodiment of the invention discloses an intelligent password control method based on a baseless handle and related components. The method comprises the following steps: receiving trigger information and exiting a low power consumption state; acquiring a password image, and executing corresponding password operation in a currently entered password operation program by using the password image, wherein the password operation program comprises one of a password entry operation program, a password verification operation program and a password deletion operation program; and after the current password operation program is finished and no operation is performed within the preset time, the low-power-consumption state is entered. The intelligent coded lock is designed on the base-free handle, and has the advantages of being anti-misopening and high in safety.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of an intelligent password control method based on a baseless handle according to an embodiment of the present invention;
fig. 2 is a schematic sub-flow diagram of an intelligent password control method based on a baseless handle according to an embodiment of the present invention;
fig. 3 is a schematic view of another sub-flow of the intelligent password control method based on the baseless handle according to the embodiment of the present invention;
fig. 4 is a schematic view of another sub-flow of the intelligent password control method based on the baseless handle according to the embodiment of the present invention;
fig. 5 is a schematic view of another sub-flow of the intelligent password control method based on the baseless handle according to the embodiment of the present invention;
fig. 6 is a schematic view of another sub-flow of the intelligent password control method based on the baseless handle according to the embodiment of the present invention;
fig. 7 is a schematic view of another sub-flow of the intelligent password control method based on the baseless handle according to the embodiment of the present invention;
fig. 8 is a schematic view of another sub-flow of the intelligent password control method based on the baseless handle according to the embodiment of the present invention;
fig. 9 is a schematic block diagram of an intelligent password control system based on a baseless handle according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, fig. 1 is a schematic flow chart of an intelligent password control method based on a baseless handle according to an embodiment of the present invention;
as shown in fig. 1, the method includes steps S101 to S103.
S101, receiving trigger information and exiting a low power consumption state;
in the step, when the capacitance change generated by the key pressing is detected, the low power consumption state is immediately interrupted and exited.
S102, detecting and acquiring currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information, and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
in the step, when a finger presses a key and triggers interruption, the pressed key is detected to form key position information, and a corresponding password operation program is entered according to the key position information so as to correspondingly execute operations such as password entry, password verification and password deletion.
And S103, after the current password operation program is finished and no operation is performed within the preset time, entering a low power consumption state.
In this step, the preset time is preferably 8 seconds, that is, the low power consumption state is entered after 8 seconds of no operation to reduce the energy consumption.
In this embodiment, through at no base handle design intelligent trick lock to realize functions such as control password input, password verification and password deletion, have the advantage of preventing the mistake and opening and high security.
Each cryptographic operation procedure is described in detail below:
the specific process of the password entry operation program is as follows:
in one embodiment, as shown in fig. 2, step S102 includes:
s201, when detecting that the currently triggered key position information is password input information, entering a password input operation program by using the password input information;
s202, judging whether the key data information received for multiple times is consistent, if so, entering a step S203, and if not, jumping to a step S204;
s203, judging whether the key data information exists in a local password library or not, if not, jumping to the step S205, and if so, jumping to the step S206;
s204, failing to enter the password and entering a low-power-consumption state;
and S205, taking the key data information as an unlocking password and storing the unlocking password in a local password library to finish password input operation.
And S206, failing to enter the password input and entering a low-power-consumption state.
In this embodiment, key position information triggered by pressing by a user may be detected, and the key position information is analyzed to obtain different password operation information, for example, password entry information in this embodiment, that is, a new unlocking password needs to be entered, and a password entry operation program is entered and executed based on the information, where the specific execution process is as follows: firstly, receiving key data with a preset length formed by first pressing by a user, receiving the key data with the preset length formed by second pressing by the user again by taking the first received key data with the preset length as a reference, and comparing whether the two key data are consistent (it is understood that the key data input by the user for more times can be received and compared according to requirements), and if so, confirming that the key data are unlocking passwords to be input; and then comparing the unlocking password to be input with the unlocking password stored in the local password library, judging whether the unlocking password to be input exists, if so, failing to input the password and entering a low-power-consumption state, otherwise, storing the unlocking password in the local password library, and finishing the password input operation.
It should be understood that, based on the entered unlocking password, the password can be used as a verification identifier for verifying the password identity when the password is unlocked subsequently.
In one embodiment, as shown in fig. 3, step S201 includes:
s301, detecting and acquiring a currently triggered key position value;
s302, detecting and acquiring the triggering duration of the currently triggered key position value;
s303, entering a menu selection interface when the key information corresponding to the key position value is a menu key and the corresponding trigger duration reaches a preset duration;
and S304, when a password entry instruction selected by a user on the menu selection interface is received, entering a password entry operation program by using the password entry instruction.
In this embodiment, a process of determining that a user needs to perform a password entry operation is performed, specifically, different keys correspond to different key position values, and it may be designed to trigger entering of a menu selection interface when it is detected that a certain specified key is pressed for a long time, for example, in this embodiment, a "well" key is taken as an example, when it is detected that a user presses a "well" key and the pressing duration reaches a preset duration (preferably, 5 seconds), the menu selection interface may be entered, different keys may be designed in the menu selection interface to correspond to different instructions, for example, a certain specified number key corresponds to a password entry instruction, and if it is detected that a user presses the specified number key in the menu selection interface, the password entry operation program may be entered.
The specific process of the password authentication operation program is as follows:
in one embodiment, as shown in fig. 4, step S102 includes:
s401, detecting currently triggered key position information and acquiring the current key bit length;
s402, judging whether the current key bit length is smaller than the inputtable maximum password length, if not, entering a step S403, and if so, skipping to the following step S501;
s403, judging whether the currently triggered key position information is the same as the aging password, if so, entering a step S404, and if not, jumping to a step S405;
s404, entering an aging mode;
s405, the verification fails.
In this embodiment, it is possible to detect that the user continuously presses the trigger key to obtain key position information, obtain a key position length (i.e., the number of times of press triggering) based on the key position information, then determine whether the current key position length is smaller than the inputtable maximum password length, and if not, indicate that the current key position length has exceeded the maximum password length, at this time, determine whether the user needs to enter an aging mode, specifically obtain a key position value for each press based on the key position information triggered by continuous pressing, obtain a specific key position according to the key position value for each press, thereby obtain a password corresponding to the current key position information, compare the password with the aging password, and enter the aging mode if the password is consistent, and if the password is inconsistent, fail to verify and enter a low power consumption state.
In an embodiment, as shown in fig. 5, step S402 is followed by:
s501, judging whether the current key bit length is larger than or equal to the minimum password length, if so, entering a step S502, and if not, returning to the step S401;
s502, judging whether the currently triggered key position information is stored in a pre-constructed local password library, if so, entering a step S503, and if not, entering a step S504;
s503, the password is verified, and the unlocking mechanism is controlled to automatically unlock;
s504, if the password authentication fails, the process returns to the step S401 to re-execute the password authentication.
In this embodiment, when determining whether the current key bit length is smaller than the inputable maximum password length, if the current key bit length is smaller than the inputable maximum password length, it is necessary to determine whether the current key bit length is greater than or equal to the minimum password length, that is, the rule for verifying the password is designed in this embodiment, and specifically: when the current key bit length is between the minimum password length and the maximum password length, the password needs to be verified to realize the password unlocking process; the specific unlocking process is as follows: and obtaining a current unlocking password according to the currently triggered key position information, comparing the current unlocking password with the existing locking passwords in a pre-constructed local password library respectively, if the current unlocking password is the same as any one of the existing locking passwords, passing the password verification, and controlling the unlocking mechanism to automatically unlock. The anti-regular verification fails and waits for the user to input a new unlocking password again until unlocking or abandoning unlocking.
In one embodiment, as shown in fig. 6, step S502 includes:
s601, acquiring a key value sequence of the currently triggered key information;
s602, matching the key value sequences with key value sequences corresponding to unlocking passwords stored in a local password library respectively;
s603, if the matching is successful, the key bit value sequence is stored in the local password library.
In this embodiment, the key value of each pressing is obtained according to the currently triggered key position information, and the current key position value sequence is formed according to the pressing order, so as to obtain the current unlocking password corresponding to the current key position information, that is, the different unlocking passwords corresponding to the different key position value sequences, thereby, for the unlocking password stored in the local password library, the unlocking password is also composed of the different key position value sequences, and therefore, by comparing the current key position value sequence with the key position value sequences stored in the local password library, if the current key position value sequence exists in the stored key position value sequences, the password verification is passed.
In one embodiment, as shown in fig. 7, step S102 includes:
s701, when detecting that the currently triggered key position information is password deletion information, entering a password deletion operation program by using the password deletion information;
specifically, the process referred to in the above steps S301 to S303 enters a menu selection interface, and a password deletion instruction is corresponding to another specified numeric key in the menu selection interface, and if it is detected that the user presses the specified numeric key in the menu selection interface, a password deletion operation program may be entered.
S702, receiving key data information currently input by a user and verifying a password;
and S703, if the password passes the verification, triggering a password clearing instruction and executing the operation of clearing the local password library.
In this embodiment, key position information triggered by pressing by a user may be detected, and the key position information is analyzed to obtain different password operation information, for example, password deletion information in this embodiment may be obtained, that is, all unlocking passwords need to be deleted and restored to default passwords, and a password deletion operation program is entered and executed based on the password deletion information, and the specific execution process is as follows: firstly, receiving key data information currently input by a user and carrying out password verification, wherein the password verification process can be the process of the reference password verification operation program and is not explained here; and then, if the password passes the verification, confirming that the user has the authority of deleting the password, and automatically generating a command for triggering to clear the password and executing the operation of clearing the local password library when the password passes the verification.
In one embodiment, as shown in fig. 8, step S702 includes:
s801, receiving key data information currently input by a user;
s802, obtaining the length of the currently input password according to the currently input key data information;
s803, judging whether the length of the currently input password is equal to the length of the stored password, if so, entering the step S804, otherwise, returning to the step S801;
s804, acquiring a key position value sequence of the currently input key data information;
s805, judging whether the current key bit value sequence is stored in the local password library, if so, entering a step S806, and if not, jumping to the step S807;
s806, passing the verification;
and S807, failing to pass verification and entering a low power consumption state.
In this embodiment, the password verification is performed according to the verification steps in steps S801 to S807, that is, it can be known whether the user currently operating has the authority to delete the unlock password, and the specific process may refer to the above process of verifying the operation program with reference to the password, which is not described herein.
The embodiment of the invention also provides an intelligent password control system based on the baseless handle, which is used for executing any embodiment of the intelligent password control method based on the baseless handle. Specifically, please refer to fig. 9, and fig. 9 is a schematic block diagram of an intelligent password control system based on a baseless handle according to an embodiment of the present invention.
As shown in fig. 7, the smart password control system 900 based on the baseless handle includes: a trigger unit 901, an operation unit 902, a sleep unit 903, and a voice unit 904.
A trigger unit 901, configured to receive trigger information and exit a low power consumption state;
an operation unit 902, configured to detect and acquire currently triggered key location information, enter a corresponding password operation program using the currently triggered key location information, and perform a corresponding password operation, where the password operation program includes one of a password entry operation program, a password verification operation program, and a password deletion operation program;
and the sleep unit 903 is used for completing the current password operation program and entering a low power consumption state after no operation is performed within a preset time.
This system has realized functions such as control password input, password verification and password deletion through designing intelligent trick lock at no base handle, has the advantage of preventing the mistake and opening and high security.
An embodiment of the present invention further provides a base-less lever handle, including: the handle comprises a handle body, a password module, a touch chip, a main control chip and an unlocking mechanism, wherein the password module, the touch chip, the main control chip and the unlocking mechanism are arranged on the handle body;
the password module is used for receiving the trigger information and transmitting the trigger information to the main control chip through the touch chip;
the main control chip is used for executing exiting from the low power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
In the embodiment, when a finger of a user presses a key of the password module, interruption can be triggered, trigger information is generated and sent to the touch chip and is sent to the main control chip through the touch chip, and the main control chip exits from the low power consumption state; and then entering a corresponding password operation program based on key position information currently triggered by the user and executing corresponding operations such as password entry, password verification, password deletion and the like.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working process of the structural device and the system described above may refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An intelligent password control method based on a baseless handle is characterized by comprising the following steps:
receiving trigger information and exiting a low power consumption state;
detecting and acquiring currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
and after the current password operation program is finished and no operation is performed within the preset time, the system enters a low power consumption state.
2. The intelligent password control method based on the baseless handle according to claim 1, wherein the detecting the key position information triggered currently, entering the corresponding password operation program by using the key position information triggered currently and executing the corresponding password operation comprises:
when the key position information triggered currently is detected to be password entry information, entering a password entry operation program by using the password entry information;
receiving key data information input by a user for multiple times;
judging whether the key data information received for multiple times is consistent;
if yes, judging whether the key data information exists in a local password library or not;
and if the key data information does not exist, the key data information is used as an unlocking password and is stored in the local password library, and password input operation is completed.
3. The intelligent password control method based on the baseless handle according to claim 2, wherein when the key position information currently triggered is detected to be password entry information, entering a password entry operation program by using the password entry information comprises:
detecting and acquiring a key position value triggered currently;
detecting and acquiring the triggering duration of the currently triggered key position value;
entering a menu selection interface when the key information corresponding to the key position value is a menu key and the corresponding trigger duration reaches a preset duration;
and when a password entry instruction selected by the user on the menu selection interface is received, entering a password entry operation program by using the password entry instruction.
4. The intelligent password control method based on the baseless handle according to claim 1, wherein the detecting the key position information triggered currently, entering the corresponding password operation program by using the key position information triggered currently and executing the corresponding password operation comprises:
detecting currently triggered key position information and acquiring the current key bit length;
judging whether the current key bit length is less than the inputtable maximum password length;
if the key position information is not less than the input maximum password length, judging whether the key position information triggered currently is the same as the aging password;
if the two are the same, entering an aging mode.
5. The intelligent password control method based on the baseless handle according to claim 4, wherein after determining whether the current key bit length is smaller than the maximum password length that can be input, the method further comprises:
if the current key bit length is less than the input maximum password length, judging whether the current key bit length is more than or equal to the minimum password length;
if the key position information is larger than or equal to the minimum password length, judging whether the currently triggered key position information is stored in a pre-constructed local password library or not;
if the password is stored, the password is verified to pass, and the unlocking mechanism is controlled to unlock automatically.
6. The intelligent password control method based on the baseless handle according to claim 5, wherein the judging whether the key position information currently triggered is stored in a pre-constructed local password library comprises:
acquiring a key value sequence of the currently triggered key information;
matching the key value sequences with key value sequences corresponding to unlocking passwords stored in the local password library respectively;
if the matching is successful, the key bit value sequence is stored in the local password library.
7. The intelligent password control method based on the baseless handle according to claim 1, wherein the detecting the key position information triggered currently, entering the corresponding password operation program by using the key position information triggered currently and executing the corresponding password operation comprises:
when detecting that the key position information triggered currently is password deleting information, entering a password deleting operation program by using the password deleting information;
receiving key data information currently input by a user and carrying out password verification;
and if the password passes the verification, triggering a password clearing instruction and executing the operation of clearing the local password library.
8. The intelligent password control method based on the baseless handle according to claim 7, wherein the receiving key data information currently input by a user and performing password authentication includes:
receiving key data information currently input by a user;
obtaining the length of the currently input password according to the currently input key data information;
judging whether the length of the currently input password is equal to the length of the stored password;
if yes, acquiring a key position value sequence of the currently input key data information, and judging whether the current key position value sequence is stored in the local password library or not;
if the storage exists, the verification is passed.
9. The utility model provides an intelligence password control system based on no base handle which characterized in that includes:
the trigger unit is used for receiving trigger information and exiting a low power consumption state;
the operation unit is used for detecting and acquiring currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
and the dormancy unit is used for completing the current password operation program and entering a low power consumption state after no operation is performed within a preset time.
10. A baseless handle, comprising: the handle comprises a handle body, a password module, a touch chip, a main control chip and an unlocking mechanism, wherein the password module, the touch chip, the main control chip and the unlocking mechanism are arranged on the handle body;
the password module is used for receiving triggering information and transmitting the triggering information to the main control chip through the touch chip;
the main control chip is used for executing exit from the low power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
CN202210803234.4A 2022-07-07 2022-07-07 Intelligent password control method based on non-base handle and related components Active CN115188104B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210803234.4A CN115188104B (en) 2022-07-07 2022-07-07 Intelligent password control method based on non-base handle and related components

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210803234.4A CN115188104B (en) 2022-07-07 2022-07-07 Intelligent password control method based on non-base handle and related components

Publications (2)

Publication Number Publication Date
CN115188104A true CN115188104A (en) 2022-10-14
CN115188104B CN115188104B (en) 2024-03-01

Family

ID=83516658

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210803234.4A Active CN115188104B (en) 2022-07-07 2022-07-07 Intelligent password control method based on non-base handle and related components

Country Status (1)

Country Link
CN (1) CN115188104B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4812841A (en) * 1987-05-26 1989-03-14 Chen Hai C Computer-controlled password lock
CN1916349A (en) * 2005-08-15 2007-02-21 陈凌峰 Intelligent driving system for push pull type motor-driven door, window
US20150089449A1 (en) * 2013-09-24 2015-03-26 Fih (Hong Kong) Limited Electronic device and method for unlocking the electronic device
US20160070903A1 (en) * 2014-09-05 2016-03-10 International Business Machines Corporation Timing of password change requirements based on ambient intelligence
KR20160087619A (en) * 2015-01-14 2016-07-22 주식회사 엠디아이 Digital door lock device and the operating method
CN205665753U (en) * 2015-10-26 2016-10-26 深圳市章陈融通科技有限公司 Intelligent door lock
CN108053528A (en) * 2017-12-14 2018-05-18 简单租科技(深圳)有限公司 A kind of long-range compound unlocking system and method for low power-consumption intelligent gate inhibition
CN108765636A (en) * 2018-03-28 2018-11-06 上海科世达-华阳汽车电器有限公司 A kind of arrangements for automotive doors unlocker device and system
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN112995208A (en) * 2021-04-16 2021-06-18 佛山职业技术学院 Fault early warning test method and system for intelligent lock and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4812841A (en) * 1987-05-26 1989-03-14 Chen Hai C Computer-controlled password lock
CN1916349A (en) * 2005-08-15 2007-02-21 陈凌峰 Intelligent driving system for push pull type motor-driven door, window
US20150089449A1 (en) * 2013-09-24 2015-03-26 Fih (Hong Kong) Limited Electronic device and method for unlocking the electronic device
US20160070903A1 (en) * 2014-09-05 2016-03-10 International Business Machines Corporation Timing of password change requirements based on ambient intelligence
KR20160087619A (en) * 2015-01-14 2016-07-22 주식회사 엠디아이 Digital door lock device and the operating method
CN205665753U (en) * 2015-10-26 2016-10-26 深圳市章陈融通科技有限公司 Intelligent door lock
CN108053528A (en) * 2017-12-14 2018-05-18 简单租科技(深圳)有限公司 A kind of long-range compound unlocking system and method for low power-consumption intelligent gate inhibition
CN108765636A (en) * 2018-03-28 2018-11-06 上海科世达-华阳汽车电器有限公司 A kind of arrangements for automotive doors unlocker device and system
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN112995208A (en) * 2021-04-16 2021-06-18 佛山职业技术学院 Fault early warning test method and system for intelligent lock and storage medium

Also Published As

Publication number Publication date
CN115188104B (en) 2024-03-01

Similar Documents

Publication Publication Date Title
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
WO2016110002A1 (en) Screen interface unlocking method and screen interface unlocking device
WO2017016064A1 (en) Operation system switching method, operation system switching apparatus and terminal
KR101165325B1 (en) System and Method for Processing Opening and Shutting Door-Lock using One-Time Bar Code, Door-Lock Device
CN104392157A (en) Method and device for locking screen by using passwords
US11302128B2 (en) Easy unlocking method with safety using an electronic key and a biological feature
CN110322599B (en) Door lock management method and device, electronic equipment and storage medium
JP7166061B2 (en) Face authentication system, face authentication server and face authentication method
CN110636168A (en) Storage medium, communication device, control method of communication device, and unlocking system
CN108154588B (en) Unlocking method and system, readable storage medium and intelligent device
CN108734838A (en) It is a kind of that there is the smart lock based on video raw body signature verification device
US11922733B2 (en) System and method of enrolling users of a wireless biometric lockset
KR20220032191A (en) vehicle, and controlling method thereof
CN110223430A (en) A kind of control method of electronic lock, device and electronic lock
CN105976470A (en) Intelligent lockset with rapid switching management and management method thereof
KR100884045B1 (en) Doorlock having touch pad and control method for the same
US20090102623A1 (en) Vehicle Security System
CN105653918A (en) Safe operation method, safe operation device and terminal
CN115188104A (en) Intelligent password control method based on baseless handle and related components
JP6629939B1 (en) Locking device, locking system and locking method
CN110867002A (en) Door opening mode setting method, intelligent lock and storage medium
KR200383752Y1 (en) Device for controlling door open/close
JP2014016726A (en) Authentication device, authentication method, door opening and closing management device, and computer program
JP4932541B2 (en) Authentication system and authentication lock device
KR100665351B1 (en) Digital Door Lock Apparatus Equipped with Temporary Certification Means and Certification Method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant