CN117528311A - Monitoring equipment and safe unlocking method thereof - Google Patents

Monitoring equipment and safe unlocking method thereof Download PDF

Info

Publication number
CN117528311A
CN117528311A CN202311371333.0A CN202311371333A CN117528311A CN 117528311 A CN117528311 A CN 117528311A CN 202311371333 A CN202311371333 A CN 202311371333A CN 117528311 A CN117528311 A CN 117528311A
Authority
CN
China
Prior art keywords
earphone
unlocking
signal
detection unit
power supply
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311371333.0A
Other languages
Chinese (zh)
Inventor
甘欣辉
姚连喜
宋亮
郭贺
储俊
周锴
王聪
高永圣
杨长飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hezheng Special Equipment Co ltd
Original Assignee
Jiangsu Hezheng Special Equipment Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hezheng Special Equipment Co ltd filed Critical Jiangsu Hezheng Special Equipment Co ltd
Priority to CN202311371333.0A priority Critical patent/CN117528311A/en
Publication of CN117528311A publication Critical patent/CN117528311A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R1/00Details of transducers, loudspeakers or microphones
    • H04R1/10Earpieces; Attachments therefor ; Earphones; Monophonic headphones
    • H04R1/1041Mechanical or electronic switches, or control elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R3/00Circuits for transducers, loudspeakers or microphones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R2201/00Details of transducers, loudspeakers or microphones covered by H04R1/00 but not provided for in any of its subgroups
    • H04R2201/10Details of earpieces, attachments therefor, earphones or monophonic headphones covered by H04R1/10 but not provided for in any of its subgroups
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R2430/00Signal processing covered by H04R, not provided for in its groups

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Acoustics & Sound (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides monitoring equipment and a safe unlocking method thereof, wherein the monitoring equipment comprises an earphone interface module, a control module and an unlocking module; the earphone interface module comprises a power supply unit and a detection unit, wherein the power supply unit is used for outputting a power supply signal; the invention regards the earphone as a key for opening the monitoring equipment, the electric signal generated by the connection of the circuit is converted into a password, and the password accords with the expectation to unlock the monitoring equipment. The whole process is similar to unlocking the door lock by using a key, and accords with human habit. No need to operate after the screen is lit. The input process is hidden and not easy to peep by people. If the earphone is specially customized, for example, one more circuit definition is changed into a 5-segment type, the earphone is equivalent to a physical key, and hardware encryption is more difficult to break.

Description

Monitoring equipment and safe unlocking method thereof
Technical Field
The invention relates to monitoring equipment and a safe unlocking method thereof.
Background
Some monitoring devices have 3.5mm earphone jacks. The earphone plug is divided into a left sound channel (L), a right sound channel (R), a ground (G) and a microphone (M) according to different functions. Different passages can be opened and cut off according to different depths of the inserting/extracting jack of the earphone. This process of controlling the access switch may form a cryptographic rule definition.
Similar patent to search:
1. patent "CN104754460a" abstract: the electronic device comprises a headset interface module, a control module and an unlocking module, wherein the headset interface module comprises a power supply unit and a detection unit, the power supply unit is used for outputting a power supply signal, when a headset jack of the headset interface module is not inserted with a headset, the detection unit is connected with the power supply unit so as to output a high-level signal, and when the headset jack is inserted with a headset, the detection unit is disconnected with the power supply unit so as to output a low-level signal; the control module is connected with the detection unit to monitor the output signal of the detection unit in real time, and the unlocking module is connected with the control module and unlocks the electronic device when the control module monitors that the detection unit outputs the low-level signal. The invention also discloses an unlocking method of the electronic device.
This patent differs from the present invention as follows: the patent only judges the two states of inserting and extracting the earphone, and does not judge the inserted segment of the earphone, which is essentially different from the invention.
2. Patent "CN104537734a" abstract: the invention discloses a hardware intelligent key for intelligent terminal equipment, which comprises an intelligent key body, wherein the intelligent key body comprises an earphone plug and a key, and the key is arranged at the top of the earphone plug. The invention completes the encryption and locking of the application program of the intelligent terminal equipment in a hardware mode, has low cost and high safety, and solves the problems of user privacy and safety; when the intelligent key is required to be unlocked, the intelligent key is inserted into the earphone jack of the intelligent terminal device, the APP which can be used only by matching the intelligent key can be started by pressing the key, the password is not required to be frequently and repeatedly input, and the operation is simple and convenient.
This patent differs from the present invention as follows: the patent judges whether the hardware voltage is in the pre-stored reference voltage range, which is different from the judgment basis of the invention.
Disclosure of Invention
The invention aims to: to prevent unauthorized external access, the monitoring device generally needs to provide correct verification information to the user for secure unlocking. The verification information may be a password, a fingerprint, or the like. The invention defines a novel way for acquiring verification information, utilizes the earphone jack of the monitoring equipment as a signal receiving device, compares the received signal with the signal preset by the monitoring equipment, and can safely unlock the monitoring equipment under the condition of consistent results.
The invention specifically provides monitoring equipment which comprises an earphone interface module, a control module and an unlocking module;
the earphone interface module comprises a power supply unit and a detection unit, wherein the power supply unit is used for outputting a power supply signal;
when the earphone plug is gradually inserted into the earphone interface module:
when the earphone jack of the earphone interface module is inserted into the left channel L circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level L1 at the position of a signal 1 can be output;
when the earphone jack of the earphone interface module is inserted into the right channel R circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level R1 at the position of a signal 2 can be output;
when the earphone jack of the earphone interface module is inserted into the grounding GND circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level G1 at the position of a signal 3 can be output;
when the earphone jack of the earphone interface module is inserted into the microphone MIC circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level M1 at the position of a signal 4 can be output;
when the earphone plug is gradually pulled out of the earphone interface module:
when the left sound channel L circuit of the earphone plug is disconnected, the detection unit is disconnected with the power supply unit, so that a low level L2 of a signal 1 position can be output;
when the right channel R circuit of the earphone plug is disconnected, the detection unit is disconnected with the power supply unit, so that a low level R2 of a signal 2 position can be output;
when the grounding GND circuit of the earphone plug is disconnected, the detection unit is disconnected from the power supply unit, so that a low level G2 of a signal 3 position can be output;
when the MIC circuit of the microphone of the earphone plug is disconnected, the detecting unit is disconnected from the power supply unit, so that a low level M2 of the signal 4 position can be output.
The detecting unit generates a group of signal values as a password sequence according to the sequence of gradually inserting and extracting the earphone plug into and from the earphone interface module.
The control module is connected with the detection unit to detect the output signal of the detection unit in real time, and the unlocking module is connected with the control module and unlocks the monitoring equipment when the control module detects that the password sequence output by the detection unit is consistent with the password sequence pre-stored in the unlocking module.
The existing circuit of the earphone is utilized, the on-off condition is recorded by software, a new signal sequence is formed, and the new signal sequence is used as a password of the unlocking equipment.
The invention also provides a method for safely unlocking the monitoring equipment, which comprises the following steps:
step 1, inserting an earphone plug into an earphone interface module, judging whether the earphone is used for unlocking by an unlocking module, if so, executing step 2, otherwise, firstly setting an unlocking password sequence, and storing in the unlocking module;
step 2, the user gradually inserts and extracts the earphone plug into and from the earphone interface module, and the detection unit generates a group of signal values as a password sequence according to the sequence of gradually inserting and extracting the earphone plug into and from the earphone interface module;
step 3, when the control module detects that the password sequence output by the detection unit is consistent with the unlocking password sequence pre-stored in the unlocking module, unlocking the monitoring equipment; if not, returning to the step 2.
The invention also provides a storage medium, which is characterized in that a computer program or instructions are stored, and when the computer program or instructions are executed, the method for safely unlocking the monitoring equipment is realized.
The beneficial effects are that: the prior unlocking technology has unlocking modes such as passwords, graphics, fingerprints, irises, voiceprints and the like. Biological decryption modes are easy to attack or imitate, unlocking modes such as passwords, graphics and the like are easy to peep, and security has holes. The invention regards the earphone as a key for opening the monitoring equipment, the electric signal generated by the connection of the circuit is converted into a password, and the password accords with the expectation to unlock the monitoring equipment. The whole process is similar to unlocking the door lock by using a key, and accords with human habit. No need to operate after the screen is lit. The input process is hidden and not easy to peep by people. If the earphone is specially customized, for example, one more circuit definition is changed into a 5-segment type, the earphone is equivalent to a physical key, and hardware encryption is more difficult to break.
Drawings
The foregoing and/or other advantages of the invention will become more apparent from the following detailed description of the invention when taken in conjunction with the accompanying drawings and detailed description.
Fig. 1 is a schematic structural view of a three-segment and four-segment earphone plug currently popular in the market.
Fig. 2 is a schematic circuit structure formed after the earphone is inserted into the monitoring device.
Fig. 3 is a schematic diagram describing a software control flow of setting a password and unlocking the device.
Detailed Description
The invention specifically provides monitoring equipment which comprises an earphone interface module, a control module and an unlocking module;
the earphone interface module comprises a power supply unit and a detection unit, wherein the power supply unit is used for outputting a power supply signal;
when the earphone plug is gradually inserted into the earphone interface module:
when the earphone jack of the earphone interface module is inserted into the left channel L circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level L1 at the position of a signal 1 can be output;
when the earphone jack of the earphone interface module is inserted into the right channel R circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level R1 at the position of a signal 2 can be output;
when the earphone jack of the earphone interface module is inserted into the grounding GND circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level G1 at the position of a signal 3 can be output;
when the earphone jack of the earphone interface module is inserted into the microphone MIC circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level M1 at the position of a signal 4 can be output;
when the earphone plug is gradually pulled out of the earphone interface module:
when the left sound channel L circuit of the earphone plug is disconnected, the detection unit is disconnected with the power supply unit, so that a low level L2 of a signal 1 position can be output;
when the right channel R circuit of the earphone plug is disconnected, the detection unit is disconnected with the power supply unit, so that a low level R2 of a signal 2 position can be output;
when the grounding GND circuit of the earphone plug is disconnected, the detection unit is disconnected from the power supply unit, so that a low level G2 of a signal 3 position can be output;
when the MIC circuit of the microphone of the earphone plug is disconnected, the detecting unit is disconnected from the power supply unit, so that a low level M2 of the signal 4 position can be output.
The detecting unit generates a group of signal values as a password sequence according to the sequence of gradually inserting and extracting the earphone plug into and from the earphone interface module.
The control module is connected with the detection unit to detect the output signal of the detection unit in real time, and the unlocking module is connected with the control module and unlocks the monitoring equipment when the control module detects that the password sequence output by the detection unit is consistent with the password sequence pre-stored in the unlocking module.
The existing circuit of the earphone is utilized, the on-off condition is recorded by software, a new signal sequence is formed, and the new signal sequence is used as a password of the unlocking equipment.
The invention also provides a method for safely unlocking the monitoring equipment, which comprises the following steps:
step 1, inserting an earphone plug into an earphone interface module, judging whether the earphone is used for unlocking by an unlocking module, if so, executing step 2, otherwise, firstly setting an unlocking password sequence, and storing in the unlocking module;
step 2, the user gradually inserts and extracts the earphone plug into and from the earphone interface module, and the detection unit generates a group of signal values as a password sequence according to the sequence of gradually inserting and extracting the earphone plug into and from the earphone interface module;
step 3, when the control module detects that the password sequence output by the detection unit is consistent with the unlocking password sequence pre-stored in the unlocking module, unlocking the monitoring equipment; if not, returning to the step 2.
The invention also provides a storage medium, which is characterized in that a computer program or instructions are stored, and when the computer program or instructions are executed, the method for safely unlocking the monitoring equipment is realized.
Examples
As shown in fig. 1, the 3.5mm earphone plug is divided into a left channel L, a right channel R, a ground G and a microphone M according to different functions.
And opening different passages according to different depths of the earphone inserting/extracting monitoring equipment. This process of opening the path may form a cryptographic rule definition.
For example, for a three-segment earphone, 1/3 of the left channel L channel is inserted, 1/3 of the right channel R channel is inserted, and 1/3 of the left channel L channel is pulled out, so that a group of LRL codes is formed. For another example, a four-segment headset may form a set of passwords as LRMRMG.
Comparing the acquired password with the password reserved in the monitoring equipment, and safely unlocking the monitoring equipment if the acquired password is matched with the password reserved in the monitoring equipment.
As shown in fig. 2, the headset-end unlock password entry structure is described as follows:
the process of gradually inserting the earphone plug into the earphone hole:
when the left channel L circuit is turned on, a high level of a signal 1 position is generated, and the system marks the level as L1;
when the right channel R circuit is turned on, a high level of the signal 2 position is generated, and the system marks the level as R1;
when the ground GND circuit is turned on, a high level of the signal 3 position is generated, and the system marks the high level as G1;
when the microphone MIC circuit is on, a high level is generated at the signal 4 position, which the system notes as M1.
The process of gradually pulling out the earphone holes by the earphone plug:
when the left channel L circuit is disconnected, a low level of a signal 1 position is generated, and the system marks the level as L2;
when the right channel R circuit is disconnected, a low level of the position of a signal 2 is generated, and the system marks the level as R2;
when the ground GND circuit is disconnected, a low level of the signal 3 position is generated, and the system marks the level as G2;
when the microphone MIC circuit is disconnected, a low level is generated for the signal 4 position, which the system notes as M2.
If the earphone is inserted 1/4, an L1 signal is generated and recorded; when the signal is inserted into the 2/4 position, an R1 signal is generated and recorded; when the signal is inserted into the 3/4 position, a G1 signal is generated and recorded; when the position is pulled out to the 2/4 position, a G2 signal is generated and recorded; when the device is pulled out to the 1/4 position, an R2 signal is generated and recorded; when the earphone is pulled out completely, an L2 signal is generated and recorded. The whole process generates a set of signal values L1R1G 2R2L2, which can be regarded as a set of cryptographic sequences. More complex plug and play processes may form more complex cryptographic sequences, such as L1R1G 2R1G 2R2L2. If the earphone is designed with more than one circuit on hardware, a more unique signal bit can be generated, a unique cipher sequence can be generated, the earphone cannot be simulated, and the confidentiality degree is higher.
Password verification system:
comparing the input password acquired and formed by the earphone end with the preset password of the monitoring equipment, and unlocking the monitoring equipment when the input password meets the expected value; if the preset value is not met, the user is required to reenter. The use process is shown in fig. 3.
The invention provides a monitoring device and a method for safely unlocking the same, and the method and the way for realizing the technical scheme are numerous, the above description is only a preferred embodiment of the invention, and it should be pointed out that a plurality of improvements and modifications can be made to the person skilled in the art without departing from the principle of the invention, and the improvements and the modifications are considered as the protection scope of the invention. The components not explicitly described in this embodiment can be implemented by using the prior art.

Claims (6)

1. The monitoring equipment is characterized by comprising an earphone interface module, a control module and an unlocking module;
the earphone interface module comprises a power supply unit and a detection unit, wherein the power supply unit is used for outputting a power supply signal;
when the earphone plug is gradually inserted into the earphone interface module:
when the earphone jack of the earphone interface module is inserted into the left channel L circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level L1 at the position of a signal 1 can be output;
when the earphone jack of the earphone interface module is inserted into the right channel R circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level R1 at the position of a signal 2 can be output;
when the earphone jack of the earphone interface module is inserted into the grounding GND circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level G1 at the position of a signal 3 can be output;
when the earphone jack of the earphone interface module is inserted into the microphone MIC circuit of the earphone plug, the detection unit is connected with the power supply unit, so that a high level M1 at the position of a signal 4 can be output;
when the earphone plug is gradually pulled out of the earphone interface module:
when the left sound channel L circuit of the earphone plug is disconnected, the detection unit is disconnected with the power supply unit, so that a low level L2 of a signal 1 position can be output;
when the right channel R circuit of the earphone plug is disconnected, the detection unit is disconnected with the power supply unit, so that a low level R2 of a signal 2 position can be output;
when the grounding GND circuit of the earphone plug is disconnected, the detection unit is disconnected from the power supply unit, so that a low level G2 of a signal 3 position can be output;
when the MIC circuit of the microphone of the earphone plug is disconnected, the detecting unit is disconnected from the power supply unit, so that a low level M2 of the signal 4 position can be output.
2. A monitoring device according to claim 1, wherein the detection unit generates a set of signal values as a cryptographic sequence in accordance with the sequence in which the earphone plug is gradually inserted into and removed from the earphone interface module.
3. The monitoring device according to claim 2, wherein the control module is connected to the detection unit to detect an output signal of the detection unit in real time, and the unlocking module is connected to the control module and unlocks the monitoring device when the control module detects that a password sequence output by the detection unit is consistent with a password sequence stored in the unlocking module in advance.
4. A monitoring device according to claim 3, characterized in that the existing circuit of the headset is used for recording the on-off situation, forming a new signal sequence as a code for unlocking the device.
5. A method for safely unlocking a monitoring device, comprising the steps of:
step 1, inserting an earphone plug into an earphone interface module, judging whether the earphone is used for unlocking by an unlocking module, if so, executing step 2, otherwise, firstly setting an unlocking password sequence, and storing in the unlocking module;
step 2, the user gradually inserts and extracts the earphone plug into and from the earphone interface module, and the detection unit generates a group of signal values as a password sequence according to the sequence of gradually inserting and extracting the earphone plug into and from the earphone interface module;
step 3, when the control module detects that the password sequence output by the detection unit is consistent with the unlocking password sequence pre-stored in the unlocking module, unlocking the monitoring equipment; if not, returning to the step 2.
6. A storage medium having stored thereon a computer program or instructions which, when executed, implement the method of claim 5.
CN202311371333.0A 2023-10-23 2023-10-23 Monitoring equipment and safe unlocking method thereof Pending CN117528311A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311371333.0A CN117528311A (en) 2023-10-23 2023-10-23 Monitoring equipment and safe unlocking method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311371333.0A CN117528311A (en) 2023-10-23 2023-10-23 Monitoring equipment and safe unlocking method thereof

Publications (1)

Publication Number Publication Date
CN117528311A true CN117528311A (en) 2024-02-06

Family

ID=89761604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311371333.0A Pending CN117528311A (en) 2023-10-23 2023-10-23 Monitoring equipment and safe unlocking method thereof

Country Status (1)

Country Link
CN (1) CN117528311A (en)

Similar Documents

Publication Publication Date Title
US20150179008A1 (en) Lock/unlock method in conjunction with near field wireless transmission device
US20050039502A1 (en) Protection device for portable computers
EP1450312A3 (en) Electronic access control system
CN105298239A (en) Door lock high in safety and unlocking and counter lock method thereof
CN109372336A (en) A kind of method, intelligent door lock and the computer storage medium of anti-strong electromagnetic
CN111275858A (en) Credit granting method and system for voiceprint recognition
CN113971849A (en) Dynamic coded lock with management system
CN107558821A (en) A kind of intelligent door lock and its method for unlocking
CN108756502A (en) The door lock adapter and its unlocking control method unlocked based on rhythm identification
CN102852400A (en) Coded lock system based on USB (universal serial bus) key and authentication control method thereof
CN112738052B (en) Authentication method between devices, storage medium and electronic device
EP4199770A1 (en) Control circuitry for offline authentication in an aerosol-generating device
CN117528311A (en) Monitoring equipment and safe unlocking method thereof
CN110111464A (en) A kind of individual palpation key controller entrance guard safety system
CN104537734B (en) Hardware intelligent key for intelligent terminal
JP2002268766A (en) Password inputting method
SE526732C2 (en) Security arrangement for ensuring access to device such as portable computer, has key unit with input and communication units to identify user before key unit accepts locking-unlocking
CN109102609B (en) Intelligent lock capable of recognizing behaviors and control method thereof
CN106506843A (en) A kind of theft preventing method and mobile terminal
CN210377589U (en) Intelligent lock capable of being unlocked through electronic key
KR101255733B1 (en) Method of generating cyber key and system for the same
CN108222790A (en) A kind of antitheft door and its monitoring method with fingerprint and pupil identification monitoring
KR20040025004A (en) Certification system to certify password combined fingerprints
CN106572412B (en) A kind of unlocking method and tripper of terminal
US20030004726A1 (en) Access control arrangement and method for access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination