CN115188104B - Intelligent password control method based on non-base handle and related components - Google Patents

Intelligent password control method based on non-base handle and related components Download PDF

Info

Publication number
CN115188104B
CN115188104B CN202210803234.4A CN202210803234A CN115188104B CN 115188104 B CN115188104 B CN 115188104B CN 202210803234 A CN202210803234 A CN 202210803234A CN 115188104 B CN115188104 B CN 115188104B
Authority
CN
China
Prior art keywords
password
key
operation program
currently
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210803234.4A
Other languages
Chinese (zh)
Other versions
CN115188104A (en
Inventor
刘治国
钟鸣
王琥崴
吴海隆
何明峰
梁利波
张黎明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hopo Window Control Technology Co Ltd
Original Assignee
Shenzhen Hopo Window Control Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hopo Window Control Technology Co Ltd filed Critical Shenzhen Hopo Window Control Technology Co Ltd
Priority to CN202210803234.4A priority Critical patent/CN115188104B/en
Publication of CN115188104A publication Critical patent/CN115188104A/en
Application granted granted Critical
Publication of CN115188104B publication Critical patent/CN115188104B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00634Power supply for the lock
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Sources (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an intelligent password control method based on a non-base handle and related components. The method comprises the following steps: receiving trigger information and exiting the low power consumption state; detecting and acquiring current triggered key position information, entering a corresponding password operation program by utilizing the key position information for executing the current trigger and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program; and after the current password operation program is finished and no operation is performed within the preset time, entering a low power consumption state. The invention designs the intelligent coded lock on the base-free handle, and has the advantages of error opening prevention and high safety.

Description

Intelligent password control method based on non-base handle and related components
Technical Field
The invention relates to the technical field of handles, in particular to an intelligent password control method based on a non-base handle and related components.
Background
At present, most of handles on doors and windows are common handles of manual switches, are easy to open by mistake, and in high-rise houses, safety of doors and windows is very important, especially safety of windows is very important, and many potential safety hazards often occur due to insufficient intelligence.
Disclosure of Invention
The invention aims to provide an intelligent password control method based on a non-base handle and related components, and aims to solve the problems that the handle on the existing door and window is easy to open by mistake and the safety is not high enough.
In a first aspect, an embodiment of the present invention provides an intelligent password control method based on a non-base handle, including:
receiving trigger information and exiting the low power consumption state;
detecting and acquiring current triggered key position information, entering a corresponding password operation program by utilizing the current triggered key position information, and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
and after the current password operation program is finished and no operation is performed within the preset time, entering a low power consumption state.
In a second aspect, an embodiment of the present invention provides an intelligent cryptographic control system based on a non-base handle, which is characterized in that the system includes:
the triggering unit is used for receiving the triggering information and exiting the low-power consumption state;
the operation unit is used for detecting and acquiring key position information triggered currently, entering a corresponding password operation program by utilizing the key position information triggered currently and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
and the dormancy unit is used for completing the current password operation program and entering a low power consumption state after no operation is performed in the preset time.
In a third aspect, an embodiment of the present invention provides a non-base handle, including: the handle body is arranged on the password module, the touch chip, the main control chip and the unlocking mechanism on the handle body;
the password module is used for receiving the trigger information and transmitting the trigger information to the main control chip through the touch chip;
the main control chip is used for executing the exit from the low-power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the key position information triggered currently and utilizing the key position information triggered currently to enter a corresponding password operation program and execute corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
The embodiment of the invention discloses an intelligent password control method based on a non-base handle and related components. The method comprises the following steps: receiving trigger information and exiting the low power consumption state; collecting a password image, and executing corresponding password operation in a currently entered password operation program by utilizing the password image, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program; and after the current password operation program is finished and no operation is performed within the preset time, entering a low power consumption state. The invention designs the intelligent coded lock on the base-free handle, and has the advantages of error opening prevention and high safety.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of an intelligent password control method based on an unbase handle according to an embodiment of the present invention;
FIG. 2 is a schematic sub-flowchart of an intelligent password control method based on an unbase handle according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
FIG. 4 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
FIG. 5 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
FIG. 6 is a schematic diagram of another sub-flowchart of an intelligent password control method based on an unbase handle according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
FIG. 8 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
fig. 9 is a schematic block diagram of an intelligent password control system based on an unbase handle according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
Referring to fig. 1, fig. 1 is a schematic flow chart of an intelligent password control method based on a non-base handle according to an embodiment of the present invention;
as shown in fig. 1, the method includes steps S101 to S103.
S101, receiving trigger information and exiting a low-power consumption state;
in the step, when the capacitance change generated by the touch of the key is detected, the low-power consumption state is immediately interrupted and exited.
S102, detecting and acquiring current triggered key position information, entering a corresponding password operation program by utilizing the current triggered key position information, and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
in the step, when a finger presses a key and triggers an interrupt, the pressed key is detected to form key position information, and a corresponding password operation program is entered according to the key position information so as to correspondingly execute operations such as password input, password verification, password deletion and the like.
S103, after the current password operation program is completed and no operation is performed within a preset time, entering a low power consumption state.
In this step, the preset time is preferably 8 seconds, that is, the low power consumption state is entered after 8 seconds of no operation to reduce the power consumption.
In the embodiment, the intelligent coded lock is designed on the base-free handle, and functions of controlling the code input, the code verification, the code deletion and the like are realized, so that the intelligent coded lock has the advantages of error opening prevention and high safety.
The following describes the respective cryptographic operation procedure in detail:
the specific procedures of the password entry operation procedure are as follows:
in one embodiment, as shown in fig. 2, step S102 includes:
s201, when the key information triggered currently is detected to be password input information, entering a password input operation program by utilizing the password input information;
s202, judging whether the key data information received for many times is consistent, if so, entering a step S203, and if not, jumping to a step S204;
s203, judging whether key data information exists in the local password library, if not, jumping to the step S205, and if so, jumping to the step S206;
s204, failing in password entry and entering a low-power consumption state;
s205, taking the key data information as an unlocking password and storing the unlocking password into a local password library to finish password input operation.
S206, the password input fails and enters a low power consumption state.
In this embodiment, key information triggered by pressing by a user may be detected, and the key information may be parsed to obtain different password operation information, for example, password entry information in this embodiment may be obtained, that is, a new unlock password needs to be entered, and based on this, a password entry operation procedure is entered and executed, where the specific execution process is as follows: firstly, receiving key data with preset length formed by first pressing of a user, taking the key data with preset length received for the first time as the standard, receiving the key data with preset length formed by second pressing of the user again, comparing whether the key data of the two times are consistent (it is understood that the key data input by the user can be received for more times according to the requirement and compared), and if so, confirming that the key data is an unlocking password to be input; and then comparing the unlocking password to be input with the unlocking password stored in the local password library, judging whether the unlocking password to be input exists, if so, failing to input the password and entering a low-power consumption state, and if not, storing the unlocking password into the local password library to finish password input operation.
It should be understood that based on the entered unlocking password, the password can be used as a verification identifier for password verification identity when the password is subsequently unlocked.
In one embodiment, as shown in fig. 3, step S201 includes:
s301, detecting and acquiring a currently triggered key value;
s302, detecting and acquiring the triggering time length of the currently triggered key value;
s303, entering a menu selection interface when key information corresponding to the key position value is a menu key and the corresponding trigger time length reaches a preset time length;
s304, when a password input order selected by a user on the menu selection interface is received, entering a password input operation program by utilizing the password input order.
In this embodiment, in order to confirm that the user needs to execute the password input operation, specifically, different keys correspond to different key values, it may be designed to trigger to enter a menu selection interface when a specific key is pressed for a long time, for example, in this embodiment, when a user is detected to press a "well" key and the pressing time reaches a preset time (preferably 5 seconds), the user may enter the menu selection interface after triggering successfully, different keys may be designed in the menu selection interface to correspond to different instructions, for example, a specific number key corresponds to a password input instruction, and if a user is detected to press the specific number key in the menu selection interface, the user may enter a password input operation program.
The specific procedures of the password authentication operation procedure are as follows:
in one embodiment, as shown in fig. 4, step S102 includes:
s401, detecting currently triggered key position information and acquiring the current key position length;
s402, judging whether the current key length is smaller than the maximum cipher length which can be input, if not, entering step S403, and if so, jumping to the following step S501;
s403, judging whether the key position information triggered currently is the same as the aging password, if so, entering a step S404, and if not, jumping to a step S405;
s404, entering an aging mode;
s405, verification fails.
In this embodiment, it may be detected that a user continuously presses a trigger key to obtain key information, a key length (i.e. the number of times of pressing and triggering) is obtained based on the key information, then it is determined whether the current key length is smaller than the maximum cipher length that can be input, if not smaller than the maximum cipher length that can be input, it is indicated that the current key length has exceeded the maximum cipher length, at this time, it is determined whether the user needs to enter an aging mode, specifically, a key value of each press may be obtained based on the key information triggered by continuous pressing, a specific key is obtained according to the key value of each press, so as to obtain a cipher corresponding to the current key information, and the cipher is compared with the aging cipher, if it is consistent, the aging mode is entered, if it is inconsistent, the verification fails, and the low power consumption state is entered.
In one embodiment, as shown in fig. 5, step S402 further includes:
s501, judging whether the current key length is greater than or equal to the minimum password length, if so, entering step S502, and if so, returning to step S401;
s502, judging whether the key position information triggered currently is stored in a local password library constructed in advance, if so, entering step S503, and if not, entering step S504;
s503, controlling an unlocking mechanism to unlock automatically through password verification;
s504, the password verification fails, and the step S401 is returned to execute the password verification again.
In this embodiment, when determining whether the current key length is smaller than the maximum cipher length, if so, it needs to determine whether the current key length is greater than or equal to the minimum cipher length, that is, the embodiment designs a rule for verifying the cipher, specifically: when the current key position length is between the minimum password length and the maximum password length, a password verification process is needed to realize password unlocking; the specific unlocking process is as follows: and obtaining a current unlocking password according to the current triggered key position information, respectively comparing the current unlocking password with the existing locking passwords in the pre-constructed local password library, if the current unlocking password is the same as any one of the existing locking passwords, verifying the password, and controlling the unlocking mechanism to unlock automatically. The anti-normal authentication fails and waits for the user to reenter a new unlock code until the unlock is released or abandoned.
In one embodiment, as shown in fig. 6, step S502 includes:
s601, acquiring a key value sequence of currently triggered key information;
s602, matching the key value sequences with key value sequences corresponding to the unlocking passwords stored in the local password library respectively;
s603, if the matching is successful, the key value sequence is stored in the local password library.
In this embodiment, the key value of each pressing is obtained according to the key information that is triggered currently, and the current key value sequence is formed according to the pressing sequence, so as to obtain the current unlocking password corresponding to the current key information, that is, different unlocking passwords corresponding to different key value sequences, so that the unlocking passwords stored in the local password library are also composed of different key value sequences, and therefore, if the current key value sequence exists in the stored key value sequence, the password verification is indicated to pass by comparing the current key value sequence with the stored key value sequence in the local password library.
In one embodiment, as shown in fig. 7, step S102 includes:
s701, when the key information triggered currently is detected to be the password deleting information, entering a password deleting operation program by utilizing the password deleting information;
the step is to confirm that the user needs to execute the password deleting operation, specifically, referring to the above-mentioned steps S301-S303, the menu selection interface is entered, the password deleting instruction is corresponding to another designated number key in the menu selection interface, and if it is detected that the user presses the designated number key in the menu selection interface, the password deleting operation procedure can be entered.
S702, receiving key data information currently input by a user and performing password verification;
s703, triggering a password clearing instruction and executing a local password library clearing operation if password verification is passed.
In this embodiment, key information triggered by pressing by a user may be detected, and the key information may be parsed to obtain different password operation information, for example, password deletion information in this embodiment may be obtained, that is, all unlock passwords need to be deleted and restored to a default password, and based on this, a password deletion operation program is entered and executed, where the specific execution process is as follows: firstly, receiving key data information currently input by a user and performing password verification, wherein the password verification process can refer to the process of the password verification operation program and is not described herein; and then, if the password verification is passed, confirming that the user has the authority of deleting the password, automatically generating a command for triggering the password clearing and executing the operation of clearing the local password library when the password verification is passed.
In one embodiment, as shown in fig. 8, step S702 includes:
s801, receiving key data information currently input by a user;
s802, obtaining the currently input password length according to the currently input key data information;
s803, judging whether the currently input password length is equal to the stored password length, if so, entering a step S804, and if not, returning to the step S801;
s804, acquiring a key value sequence of currently input key data information;
s805, judging whether the current key value sequence is stored in a local password library, if so, entering a step S806, and if not, jumping to a step S807;
s806, passing verification;
s807, the verification is failed and enters a low power consumption state.
In this embodiment, the password verification is performed according to the verification steps in steps S801-S807, so as to obtain whether the user currently operating has the authority to delete the unlock password, and the specific process may refer to the process of the above-mentioned reference password verification operation procedure, which is not described herein.
The embodiment of the invention also provides an intelligent password control system based on the non-base handle, which is used for executing any embodiment of the intelligent password control method based on the non-base handle. In particular, referring to fig. 9, fig. 9 is a schematic block diagram of an intelligent cryptographic control system based on an unsintered handle according to an embodiment of the present invention.
As shown in fig. 7, the smart password control system 900 based on an unsigned handle includes: a trigger unit 901, an operation unit 902, a sleep unit 903, and a voice unit 904.
The triggering unit 901 is configured to receive triggering information and exit from a low power consumption state;
an operation unit 902, configured to detect and acquire currently triggered key location information, enter a corresponding cryptographic operation program by using the currently triggered key location information, and perform a corresponding cryptographic operation, where the cryptographic operation program includes one of a cryptographic entry operation program, a cryptographic verification operation program, and a cryptographic deletion operation program;
the sleep unit 903 is configured to complete the current cryptographic operation procedure and enter a low power consumption state after no operation is performed for a preset time.
The system realizes the functions of controlling password input, password verification, password deletion and the like by designing the intelligent coded lock on the base-free handle, and has the advantages of error opening prevention and high safety.
The embodiment of the invention also provides a non-base handle, which comprises: the handle body is provided with a password module, a touch chip, a main control chip and an unlocking mechanism;
the password module is used for receiving the trigger information and transmitting the trigger information to the main control chip through the touch chip;
the main control chip is used for executing the exit from the low-power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the key position information triggered currently and entering a corresponding password operation program by utilizing the key position information triggered currently and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
In this embodiment, when a finger of a user presses a key of the password module, an interrupt can be triggered, trigger information is generated and sent to the touch chip, the trigger information is sent to the main control chip through the touch chip, and the main control chip exits from a low power consumption state; and then entering a corresponding password operation program based on key position information currently triggered by the user and executing corresponding operations such as password input, password verification, password deletion and the like.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the above-described structural apparatus and system may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (9)

1. An intelligent password control method based on a non-base handle is characterized by comprising the following steps:
receiving trigger information and exiting the low power consumption state;
detecting and acquiring current triggered key position information, entering a corresponding password operation program by utilizing the current triggered key position information, and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
after the current password operation program is completed and no operation is performed within a preset time, entering a low power consumption state;
the detecting and acquiring the key position information triggered currently, entering the corresponding password operation program by utilizing the key position information triggered currently and executing the corresponding password operation, and the method comprises the following steps: detecting currently triggered key position information and acquiring the current key position length; judging whether the current key position length is smaller than the maximum cipher length; if the key position information is not smaller than the maximum cipher length, judging whether the key position information triggered currently is the same as the aging cipher; if the same, entering an aging mode.
2. The method for controlling an intelligent password based on an on-base handle according to claim 1, wherein detecting currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing a corresponding password operation, further comprises:
when the key position information triggered currently is detected to be password input information, entering a password input operation program by utilizing the password input information;
receiving key data information input by a user for a plurality of times;
judging whether the key data information received for multiple times is consistent;
if yes, judging whether the key data information exists in a local password library or not;
and if the key data information does not exist, taking the key data information as an unlocking password and storing the unlocking password into the local password library to finish password input operation.
3. The method for controlling intelligent passwords based on the non-base handle according to claim 2, wherein when the key information triggered currently is detected as password input information, the password input operation program is entered by utilizing the password input information, comprising:
detecting and acquiring a key position value triggered currently;
detecting and acquiring the triggering time length of the currently triggered key position value;
when the key information corresponding to the key position value is a menu key and the corresponding trigger time length reaches the preset time length, entering a menu selection interface;
and when a password input order selected by a user on the menu selection interface is received, entering a password input operation program by utilizing the password input order.
4. The method for controlling an intelligent password based on an unbase handle according to claim 1, wherein after determining whether the current key length is smaller than the maximum password length, further comprising:
if the key length is smaller than the maximum cipher length, judging whether the current key length is greater than or equal to the minimum cipher length;
if the key position information is greater than or equal to the minimum password length, judging whether the key position information triggered currently is stored in a local password library constructed in advance;
if the password is stored, the password passes verification, and the unlocking mechanism is controlled to unlock automatically.
5. The method for controlling an intelligent password based on an unbase handle according to claim 4, wherein the determining whether key information currently triggered is stored in a local password library constructed in advance comprises:
acquiring a key value sequence of key information triggered currently;
matching the key value sequences with key value sequences corresponding to the unlocking passwords stored in the local password library respectively;
and if the matching is successful, the key value sequence is stored in the local password library.
6. The method for controlling an intelligent password based on an on-base handle according to claim 1, wherein detecting currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing a corresponding password operation, comprises:
when the key position information triggered currently is detected to be the password deleting information, entering a password deleting operation program by utilizing the password deleting information;
receiving key data information currently input by a user and performing password verification;
and if the password verification is passed, triggering a password clearing instruction and executing a local password library clearing operation.
7. The smart password control method of an on-base-handle-based password control method of claim 6, wherein the receiving key data information currently input by a user and performing password authentication comprises:
receiving key data information currently input by a user;
obtaining the currently input password length according to the currently input key data information;
judging whether the currently input password length is equal to the stored password length or not;
if the key value sequence is equal to the key value sequence, acquiring the key value sequence of the currently input key data information, and judging whether the current key value sequence is stored in the local password library or not;
if the storage exists, the verification is passed.
8. An intelligent password control system based on no base handle, characterized by comprising:
the triggering unit is used for receiving the triggering information and exiting the low-power consumption state;
the operation unit is used for detecting and acquiring key position information triggered currently, entering a corresponding password operation program by utilizing the key position information triggered currently and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the dormancy unit is used for completing the current password operation program and entering a low power consumption state after no operation is performed in a preset time;
wherein the operation unit includes: detecting currently triggered key position information and acquiring the current key position length; judging whether the current key position length is smaller than the maximum cipher length; if the key position information is not smaller than the maximum cipher length, judging whether the key position information triggered currently is the same as the aging cipher; if the same, entering an aging mode.
9. An unbase handle, applied to the intelligent password control method based on the unbase handle as claimed in any one of claims 1 to 7, comprising: the handle body is arranged on the password module, the touch chip, the main control chip and the unlocking mechanism on the handle body;
the password module is used for receiving the trigger information and transmitting the trigger information to the main control chip through the touch chip;
the main control chip is used for executing the exit from the low-power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the key position information triggered currently and utilizing the key position information triggered currently to enter a corresponding password operation program and execute corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
CN202210803234.4A 2022-07-07 2022-07-07 Intelligent password control method based on non-base handle and related components Active CN115188104B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210803234.4A CN115188104B (en) 2022-07-07 2022-07-07 Intelligent password control method based on non-base handle and related components

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210803234.4A CN115188104B (en) 2022-07-07 2022-07-07 Intelligent password control method based on non-base handle and related components

Publications (2)

Publication Number Publication Date
CN115188104A CN115188104A (en) 2022-10-14
CN115188104B true CN115188104B (en) 2024-03-01

Family

ID=83516658

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210803234.4A Active CN115188104B (en) 2022-07-07 2022-07-07 Intelligent password control method based on non-base handle and related components

Country Status (1)

Country Link
CN (1) CN115188104B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4812841A (en) * 1987-05-26 1989-03-14 Chen Hai C Computer-controlled password lock
CN1916349A (en) * 2005-08-15 2007-02-21 陈凌峰 Intelligent driving system for push pull type motor-driven door, window
KR20160087619A (en) * 2015-01-14 2016-07-22 주식회사 엠디아이 Digital door lock device and the operating method
CN205665753U (en) * 2015-10-26 2016-10-26 深圳市章陈融通科技有限公司 Intelligent door lock
CN108053528A (en) * 2017-12-14 2018-05-18 简单租科技(深圳)有限公司 A kind of long-range compound unlocking system and method for low power-consumption intelligent gate inhibition
CN108765636A (en) * 2018-03-28 2018-11-06 上海科世达-华阳汽车电器有限公司 A kind of arrangements for automotive doors unlocker device and system
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN112995208A (en) * 2021-04-16 2021-06-18 佛山职业技术学院 Fault early warning test method and system for intelligent lock and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201512966A (en) * 2013-09-24 2015-04-01 Fih Hong Kong Ltd Unlocking system and method of electronic device
US9378357B2 (en) * 2014-09-05 2016-06-28 International Business Machines Corporation Timing of password change requirements based on ambient intelligence

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4812841A (en) * 1987-05-26 1989-03-14 Chen Hai C Computer-controlled password lock
CN1916349A (en) * 2005-08-15 2007-02-21 陈凌峰 Intelligent driving system for push pull type motor-driven door, window
KR20160087619A (en) * 2015-01-14 2016-07-22 주식회사 엠디아이 Digital door lock device and the operating method
CN205665753U (en) * 2015-10-26 2016-10-26 深圳市章陈融通科技有限公司 Intelligent door lock
CN108053528A (en) * 2017-12-14 2018-05-18 简单租科技(深圳)有限公司 A kind of long-range compound unlocking system and method for low power-consumption intelligent gate inhibition
CN108765636A (en) * 2018-03-28 2018-11-06 上海科世达-华阳汽车电器有限公司 A kind of arrangements for automotive doors unlocker device and system
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN112995208A (en) * 2021-04-16 2021-06-18 佛山职业技术学院 Fault early warning test method and system for intelligent lock and storage medium

Also Published As

Publication number Publication date
CN115188104A (en) 2022-10-14

Similar Documents

Publication Publication Date Title
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
CN104392157B (en) Method and device for locking screen by using passwords
KR101165325B1 (en) System and Method for Processing Opening and Shutting Door-Lock using One-Time Bar Code, Door-Lock Device
US11501579B2 (en) System and method of enrolling users of a wireless biometric lockset
CN110636168A (en) Storage medium, communication device, control method of communication device, and unlocking system
CN108154588B (en) Unlocking method and system, readable storage medium and intelligent device
CN105678147A (en) Touch control operation method and device
CN110223430A (en) A kind of control method of electronic lock, device and electronic lock
CN114241628A (en) Vehicle and control method thereof
JP2022142638A (en) Information processing device, information processing method, and system
CN105976470A (en) Intelligent lockset with rapid switching management and management method thereof
CN115188104B (en) Intelligent password control method based on non-base handle and related components
JP2010163798A (en) Entrance/exit management system using card reader radio terminal
CN105653918A (en) Safe operation method, safe operation device and terminal
CN105512526B (en) The quick release method and device of terminal device
KR101847469B1 (en) Apparatus and method for controlling car door using trunk trigger button
CN114005201A (en) Door lock control method and device, electronic equipment and storage medium
KR101740682B1 (en) Apparatus and method for authorizing access of door lock
JP2007306350A (en) Security function of portable communication terminal
JP4932541B2 (en) Authentication system and authentication lock device
CN110641415A (en) Equipment security method, server and intelligent terminal equipment
CN111479976A (en) Determination system, electronic lock control system, door with electronic lock, determination method, and program
KR20040094499A (en) Biometric access control system and method
KR101528224B1 (en) Smart door-lock device and control method
JPH0387913A (en) Keyboard with locking function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant