CN115188104B - Intelligent password control method based on non-base handle and related components - Google Patents
Intelligent password control method based on non-base handle and related components Download PDFInfo
- Publication number
- CN115188104B CN115188104B CN202210803234.4A CN202210803234A CN115188104B CN 115188104 B CN115188104 B CN 115188104B CN 202210803234 A CN202210803234 A CN 202210803234A CN 115188104 B CN115188104 B CN 115188104B
- Authority
- CN
- China
- Prior art keywords
- password
- key
- operation program
- currently
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000001960 triggered effect Effects 0.000 claims abstract description 55
- 238000012795 verification Methods 0.000 claims abstract description 40
- 238000012217 deletion Methods 0.000 claims abstract description 17
- 230000037430 deletion Effects 0.000 claims abstract description 17
- 230000032683 aging Effects 0.000 claims description 9
- 230000007246 mechanism Effects 0.000 claims description 9
- 230000005059 dormancy Effects 0.000 claims description 2
- 230000002265 prevention Effects 0.000 abstract description 4
- 230000008569 process Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000009191 jumping Effects 0.000 description 6
- 230000007958 sleep Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00634—Power supply for the lock
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Sources (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an intelligent password control method based on a non-base handle and related components. The method comprises the following steps: receiving trigger information and exiting the low power consumption state; detecting and acquiring current triggered key position information, entering a corresponding password operation program by utilizing the key position information for executing the current trigger and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program; and after the current password operation program is finished and no operation is performed within the preset time, entering a low power consumption state. The invention designs the intelligent coded lock on the base-free handle, and has the advantages of error opening prevention and high safety.
Description
Technical Field
The invention relates to the technical field of handles, in particular to an intelligent password control method based on a non-base handle and related components.
Background
At present, most of handles on doors and windows are common handles of manual switches, are easy to open by mistake, and in high-rise houses, safety of doors and windows is very important, especially safety of windows is very important, and many potential safety hazards often occur due to insufficient intelligence.
Disclosure of Invention
The invention aims to provide an intelligent password control method based on a non-base handle and related components, and aims to solve the problems that the handle on the existing door and window is easy to open by mistake and the safety is not high enough.
In a first aspect, an embodiment of the present invention provides an intelligent password control method based on a non-base handle, including:
receiving trigger information and exiting the low power consumption state;
detecting and acquiring current triggered key position information, entering a corresponding password operation program by utilizing the current triggered key position information, and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
and after the current password operation program is finished and no operation is performed within the preset time, entering a low power consumption state.
In a second aspect, an embodiment of the present invention provides an intelligent cryptographic control system based on a non-base handle, which is characterized in that the system includes:
the triggering unit is used for receiving the triggering information and exiting the low-power consumption state;
the operation unit is used for detecting and acquiring key position information triggered currently, entering a corresponding password operation program by utilizing the key position information triggered currently and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
and the dormancy unit is used for completing the current password operation program and entering a low power consumption state after no operation is performed in the preset time.
In a third aspect, an embodiment of the present invention provides a non-base handle, including: the handle body is arranged on the password module, the touch chip, the main control chip and the unlocking mechanism on the handle body;
the password module is used for receiving the trigger information and transmitting the trigger information to the main control chip through the touch chip;
the main control chip is used for executing the exit from the low-power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the key position information triggered currently and utilizing the key position information triggered currently to enter a corresponding password operation program and execute corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
The embodiment of the invention discloses an intelligent password control method based on a non-base handle and related components. The method comprises the following steps: receiving trigger information and exiting the low power consumption state; collecting a password image, and executing corresponding password operation in a currently entered password operation program by utilizing the password image, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program; and after the current password operation program is finished and no operation is performed within the preset time, entering a low power consumption state. The invention designs the intelligent coded lock on the base-free handle, and has the advantages of error opening prevention and high safety.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of an intelligent password control method based on an unbase handle according to an embodiment of the present invention;
FIG. 2 is a schematic sub-flowchart of an intelligent password control method based on an unbase handle according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
FIG. 4 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
FIG. 5 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
FIG. 6 is a schematic diagram of another sub-flowchart of an intelligent password control method based on an unbase handle according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
FIG. 8 is a schematic diagram of another sub-flow of the smart password control method based on the non-base handle according to the embodiment of the present invention;
fig. 9 is a schematic block diagram of an intelligent password control system based on an unbase handle according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
Referring to fig. 1, fig. 1 is a schematic flow chart of an intelligent password control method based on a non-base handle according to an embodiment of the present invention;
as shown in fig. 1, the method includes steps S101 to S103.
S101, receiving trigger information and exiting a low-power consumption state;
in the step, when the capacitance change generated by the touch of the key is detected, the low-power consumption state is immediately interrupted and exited.
S102, detecting and acquiring current triggered key position information, entering a corresponding password operation program by utilizing the current triggered key position information, and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
in the step, when a finger presses a key and triggers an interrupt, the pressed key is detected to form key position information, and a corresponding password operation program is entered according to the key position information so as to correspondingly execute operations such as password input, password verification, password deletion and the like.
S103, after the current password operation program is completed and no operation is performed within a preset time, entering a low power consumption state.
In this step, the preset time is preferably 8 seconds, that is, the low power consumption state is entered after 8 seconds of no operation to reduce the power consumption.
In the embodiment, the intelligent coded lock is designed on the base-free handle, and functions of controlling the code input, the code verification, the code deletion and the like are realized, so that the intelligent coded lock has the advantages of error opening prevention and high safety.
The following describes the respective cryptographic operation procedure in detail:
the specific procedures of the password entry operation procedure are as follows:
in one embodiment, as shown in fig. 2, step S102 includes:
s201, when the key information triggered currently is detected to be password input information, entering a password input operation program by utilizing the password input information;
s202, judging whether the key data information received for many times is consistent, if so, entering a step S203, and if not, jumping to a step S204;
s203, judging whether key data information exists in the local password library, if not, jumping to the step S205, and if so, jumping to the step S206;
s204, failing in password entry and entering a low-power consumption state;
s205, taking the key data information as an unlocking password and storing the unlocking password into a local password library to finish password input operation.
S206, the password input fails and enters a low power consumption state.
In this embodiment, key information triggered by pressing by a user may be detected, and the key information may be parsed to obtain different password operation information, for example, password entry information in this embodiment may be obtained, that is, a new unlock password needs to be entered, and based on this, a password entry operation procedure is entered and executed, where the specific execution process is as follows: firstly, receiving key data with preset length formed by first pressing of a user, taking the key data with preset length received for the first time as the standard, receiving the key data with preset length formed by second pressing of the user again, comparing whether the key data of the two times are consistent (it is understood that the key data input by the user can be received for more times according to the requirement and compared), and if so, confirming that the key data is an unlocking password to be input; and then comparing the unlocking password to be input with the unlocking password stored in the local password library, judging whether the unlocking password to be input exists, if so, failing to input the password and entering a low-power consumption state, and if not, storing the unlocking password into the local password library to finish password input operation.
It should be understood that based on the entered unlocking password, the password can be used as a verification identifier for password verification identity when the password is subsequently unlocked.
In one embodiment, as shown in fig. 3, step S201 includes:
s301, detecting and acquiring a currently triggered key value;
s302, detecting and acquiring the triggering time length of the currently triggered key value;
s303, entering a menu selection interface when key information corresponding to the key position value is a menu key and the corresponding trigger time length reaches a preset time length;
s304, when a password input order selected by a user on the menu selection interface is received, entering a password input operation program by utilizing the password input order.
In this embodiment, in order to confirm that the user needs to execute the password input operation, specifically, different keys correspond to different key values, it may be designed to trigger to enter a menu selection interface when a specific key is pressed for a long time, for example, in this embodiment, when a user is detected to press a "well" key and the pressing time reaches a preset time (preferably 5 seconds), the user may enter the menu selection interface after triggering successfully, different keys may be designed in the menu selection interface to correspond to different instructions, for example, a specific number key corresponds to a password input instruction, and if a user is detected to press the specific number key in the menu selection interface, the user may enter a password input operation program.
The specific procedures of the password authentication operation procedure are as follows:
in one embodiment, as shown in fig. 4, step S102 includes:
s401, detecting currently triggered key position information and acquiring the current key position length;
s402, judging whether the current key length is smaller than the maximum cipher length which can be input, if not, entering step S403, and if so, jumping to the following step S501;
s403, judging whether the key position information triggered currently is the same as the aging password, if so, entering a step S404, and if not, jumping to a step S405;
s404, entering an aging mode;
s405, verification fails.
In this embodiment, it may be detected that a user continuously presses a trigger key to obtain key information, a key length (i.e. the number of times of pressing and triggering) is obtained based on the key information, then it is determined whether the current key length is smaller than the maximum cipher length that can be input, if not smaller than the maximum cipher length that can be input, it is indicated that the current key length has exceeded the maximum cipher length, at this time, it is determined whether the user needs to enter an aging mode, specifically, a key value of each press may be obtained based on the key information triggered by continuous pressing, a specific key is obtained according to the key value of each press, so as to obtain a cipher corresponding to the current key information, and the cipher is compared with the aging cipher, if it is consistent, the aging mode is entered, if it is inconsistent, the verification fails, and the low power consumption state is entered.
In one embodiment, as shown in fig. 5, step S402 further includes:
s501, judging whether the current key length is greater than or equal to the minimum password length, if so, entering step S502, and if so, returning to step S401;
s502, judging whether the key position information triggered currently is stored in a local password library constructed in advance, if so, entering step S503, and if not, entering step S504;
s503, controlling an unlocking mechanism to unlock automatically through password verification;
s504, the password verification fails, and the step S401 is returned to execute the password verification again.
In this embodiment, when determining whether the current key length is smaller than the maximum cipher length, if so, it needs to determine whether the current key length is greater than or equal to the minimum cipher length, that is, the embodiment designs a rule for verifying the cipher, specifically: when the current key position length is between the minimum password length and the maximum password length, a password verification process is needed to realize password unlocking; the specific unlocking process is as follows: and obtaining a current unlocking password according to the current triggered key position information, respectively comparing the current unlocking password with the existing locking passwords in the pre-constructed local password library, if the current unlocking password is the same as any one of the existing locking passwords, verifying the password, and controlling the unlocking mechanism to unlock automatically. The anti-normal authentication fails and waits for the user to reenter a new unlock code until the unlock is released or abandoned.
In one embodiment, as shown in fig. 6, step S502 includes:
s601, acquiring a key value sequence of currently triggered key information;
s602, matching the key value sequences with key value sequences corresponding to the unlocking passwords stored in the local password library respectively;
s603, if the matching is successful, the key value sequence is stored in the local password library.
In this embodiment, the key value of each pressing is obtained according to the key information that is triggered currently, and the current key value sequence is formed according to the pressing sequence, so as to obtain the current unlocking password corresponding to the current key information, that is, different unlocking passwords corresponding to different key value sequences, so that the unlocking passwords stored in the local password library are also composed of different key value sequences, and therefore, if the current key value sequence exists in the stored key value sequence, the password verification is indicated to pass by comparing the current key value sequence with the stored key value sequence in the local password library.
In one embodiment, as shown in fig. 7, step S102 includes:
s701, when the key information triggered currently is detected to be the password deleting information, entering a password deleting operation program by utilizing the password deleting information;
the step is to confirm that the user needs to execute the password deleting operation, specifically, referring to the above-mentioned steps S301-S303, the menu selection interface is entered, the password deleting instruction is corresponding to another designated number key in the menu selection interface, and if it is detected that the user presses the designated number key in the menu selection interface, the password deleting operation procedure can be entered.
S702, receiving key data information currently input by a user and performing password verification;
s703, triggering a password clearing instruction and executing a local password library clearing operation if password verification is passed.
In this embodiment, key information triggered by pressing by a user may be detected, and the key information may be parsed to obtain different password operation information, for example, password deletion information in this embodiment may be obtained, that is, all unlock passwords need to be deleted and restored to a default password, and based on this, a password deletion operation program is entered and executed, where the specific execution process is as follows: firstly, receiving key data information currently input by a user and performing password verification, wherein the password verification process can refer to the process of the password verification operation program and is not described herein; and then, if the password verification is passed, confirming that the user has the authority of deleting the password, automatically generating a command for triggering the password clearing and executing the operation of clearing the local password library when the password verification is passed.
In one embodiment, as shown in fig. 8, step S702 includes:
s801, receiving key data information currently input by a user;
s802, obtaining the currently input password length according to the currently input key data information;
s803, judging whether the currently input password length is equal to the stored password length, if so, entering a step S804, and if not, returning to the step S801;
s804, acquiring a key value sequence of currently input key data information;
s805, judging whether the current key value sequence is stored in a local password library, if so, entering a step S806, and if not, jumping to a step S807;
s806, passing verification;
s807, the verification is failed and enters a low power consumption state.
In this embodiment, the password verification is performed according to the verification steps in steps S801-S807, so as to obtain whether the user currently operating has the authority to delete the unlock password, and the specific process may refer to the process of the above-mentioned reference password verification operation procedure, which is not described herein.
The embodiment of the invention also provides an intelligent password control system based on the non-base handle, which is used for executing any embodiment of the intelligent password control method based on the non-base handle. In particular, referring to fig. 9, fig. 9 is a schematic block diagram of an intelligent cryptographic control system based on an unsintered handle according to an embodiment of the present invention.
As shown in fig. 7, the smart password control system 900 based on an unsigned handle includes: a trigger unit 901, an operation unit 902, a sleep unit 903, and a voice unit 904.
The triggering unit 901 is configured to receive triggering information and exit from a low power consumption state;
an operation unit 902, configured to detect and acquire currently triggered key location information, enter a corresponding cryptographic operation program by using the currently triggered key location information, and perform a corresponding cryptographic operation, where the cryptographic operation program includes one of a cryptographic entry operation program, a cryptographic verification operation program, and a cryptographic deletion operation program;
the sleep unit 903 is configured to complete the current cryptographic operation procedure and enter a low power consumption state after no operation is performed for a preset time.
The system realizes the functions of controlling password input, password verification, password deletion and the like by designing the intelligent coded lock on the base-free handle, and has the advantages of error opening prevention and high safety.
The embodiment of the invention also provides a non-base handle, which comprises: the handle body is provided with a password module, a touch chip, a main control chip and an unlocking mechanism;
the password module is used for receiving the trigger information and transmitting the trigger information to the main control chip through the touch chip;
the main control chip is used for executing the exit from the low-power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the key position information triggered currently and entering a corresponding password operation program by utilizing the key position information triggered currently and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
In this embodiment, when a finger of a user presses a key of the password module, an interrupt can be triggered, trigger information is generated and sent to the touch chip, the trigger information is sent to the main control chip through the touch chip, and the main control chip exits from a low power consumption state; and then entering a corresponding password operation program based on key position information currently triggered by the user and executing corresponding operations such as password input, password verification, password deletion and the like.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the above-described structural apparatus and system may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.
Claims (9)
1. An intelligent password control method based on a non-base handle is characterized by comprising the following steps:
receiving trigger information and exiting the low power consumption state;
detecting and acquiring current triggered key position information, entering a corresponding password operation program by utilizing the current triggered key position information, and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
after the current password operation program is completed and no operation is performed within a preset time, entering a low power consumption state;
the detecting and acquiring the key position information triggered currently, entering the corresponding password operation program by utilizing the key position information triggered currently and executing the corresponding password operation, and the method comprises the following steps: detecting currently triggered key position information and acquiring the current key position length; judging whether the current key position length is smaller than the maximum cipher length; if the key position information is not smaller than the maximum cipher length, judging whether the key position information triggered currently is the same as the aging cipher; if the same, entering an aging mode.
2. The method for controlling an intelligent password based on an on-base handle according to claim 1, wherein detecting currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing a corresponding password operation, further comprises:
when the key position information triggered currently is detected to be password input information, entering a password input operation program by utilizing the password input information;
receiving key data information input by a user for a plurality of times;
judging whether the key data information received for multiple times is consistent;
if yes, judging whether the key data information exists in a local password library or not;
and if the key data information does not exist, taking the key data information as an unlocking password and storing the unlocking password into the local password library to finish password input operation.
3. The method for controlling intelligent passwords based on the non-base handle according to claim 2, wherein when the key information triggered currently is detected as password input information, the password input operation program is entered by utilizing the password input information, comprising:
detecting and acquiring a key position value triggered currently;
detecting and acquiring the triggering time length of the currently triggered key position value;
when the key information corresponding to the key position value is a menu key and the corresponding trigger time length reaches the preset time length, entering a menu selection interface;
and when a password input order selected by a user on the menu selection interface is received, entering a password input operation program by utilizing the password input order.
4. The method for controlling an intelligent password based on an unbase handle according to claim 1, wherein after determining whether the current key length is smaller than the maximum password length, further comprising:
if the key length is smaller than the maximum cipher length, judging whether the current key length is greater than or equal to the minimum cipher length;
if the key position information is greater than or equal to the minimum password length, judging whether the key position information triggered currently is stored in a local password library constructed in advance;
if the password is stored, the password passes verification, and the unlocking mechanism is controlled to unlock automatically.
5. The method for controlling an intelligent password based on an unbase handle according to claim 4, wherein the determining whether key information currently triggered is stored in a local password library constructed in advance comprises:
acquiring a key value sequence of key information triggered currently;
matching the key value sequences with key value sequences corresponding to the unlocking passwords stored in the local password library respectively;
and if the matching is successful, the key value sequence is stored in the local password library.
6. The method for controlling an intelligent password based on an on-base handle according to claim 1, wherein detecting currently triggered key position information, entering a corresponding password operation program by using the currently triggered key position information and executing a corresponding password operation, comprises:
when the key position information triggered currently is detected to be the password deleting information, entering a password deleting operation program by utilizing the password deleting information;
receiving key data information currently input by a user and performing password verification;
and if the password verification is passed, triggering a password clearing instruction and executing a local password library clearing operation.
7. The smart password control method of an on-base-handle-based password control method of claim 6, wherein the receiving key data information currently input by a user and performing password authentication comprises:
receiving key data information currently input by a user;
obtaining the currently input password length according to the currently input key data information;
judging whether the currently input password length is equal to the stored password length or not;
if the key value sequence is equal to the key value sequence, acquiring the key value sequence of the currently input key data information, and judging whether the current key value sequence is stored in the local password library or not;
if the storage exists, the verification is passed.
8. An intelligent password control system based on no base handle, characterized by comprising:
the triggering unit is used for receiving the triggering information and exiting the low-power consumption state;
the operation unit is used for detecting and acquiring key position information triggered currently, entering a corresponding password operation program by utilizing the key position information triggered currently and executing corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the dormancy unit is used for completing the current password operation program and entering a low power consumption state after no operation is performed in a preset time;
wherein the operation unit includes: detecting currently triggered key position information and acquiring the current key position length; judging whether the current key position length is smaller than the maximum cipher length; if the key position information is not smaller than the maximum cipher length, judging whether the key position information triggered currently is the same as the aging cipher; if the same, entering an aging mode.
9. An unbase handle, applied to the intelligent password control method based on the unbase handle as claimed in any one of claims 1 to 7, comprising: the handle body is arranged on the password module, the touch chip, the main control chip and the unlocking mechanism on the handle body;
the password module is used for receiving the trigger information and transmitting the trigger information to the main control chip through the touch chip;
the main control chip is used for executing the exit from the low-power consumption state after receiving the trigger information;
the touch chip is also used for detecting and acquiring key position information triggered on the password module and transmitting the key position information to the main control chip;
the main control chip is also used for receiving the key position information triggered currently and utilizing the key position information triggered currently to enter a corresponding password operation program and execute corresponding password operation, wherein the password operation program comprises one of a password input operation program, a password verification operation program and a password deletion operation program;
the main control chip is also used for controlling the unlocking mechanism to execute automatic unlocking operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210803234.4A CN115188104B (en) | 2022-07-07 | 2022-07-07 | Intelligent password control method based on non-base handle and related components |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210803234.4A CN115188104B (en) | 2022-07-07 | 2022-07-07 | Intelligent password control method based on non-base handle and related components |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115188104A CN115188104A (en) | 2022-10-14 |
CN115188104B true CN115188104B (en) | 2024-03-01 |
Family
ID=83516658
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210803234.4A Active CN115188104B (en) | 2022-07-07 | 2022-07-07 | Intelligent password control method based on non-base handle and related components |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115188104B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4812841A (en) * | 1987-05-26 | 1989-03-14 | Chen Hai C | Computer-controlled password lock |
CN1916349A (en) * | 2005-08-15 | 2007-02-21 | 陈凌峰 | Intelligent driving system for push pull type motor-driven door, window |
KR20160087619A (en) * | 2015-01-14 | 2016-07-22 | 주식회사 엠디아이 | Digital door lock device and the operating method |
CN205665753U (en) * | 2015-10-26 | 2016-10-26 | 深圳市章陈融通科技有限公司 | Intelligent door lock |
CN108053528A (en) * | 2017-12-14 | 2018-05-18 | 简单租科技(深圳)有限公司 | A kind of long-range compound unlocking system and method for low power-consumption intelligent gate inhibition |
CN108765636A (en) * | 2018-03-28 | 2018-11-06 | 上海科世达-华阳汽车电器有限公司 | A kind of arrangements for automotive doors unlocker device and system |
CN110322599A (en) * | 2019-05-23 | 2019-10-11 | 深圳绿米联创科技有限公司 | Door lock management method, device, electronic equipment and storage medium |
CN112995208A (en) * | 2021-04-16 | 2021-06-18 | 佛山职业技术学院 | Fault early warning test method and system for intelligent lock and storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW201512966A (en) * | 2013-09-24 | 2015-04-01 | Fih Hong Kong Ltd | Unlocking system and method of electronic device |
US9378357B2 (en) * | 2014-09-05 | 2016-06-28 | International Business Machines Corporation | Timing of password change requirements based on ambient intelligence |
-
2022
- 2022-07-07 CN CN202210803234.4A patent/CN115188104B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4812841A (en) * | 1987-05-26 | 1989-03-14 | Chen Hai C | Computer-controlled password lock |
CN1916349A (en) * | 2005-08-15 | 2007-02-21 | 陈凌峰 | Intelligent driving system for push pull type motor-driven door, window |
KR20160087619A (en) * | 2015-01-14 | 2016-07-22 | 주식회사 엠디아이 | Digital door lock device and the operating method |
CN205665753U (en) * | 2015-10-26 | 2016-10-26 | 深圳市章陈融通科技有限公司 | Intelligent door lock |
CN108053528A (en) * | 2017-12-14 | 2018-05-18 | 简单租科技(深圳)有限公司 | A kind of long-range compound unlocking system and method for low power-consumption intelligent gate inhibition |
CN108765636A (en) * | 2018-03-28 | 2018-11-06 | 上海科世达-华阳汽车电器有限公司 | A kind of arrangements for automotive doors unlocker device and system |
CN110322599A (en) * | 2019-05-23 | 2019-10-11 | 深圳绿米联创科技有限公司 | Door lock management method, device, electronic equipment and storage medium |
CN112995208A (en) * | 2021-04-16 | 2021-06-18 | 佛山职业技术学院 | Fault early warning test method and system for intelligent lock and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN115188104A (en) | 2022-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111835689B (en) | Identity authentication method of digital key, terminal device and medium | |
CN104392157B (en) | Method and device for locking screen by using passwords | |
KR101165325B1 (en) | System and Method for Processing Opening and Shutting Door-Lock using One-Time Bar Code, Door-Lock Device | |
US11501579B2 (en) | System and method of enrolling users of a wireless biometric lockset | |
CN110636168A (en) | Storage medium, communication device, control method of communication device, and unlocking system | |
CN108154588B (en) | Unlocking method and system, readable storage medium and intelligent device | |
CN105678147A (en) | Touch control operation method and device | |
CN110223430A (en) | A kind of control method of electronic lock, device and electronic lock | |
CN114241628A (en) | Vehicle and control method thereof | |
JP2022142638A (en) | Information processing device, information processing method, and system | |
CN105976470A (en) | Intelligent lockset with rapid switching management and management method thereof | |
CN115188104B (en) | Intelligent password control method based on non-base handle and related components | |
JP2010163798A (en) | Entrance/exit management system using card reader radio terminal | |
CN105653918A (en) | Safe operation method, safe operation device and terminal | |
CN105512526B (en) | The quick release method and device of terminal device | |
KR101847469B1 (en) | Apparatus and method for controlling car door using trunk trigger button | |
CN114005201A (en) | Door lock control method and device, electronic equipment and storage medium | |
KR101740682B1 (en) | Apparatus and method for authorizing access of door lock | |
JP2007306350A (en) | Security function of portable communication terminal | |
JP4932541B2 (en) | Authentication system and authentication lock device | |
CN110641415A (en) | Equipment security method, server and intelligent terminal equipment | |
CN111479976A (en) | Determination system, electronic lock control system, door with electronic lock, determination method, and program | |
KR20040094499A (en) | Biometric access control system and method | |
KR101528224B1 (en) | Smart door-lock device and control method | |
JPH0387913A (en) | Keyboard with locking function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |