WO2018028308A1 - 一种设备解锁方法、系统、解锁设备及待解锁设备 - Google Patents

一种设备解锁方法、系统、解锁设备及待解锁设备 Download PDF

Info

Publication number
WO2018028308A1
WO2018028308A1 PCT/CN2017/089010 CN2017089010W WO2018028308A1 WO 2018028308 A1 WO2018028308 A1 WO 2018028308A1 CN 2017089010 W CN2017089010 W CN 2017089010W WO 2018028308 A1 WO2018028308 A1 WO 2018028308A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
audio
signal
parameter
unlocked
Prior art date
Application number
PCT/CN2017/089010
Other languages
English (en)
French (fr)
Inventor
郝志坚
朱钰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018028308A1 publication Critical patent/WO2018028308A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Definitions

  • This document relates to, but is not limited to, the field of device unlocking, and in particular, to a device unlocking method, a system, an unlocking device, and a device to be unlocked.
  • the conventional unlocking method such as the user manually inputting a password, a fingerprint, etc., the password and the fingerprint are visible to others, and there is a risk of loss caused by theft of the password/fingerprint by others, so it is necessary to provide a decryption information such as a password and a fingerprint that are invisible to others.
  • the unlocking method is a technical problem to be solved by those skilled in the art.
  • the embodiment of the invention provides a device unlocking method, a system, an unlocking device and a device to be unlocked, which can effectively prevent the decrypted information from being illegally stolen.
  • a method for unlocking a device including:
  • the audio password signal is obtained, and the audio password signal carries an unlocking parameter for unlocking the device to be unlocked;
  • the audio password signal is sent to the device to be unlocked through the high frequency audio band to unlock the device to be unlocked.
  • a method for unlocking a device including:
  • the audio cipher signal carries an unlocking parameter for unlocking the device to be unlocked, and the audio cipher signal is an unlocking device that is verified by its current user as Sent by a legitimate user;
  • a method for unlocking a device including:
  • the unlocking device verifies whether the current user is a legitimate user when the device needs to be unlocked. If the current user is a legitimate user, the audio password signal is obtained, and the audio password signal carries the unlocking parameter for unlocking the device to be unlocked, and the high frequency audio band is adopted. Send an audio password signal to the device to be unlocked;
  • the device to be unlocked receives the audio cipher signal through the high frequency audio band, parses the audio cipher signal, obtains the unlocking parameter carried by the audio cipher signal, verifies the unlocking parameter, and unlocks when the verification passes.
  • an unlocking device including: a verification module and a communication module, wherein the verification module is configured to verify whether the current user is a legitimate user when the device to be unlocked is required to be unlocked; and the communication module is set to be a legitimate user if the current user is a legitimate user Obtain an audio password signal, and the audio password signal carries an unlocking parameter for unlocking the device to be unlocked, and sends the audio password signal to the device to be unlocked through the high frequency audio band.
  • a device to be unlocked including: a receiving module and an unlocking module, wherein the receiving module is configured to receive an audio password signal through a high frequency audio band, and the audio password signal carries an unlocking parameter for unlocking the device to be unlocked.
  • the audio password signal is sent after the unlocking device is authenticated as a legitimate user for the current user; the unlocking module is configured to parse the audio password signal, obtain the unlocking parameter carried by the audio password signal, verify the unlocking parameter, and unlock when the verification passes.
  • a device unlocking system including: an unlocking device provided by an embodiment of the present invention, and a device to be unlocked.
  • a computer storage medium in another aspect, storing computer executable instructions for performing any of the foregoing device unlocking methods.
  • An embodiment of the present invention provides a device unlocking method, which sends a decryption information by using a high frequency audio band to transmit an audio cipher signal. Since the voice signal is sent through a voice signal, it is invisible to the user, because the high frequency audio band is used.
  • the ear is not audible, thus avoiding the illegal user stealing the decrypted information; at the same time, the method authenticates the user identity before sending the audio password signal, and only sends the audio password signal when the current user is a legitimate user, so that even if the unlocking device is lost /Stolen, because the user identity authentication can not be verified, and will not cause the audio password signal to be illegally used, further enhancing the security of the device and enhancing the user experience.
  • FIG. 1 is a flowchart of a method for unlocking a device according to a first embodiment of the present invention
  • FIG. 2 is a flowchart of a method for unlocking a device applied to an unlocking device according to an embodiment of the present invention
  • FIG. 3 is a flowchart of a method for unlocking a device applied to a device to be unlocked according to an embodiment of the present disclosure
  • FIG. 4 is a schematic structural diagram of a device unlocking system according to a second embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of an unlocking system according to a third embodiment of the present invention.
  • FIG. 6 is a flowchart of a device unlocking method according to a fourth embodiment of the present invention.
  • FIG. 7 is a flowchart of a device unlocking method according to a fifth embodiment of the present invention.
  • FIG. 1 is a flowchart of a device unlocking method according to a first embodiment of the present invention. As shown in FIG. 1 , the device unlocking method provided in this embodiment includes:
  • the unlocking device verifies whether the current user is legal when the device to be unlocked needs to be unlocked. If the current user is a legitimate user, the audio password signal is obtained, and the audio password signal carries an unlocking parameter for unlocking the device to be unlocked, and the audio password signal is sent to the device to be unlocked through the high frequency audio band;
  • the device to be unlocked receives the audio password signal through the high frequency audio band, parses the audio password signal, acquires the unlocking parameter carried by the audio password signal, verifies the unlocking parameter, and unlocks when the verification passes.
  • the method authenticates the user identity before sending the audio password signal, and only sends the audio password signal when the current user is a legitimate user, so that even if the user is unlocked
  • the device is lost/stolen, because the user identity authentication cannot be verified, and the audio password signal is not illegally used, which further enhances the device security and enhances the user experience.
  • the device unlocking method provided in the foregoing embodiment is protected on the unlocking device side.
  • the unlocking device in this embodiment includes a user mobile phone, a tablet computer, a smart key, and the like.
  • the device unlocking method in the foregoing embodiment is implemented on the unlocking device side, as shown in FIG. 2, and includes:
  • S201 verifies whether the current user is a legitimate user when the device to be unlocked needs to be unlocked;
  • S203 sends an audio password signal to the device to be unlocked through the high frequency audio band to unlock the device to be unlocked.
  • the acquiring the audio cipher signal in the foregoing embodiment includes:
  • the first audio signal stored in advance is called as an audio password signal, and the first audio signal is generated according to the first unlocking parameter input by the user in advance;
  • the second unlocking parameter input by the current user is received, and the second audio signal is generated according to the second unlocking parameter as an audio password signal.
  • This embodiment provides two ways to obtain an audio cipher signal: calling a pre-stored audio signal, or generating an audio signal in real time; the two are in a side-by-side manner, and the unlocking device can select according to needs, for example, the unlocking device uses pre-stored After the audio signal is unlocked for a predetermined number of times, the mode may be automatically switched, and the current user is required to input the second unlocking parameter, and the second audio signal is generated in real time to be unlocked.
  • the first unlocking parameter and the second unlocking parameter may be the same. It can also be different.
  • the unlocking parameters in the above embodiments include one or both of a static password and a voice of a person.
  • the static password may include a numeric password set by the user, such as 1234, and may also be a parameter such as a user fingerprint, and the vocal voice may be a paragraph spoken by the user.
  • generating the second audio signal according to the second unlocking parameter in the foregoing embodiment includes: acquiring a second unlocking parameter in a digital format, and performing encryption processing on the second unlocking parameter in the digital format by using the device identifier to obtain an encrypted number. a parameter, encoding and modulating the encrypted digital parameter to generate a second audio signal; or acquiring a second unlocking parameter in a digital format, and encoding and modulating the second unlocking parameter in the digital format to generate a second audio signal.
  • the device unlocking method in the foregoing embodiment before calling the pre-stored first audio signal, further includes: acquiring a first unlocking parameter in a digital format, and encrypting the first unlocking parameter in the digital format by using the device identifier. Processing, obtaining an encrypted digital parameter, encoding and modulating the encrypted digital parameter to generate a first audio signal; or acquiring a first unlocking parameter in a digital format, and encoding and modulating the first unlocking parameter in the digital format to generate a first audio signal.
  • verifying whether the current user is a legitimate user in the foregoing embodiment includes:
  • the physical sign information includes at least one of face information, voiceprint information, and iris information
  • the device unlocking method in the foregoing embodiment further includes: accumulating the number of times the current user fails to be verified, and when the accumulated number of times is greater than a threshold (such as user setting or device default 3 times), the user verification function is turned off, After the preset time period, re-enable the user verification function, verify when Whether the former user is a legitimate user.
  • a threshold such as user setting or device default 3 times
  • the device unlocking method in the foregoing embodiment further includes: before sending the audio password signal,
  • the audio cipher signal is transmitted using a signal corresponding to the signal strength through the high frequency audio band.
  • the signal strength is introduced.
  • the signal strength is used to limit the transmission distance of the audio cipher signal.
  • the signal strength is large and the transmission distance is far.
  • the signal strength is used to prevent the audio cipher signal from being transmitted too far.
  • the device unlocking method provided in the foregoing embodiment is protected on the device side to be unlocked.
  • the device to be unlocked in this embodiment includes a door lock, an access control device, or a user mobile phone, a tablet computer, and the like.
  • the device unlocking method in the foregoing embodiment is embodied on the device side to be unlocked, as shown in FIG. 3, and includes:
  • S301 receives an audio cipher signal through a high frequency audio band; the audio cipher signal carries an unlocking parameter for unlocking the device to be unlocked, and the audio cipher signal is sent after the unlocking device verifies that the current user is a legitimate user;
  • S302 parses the audio password signal to obtain an unlocking parameter carried by the audio password signal
  • S303 verifies the unlocking parameter and unlocks when the verification passes.
  • the device unlocking method in the foregoing embodiment further includes: when detecting the approach of the human body, acquiring biometrics close to the human body, and calculating a matching degree between the biometrics close to the human body and the biometric features of the pre-stored legal users, When the matching degree is greater than the activation threshold, the voice receiving function is turned on, the audio password signal is received, and when the human body is detected to be far away, the voice receiving function is turned off.
  • the biometrics involved in this embodiment are different from the facial information, voiceprint information, and iris information of the user.
  • the physical information can be used to uniquely identify the user without being impersonated, and the biometrics can be performed on the user.
  • Screening, optional, biometrics can be height, fat and thin, body temperature, whether to wear glasses, etc., can be achieved by preliminary screening close to the human body.
  • the device to be unlocked can use the radar to detect the proximity of objects, activate the filtering function, and get close to the object.
  • the body temperature is based on the body temperature standard (36.5-37.9°), which is used to check whether the object is close to the object.
  • the height is obtained and it is judged whether it matches the height of the pre-stored legal user (175cm). If the matching requirements are met (considering the user wearing shoes, no shoes, etc., the matching requirement may be 170cm-180cm), it is considered that the human body is likely to be a legitimate user when the human body is close to the human body.
  • the voice unlocking function is activated, and the voice receiving function is activated. Receive an audio password signal.
  • the device unlocking method in the foregoing embodiment further includes: when the cumulative number of failed verifications reaches a threshold, turning off the voice receiving function, and clearing the accumulated number of times, and after the preset time period, restarting the voice receiving function, verifying Need to unlock.
  • the obtaining the unlocking parameter in the foregoing embodiment includes:
  • the data of the high frequency audio band is selected from the digital voice signal as an unlocking parameter.
  • the unlocking device 41 includes: a verification module 411 and a communication module 412.
  • the verification module 411 is configured to verify whether the current user is a legitimate user when the device to be unlocked is required to be unlocked; and the communication module 412 is set to be the current user.
  • the audio password signal is obtained, and the audio password signal carries an unlocking parameter for unlocking the device to be unlocked, and the audio password signal is sent to the device to be unlocked through the high frequency audio band.
  • the device to be unlocked (42) includes: the receiving module (421) is configured to receive an audio password signal through the high frequency audio band, and the audio password signal carries an unlocking parameter for unlocking the device to be unlocked, and the audio password signal is the unlocking device.
  • the unlocking module (422) is configured to parse the audio password signal, obtain an unlocking parameter carried by the audio password signal, verify the unlocking parameter, and unlock when the verification passes.
  • Vocal code is an innovation of information transmission mode that is limited by physical space except WIFI, Bluetooth, and two-dimensional code. It is based on the 18-20 kHz sound wave watermarking technology that is difficult to detect by human ears. The use of high-frequency sounds that are inaudible to the human ear to connect communication protocols of a variety of devices, to achieve data transmission, equivalent to "audio two-dimensional code", more efficient use of space propagation. 18-20kHz that is hard to detect for the human ear The sound wave of the frequency band has strong security, so it can be used on a device requiring strong security, and the embodiment of the present invention provides a method and device for unlocking the vocoding combined with the vocoding technology.
  • the device unlocking system includes an unlocking device 31 and a device to be unlocked 32, and the unlocking device 31, such as a high-frequency sound wave signal that is difficult to be perceived by the human ear, if the mobile terminal passes the user identity authentication.
  • the password information is transmitted. After the lock receives the information, the password is matched. If the match is successful, the lock is performed.
  • the cipher information transmitted by the high frequency sound wave signal may be directly converted from a static password, or may be converted into a high frequency sound wave signal by a user's voice control command.
  • the unlocking device 31 such as a high-frequency sound wave signal that is difficult to be perceived by the human ear
  • the unlocking device 31 includes:
  • the password editing module 311 encode and modulate the static password or the vocal voice analog signal that has been set to form a digital sound signal
  • the storage module 312 stores the edited sound password signal into the module
  • the password output module 313 first converts the digital sound signal into a sound analog signal through a digital-to-analog converter, and the frequency of the sound analog signal selects a human ear to be difficult to detect a high-frequency band, such as a frequency band above 18 kHz and below 20 kHz. That is, the sound analog signal has an energy distribution only in this frequency range.
  • the device to be unlocked 32 includes:
  • the lock vocoding receiving module 321 is configured to receive an audio signal and perform analog/digital conversion on the received audio signal.
  • the lock vocoding processing module 322 extracts an audio signal from the analog/digital converted audio signal according to a preselected frequency range. And demodulating, verifying, and decoding the audio signal to obtain password information.
  • the lock unlocking module 323 unlocks when the passwords match.
  • the unlocking method provided in this embodiment includes the following steps in the embodiment of the unlocking device 31:
  • the vocoder key device transmits a static password or a vocal voice analog signal to a coded modulation shape A digital sound signal is stored and stored.
  • the vocoder key device performs identity authentication before transmitting the vocoding code.
  • identity authentication Such as fingerprint recognition, face recognition, voiceprint recognition, iris recognition, etc. for identity verification.
  • step S403 Determine whether the authentication is passed? If yes, step S404 is performed; if not, step S405 is performed;
  • the vocoder key device can send the vocoding.
  • the stored digital sound signal is converted into a high-frequency sound signal of 18-20 kHz which is difficult to detect by human beings, and the volume is adjusted to control the effective distance of sound wave transmission, thereby further improving safety.
  • the audio signal is sent out and the process ends.
  • S405 Accumulate the number n of consecutive failures of identity authentication
  • step S406 Determine whether the number n of consecutive failures is greater than a threshold N? If it is not greater, the process returns to step S402 to allow the user to verify again. If it is greater, step S407 is performed;
  • the embodiment of the unlocking method provided in this embodiment includes the following steps:
  • the vocal code lock device such as a car or an access control device, turns on the vocoding receiving module when an infrared or thermal magnetic device detects that someone is approaching.
  • the vocoding receiving module acquires an audio signal in real time.
  • S503 Convert the received analog signal into a digital audio signal, and parse the voice code in the specified frequency band to obtain a voice password.
  • step S504 Compare the parsed voice password with the unlock password, and determine whether it is consistent with the unlock password. If yes, step S505 is performed; if not, step S506 is performed;
  • the user can convert the static password or the vocal voice password into a high-frequency sound signal that is not perceived by the adult ear, can be unlocked “silently and without interest”, and requires the user to perform identity verification before sending the password, further Provides unlocked security.
  • the high-frequency audio signal can be transmitted and received through the current mobile phone terminal, and the popularity is also very convenient.
  • An embodiment of the present invention provides a device unlocking method, which sends a decryption information by using a high frequency audio band to transmit an audio cipher signal. Since the voice signal is sent through a voice signal, it is invisible to the user, because the high frequency audio band is used.
  • the method needs to authenticate the user before sending the audio password signal, only the current user is When the legitimate user sends an audio password signal, even if the unlocked device is lost/stolen, the user identity authentication cannot be verified, and the audio password signal is not illegally used, which further enhances the device security and enhances the user's use.
  • the legitimate user sends an audio password signal, even if the unlocked device is lost/stolen, the user identity authentication cannot be verified, and the audio password signal is not illegally used, which further enhances the device security and enhances the user's use.
  • the embodiment of the invention further provides a computer readable storage medium storing computer executable instructions, which are implemented by the processor to implement the method described in the foregoing embodiments.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • the above technical solution can effectively prevent the illegal user from stealing the decrypted information. Even if the unlocked device is lost/stolen, the decrypted information is not illegally used, which further enhances the security of the device and enhances the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Lock And Its Accessories (AREA)

Abstract

一种设备解锁方法、系统、解锁设备及待解锁设备,该方法包括:解锁设备在对待解锁设备解锁时,验证当前用户是否为合法用户,若当前用户为合法用户,获取音频密码信号,通过高频音频波段发送音频密码信号至待解锁设备;待解锁设备通过高频音频波段接收音频密码信号,解析音频密码信号,获取音频密码信号携带的解锁参数,验证解锁参数,在验证通过时解锁。

Description

一种设备解锁方法、系统、解锁设备及待解锁设备 技术领域
本文涉及但不限于设备解锁领域,尤其涉及一种设备解锁方法、系统、解锁设备及待解锁设备。
背景技术
常规的解锁方法,如用户手动输入密码、指纹等,密码及指纹对他人可见,存在被他人盗取密码/指纹造成损失的风险,因此需要提供一种解密信息,如密码及指纹对他人不可见的解锁方法,是本领域技术人员亟待解决的技术问题。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提供了一种设备解锁方法、系统、解锁设备及待解锁设备,能够有效避免解密信息被非法盗取。
一方面,提供了一种设备解锁方法,包括:
在需要对待解锁设备解锁时,验证当前用户是否为合法用户;
若当前用户为合法用户,获取音频密码信号,音频密码信号携带用于对待解锁设备进行解锁的解锁参数;
通过高频音频波段发送音频密码信号至待解锁设备,以解锁待解锁设备。
一方面,提供了一种设备解锁方法,包括:
通过高频音频波段接收音频密码信号;音频密码信号携带用于对待解锁设备进行解锁的解锁参数,音频密码信号为解锁设备在对其当前用户验证为 合法用户后发送的;
解析音频密码信号,获取音频密码信号携带的解锁参数;
验证解锁参数,在验证通过时解锁。
一方面,提供了一种设备解锁方法,包括:
解锁设备在需要对待解锁设备解锁时,验证当前用户是否为合法用户,若当前用户为合法用户,获取音频密码信号,音频密码信号携带用于对待解锁设备进行解锁的解锁参数,通过高频音频波段发送音频密码信号至待解锁设备;
待解锁设备通过高频音频波段接收音频密码信号,解析音频密码信号,获取音频密码信号携带的解锁参数,验证解锁参数,在验证通过时解锁。
一方面,提供了一种解锁设备,包括:验证模块及通信模块,其中,验证模块设置为在需要对待解锁设备解锁时,验证当前用户是否为合法用户;通信模块设置为若当前用户为合法用户,获取音频密码信号,音频密码信号携带用于对待解锁设备进行解锁的解锁参数,通过高频音频波段发送音频密码信号至待解锁设备。
一方面,提供了一种待解锁设备,包括:接收模块及解锁模块,其中,接收模块设置为通过高频音频波段接收音频密码信号,音频密码信号携带用于对待解锁设备进行解锁的解锁参数,音频密码信号为解锁设备在对其当前用户验证为合法用户后发送的;解锁模块设置为解析音频密码信号,获取音频密码信号携带的解锁参数,验证解锁参数,在验证通过时解锁。
一方面,提供了一种设备解锁系统,包括:本发明实施例提供的解锁设备,及待解锁设备。
另一方面,提供了一种计算机存储介质,计算机存储介质中存储有计算机可执行指令,计算机可执行指令用于执行前述任意的设备解锁方法。
本发明实施例的有益效果:
本发明实施例提供了一种设备解锁方法,该方法通过使用高频音频波段发送音频密码信号的方式,发送解密信息,由于是通过语音信号发送,对用户不可见,由于是采用高频音频波段而非低频波段发送语音信号,对用户人 耳也不可听闻,这样就避免了非法用户盗取解密信息;同时,该方法在发送音频密码信号之前,对用户身份认证,仅在当前用户为合法用户时发送音频密码信号,这样即便解锁设备丢失/被盗取,由于用户身份认证无法通过验证,也不会导致音频密码信号被非法使用,进一步的增强了设备安全性,增强了用户的使用体验。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明第一实施例提供的设备解锁方法的流程图;
图2为本发明实施例提供的应用于解锁设备侧的设备解锁方法流程图;
图3为本发明实施例提供的应用于待解锁设备侧的设备解锁方法流程图;
图4为本发明第二实施例提供的设备解锁系统的结构示意图;
图5为本发明第三实施例提供的解锁系统的结构示意图;
图6是本发明第四实施例提供的设备解锁方法的流程图;
图7是本发明第五实施例提供的设备解锁方法的流程图。
本发明的实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例只是本发明中一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
现通过具体实施方式结合附图的方式对本发明做出进一步的诠释说明。
第一实施例:
图1为本发明第一实施例提供的设备解锁方法的流程图,由图1可知,本实施例提供的设备解锁方法包括:
S101:解锁设备在需要对待解锁设备解锁时,验证当前用户是否为合法 用户,若当前用户为合法用户,获取音频密码信号,音频密码信号携带用于对待解锁设备进行解锁的解锁参数,通过高频音频波段发送音频密码信号至待解锁设备;
S102:待解锁设备通过高频音频波段接收音频密码信号,解析音频密码信号,获取音频密码信号携带的解锁参数,验证解锁参数,在验证通过时解锁。
本实施例通过使用高频音频波段发送音频密码信号的方式,发送解密信息,由于是通过语音信号发送,对用户不可见,由于是采用高频音频波段而非低频波段发送语音信号,对用户人耳也不可听闻,这样就避免了非法用户盗取解密信息的可能;同时,该方法在发送音频密码信号之前,对用户身份认证,仅在当前用户为合法用户时发送音频密码信号,这样即便解锁设备丢失/被盗取,由于用户身份认证无法通过验证,也不会导致音频密码信号被非法使用,进一步的增强了设备安全性,增强了用户的使用体验。
现针对上述实施例提供的设备解锁方法在解锁设备侧的体现进行保护,本实施例所涉及的解锁设备包括用户手机、平板电脑、智能钥匙等。
在一些实施例中,上述实施例中的设备解锁方法在解锁设备侧的体现,如图2所示,包括:
S201在需要对待解锁设备解锁时,验证当前用户是否为合法用户;
S202若当前用户为合法用户,获取音频密码信号,音频密码信号携带用于对待解锁设备进行解锁的解锁参数;
S203通过高频音频波段发送音频密码信号至待解锁设备,以解锁待解锁设备。
在一些实施例中,上述实施例中的获取音频密码信号包括:
在当前用户为合法用户时,调用预先存储的第一音频信号,作为音频密码信号,第一音频信号为根据用户预先输入的第一解锁参数生成的;
或者,
在当前用户为合法用户时,接收当前用户输入的第二解锁参数,根据第二解锁参数生成第二音频信号,作为音频密码信号。
本实施例提供了两种获取音频密码信号的方式:调用预先存储的音频信号,或者实时生成音频信号;这两种是并列方式,解锁设备可以根据需要进行选择,例如解锁设备使用预先存储的第一音频信号进行解锁失败预定次数后,可以自动切换模式,要求当前用户输入第二解锁参数,实时生成第二音频信号进行解锁,在实际应用中,第一解锁参数与第二解锁参数是可以相同的,也可以不同。
在一些实施例中,上述实施例中的解锁参数包括:静态密码和人声语音中的一种或两种。静态密码可以包括用户设置的数字密码,如1234,还可以是用户指纹等参数,而人声语音则可以是用户说的一段话。
在一些实施例中,上述实施例中的根据第二解锁参数生成第二音频信号包括:获取数字格式的第二解锁参数,使用设备标识对数字格式的第二解锁参数进行加密处理,得到加密数字参数,对加密数字参数进行编码调制,生成第二音频信号;或者,获取数字格式的第二解锁参数,对数字格式的第二解锁参数进行编码调制,生成第二音频信号。
在一些实施例中,上述实施例中的设备解锁方法在调用预先存储的第一音频信号之前,还包括:获取数字格式的第一解锁参数,使用设备标识对数字格式的第一解锁参数进行加密处理,得到加密数字参数,对加密数字参数进行编码调制,生成第一音频信号;或者,获取数字格式的第一解锁参数,对数字格式的第一解锁参数进行编码调制,生成第一音频信号。
在一些实施例中,上述实施例中的验证当前用户是否为合法用户包括:
获取当前用户的体征信息,体征信息包括人脸信息、声纹信息及虹膜信息中的至少一种;
根据预存的合法用户的体征信息对当前用户的体征信息进行匹配;
若匹配通过,则当前用户为合法用户;
若匹配不通过,则当前用户为非法用户。
在一些实施例中,上述实施例中的设备解锁方法还包括:累计当前用户验证失败的次数,当累计次数大于阈值(如用户设置、或者设备默认的3次)时,关闭用户验证功能,在预设时间段后,重新开启用户验证功能,验证当 前用户是否为合法用户。
在一些实施例中,上述实施例中的设备解锁方法在发送音频密码信号之前,还包括:
获取与待解锁设备的距离参数;
根据距离参数确定发送音频密码信号时的信号强度;
通过高频音频波段,采用对应信号强度的信号发送音频密码信号。
本实施例引入信号强度,这里是信号强度用于限制音频密码信号的传输距离,信号强度大,传输距离就远,通过信号强度来避免音频密码信号传输过远。
现针对上述实施例提供的设备解锁方法在待解锁设备侧的体现进行保护,本实施例所涉及的待解锁设备包括车门锁、门禁设备,或者用户手机、平板电脑等设备。
在一些实施例中,上述实施例中的设备解锁方法在待解锁设备侧的体现,如图3所示,包括:
S301通过高频音频波段接收音频密码信号;音频密码信号携带用于对待解锁设备进行解锁的解锁参数,音频密码信号为解锁设备在对其当前用户验证为合法用户后发送的;
S302解析音频密码信号,获取音频密码信号携带的解锁参数;
S303验证解锁参数,在验证通过时解锁。
在一些实施例中,上述实施例中的设备解锁方法还包括:在检测到人体靠近时,获取靠近人体的生物特征,计算靠近人体的生物特征与预先存储的合法用户的生物特征的匹配度,当匹配度大于激活阈值时,开启语音接收功能,接收音频密码信号,在检测到人体远离时,关闭语音接收功能。
本实施例涉及的生物特征与用户的人脸信息、声纹信息及虹膜信息等体征信息是不同的,体征信息可以用来唯一的确定用户,不会被冒充,而生物特征则可以对用户进行筛选,可选的,生物特征可以是身高、胖瘦、体温、是否戴眼镜等,可以实现对靠近人体进行初步筛选即可。举一个简单的例子,待解锁设备可以使用雷达检测到有物体靠近,激活筛选功能,获取靠近物体 的体温,根据人体常见的体温标准(36.5-37.9°)对靠近物体是否为人体进行筛选,当靠近物体为人体时,获取身高,判断是否与预先存储的合法用户的身高(175cm)进行匹配,若满足匹配要求(考虑到用户穿鞋子、没有穿鞋子等误差,匹配要求可以为170cm-180cm),则认为靠近人体很大程度可能是合法用户,此时激活语音解锁功能,开启语音接收功能,接收音频密码信号。
在一些实施例中,上述实施例中的设备解锁方法还包括:在累计验证失败次数达到阈值时,关闭语音接收功能,并清除累计次数,在预设时间段后,重新开启语音接收功能,验证是否需要解锁。
在一些实施例中,上述实施例中的获取解锁参数包括:
将接收到的模拟语音信号解码为数字语音信号;
从数字语音信号中选择高频音频波段的数据,作为解锁参数。
第二实施例:
本实施例提供了一种设备解锁系统,包括解锁设备41及待解锁设备42。如图4所示,其中,解锁设备41包括:验证模块411及通信模块412,验证模块411设置为在需要对待解锁设备解锁时,验证当前用户是否为合法用户;通信模块412设置为若当前用户为合法用户,获取音频密码信号,音频密码信号携带用于对待解锁设备进行解锁的解锁参数,通过高频音频波段发送音频密码信号至待解锁设备。其中,待解锁设备(42)包括:接收模块(421)设置为通过高频音频波段接收音频密码信号,音频密码信号携带用于对待解锁设备进行解锁的解锁参数,音频密码信号为解锁设备在对其当前用户验证为合法用户后发送的;解锁模块(422)设置为解析音频密码信号,获取音频密码信号携带的解锁参数,验证解锁参数,在验证通过时解锁。
现结合具体应用场景对本发明实施例做进一步的诠释说明。
声码,是除WIFI、蓝牙、二维码之外的又一种跨越物理空间限制的信息传播方式的创新,是基于人耳很难察觉到的18-20kHz频段的声波水印技术。运用人耳听不到的高频声音连接多种设备的通信协议,实现数据传输,相当于“音频二维码”,更有效地利用空间传播。对于人耳很难察觉到的18-20kHz 频段的声波具有很强的安全性,所以可以用于要求安全性很强的装置上,而本发明实施例则是给出了结合该声码技术的声码解锁方法和装置。
第三实施例:
如图5所示,本实施例提供的设备解锁系统包括解锁设备31及待解锁设备32,解锁设备31,如移动终端在用户身份认证通过的情况下,通过人耳难以察觉的高频声波信号传输密码信息,锁具接收到该信息后进行密码匹配,匹配成功则进行解锁。用高频声波信号传输的密码信息可以是将静态密码直接转换而成的,也可以是将用户的语音控制指令转换成该高频声波信号的。可选的,
解锁设备31包括:
密码编辑模块311:将已设置好的静态密码或人声语音模拟信号经过编码调制形成数字声音信号;
存储模块312:将编辑好的声音密码信号存储到该模块;
密码输出模块313:首先将数字声音信号经过数模转换器转换成声音模拟信号,该声音模拟信号的频率选择人耳难以察觉高频波段,如位于18kHz以上、20kHz以下的频段。即声音模拟信号仅在该频率范围内有能量分布。
待解锁设备32包括:
锁具声码接收模块321:设置为接收音频信号,并对接收的音频信号进行模/数转换。
锁具声码处理模块322:按照预选的频率范围从模/数转换后的音频信号中提取音频信号。并对该音频信号进行解调、校验、译码,从而获得密码信息。
锁具解锁模块323:当密码匹配时,进行解锁。
第四实施例:
如图6所示,本实施例提供的解锁方法在解锁设备31的体现包括以下步骤:
S401:声码钥匙设备将静态密码或将人声语音模拟信号经过编码调制形 成数字声音信号并存储。
S402:声码钥匙设备在发送声码前要进行身份认证。如指纹识别、人脸识别、声纹识别、虹膜识别等来进行身份验证。
S403:判断身份验证是否通过?如果通过,执行步骤S404;如果没有通过,执行步骤S405;
S404:当身份验证通过后,声码钥匙设备方可发送声码。将存储的数字声音信号转换为人难以察觉的18-20kHz的高频声音信号,并调整音量大小来控制声波传输的有效距离,进一步提高安全性。将该音频信号发送出去,流程结束。
S405:对身份认证连续失败的次数n进行累计;
S406:判断连续失败的次数n是否大于阈值N?如果不大于则返回步骤S402,让用户再次验证。如果大于,执行步骤S407;
S407:如果累计失败的次数n大于阈值N,则将累计的次数清零,关闭身份验证功能,并提示用户等待T时间后再试,流程结束。
第五实施例:
如图7所示,本实施例提供的解锁方法在待解锁设备32的体现包括以下步骤:
S501:声码锁设备如汽车、门禁设备等通过红外或热磁设备检测到有人靠近时,开启声码接收模块。
S502:声码接收模块实时采集音频信号。
S503:将接收到的模拟信号转换为数字音频信号,并对指定频段内的声码进行解析,获得声音密码。
S504:将解析出的声音密码与解锁密码进行比对,判断是否与解锁密码一致?如果一致,执行步骤S505;如果不一致,执行步骤S506;
S505:如果与解锁密码一致,即匹配成功,则解锁,流程结束:
S506:如果与解锁密码不一致,即匹配失败,则不解锁并给出提示。
S507:如果检测到已靠近的人离开了,则关闭声码接收模块,流程结束。
通过本实施例提供的方案,用户可以将静态密码或人声语音密码转换成人耳察觉不到的高频声音信号,可以“无声无息”进行解锁,在发送密码前要求用户进行身份验证,进一步提供了解锁的安全性。而且该高频音频信号通过目前的手机终端便可以发送和接收,普及也非常的方便。
综上可知,通过本发明实施例的实施,至少存在以下有益效果:
本发明实施例提供了一种设备解锁方法,该方法通过使用高频音频波段发送音频密码信号的方式,发送解密信息,由于是通过语音信号发送,对用户不可见,由于是采用高频音频波段而非低频波段发送语音信号,用户人耳也不可听闻,这样就避免了非法用户盗取解密信息的可能;同时,该方法在发送音频密码信号之前,需要对用户身份认证,仅在当前用户为合法用户时发送音频密码信号,这样即便解锁设备丢失/被盗取,由于用户身份认证无法通过验证,也不会导致音频密码信号被非法使用,进一步的增强了设备安全性,增强了用户的使用体验。
本发明实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现上述实施例所述的方法。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上仅是本发明的具体实施方式而已,并非对本发明做任何形式上的限制,凡是依据本发明的技术实质对以上实施方式所做的任意简单修改、等同变化、结合或修饰,均仍属于本发明技术方案的保护范围。
工业实用性
上述技术方案可以有效避免非法用户盗取解密信息,即便解锁设备丢失/被盗取,也不会导致解密信息被非法使用,进一步的增强了设备安全性,增强了用户的使用体验。

Claims (15)

  1. 一种设备解锁方法,包括:
    在需要对待解锁设备解锁时,验证当前用户是否为合法用户(S201);
    若当前用户为合法用户,获取音频密码信号,所述音频密码信号携带用于对所述待解锁设备进行解锁的解锁参数(S202);
    通过高频音频波段发送所述音频密码信号至所述待解锁设备,以解锁所述待解锁设备(S203)。
  2. 如权利要求1所述的设备解锁方法,其中,所述获取音频密码信号包括:
    在当前用户为合法用户时,调用预先存储的第一音频信号,作为所述音频密码信号,所述第一音频信号根据用户预先输入的第一解锁参数生成;
    或者,
    在当前用户为合法用户时,接收当前用户输入的第二解锁参数,根据所述第二解锁参数生成第二音频信号,作为所述音频密码信号。
  3. 如权利要求2所述的设备解锁方法,其中,所述解锁参数包括:静态密码和人声语音中的任意一种或两种。
  4. 如权利要求2所述的设备解锁方法,其中,
    所述根据第二解锁参数生成第二音频信号包括:获取数字格式的第二解锁参数,使用设备标识对所述数字格式的第二解锁参数进行加密处理,得到加密数字参数,对所述加密数字参数进行编码调制,生成第二音频信号;或者,获取数字格式的第二解锁参数,对所述数字格式的第二解锁参数进行编码调制,生成第二音频信号;
    在调用预先存储的第一音频信号之前,还包括:获取数字格式的第一解锁参数,使用设备标识对所述数字格式的第一解锁参数进行加密处理,得到加密数字参数,对所述加密数字参数进行编码调制,生成第一音频信号;或者,获取数字格式的第一解锁参数,对所述数字格式的第一解锁参数进行编码调制,生成第一音频信号。
  5. 如权利要求1所述的设备解锁方法,其中,所述验证当前用户是否为合法用户包括:
    获取当前用户的体征信息,所述体征信息包括人脸信息、声纹信息及虹膜信息中的至少一种;
    根据预存的合法用户的体征信息对当前用户的体征信息进行匹配;
    若匹配通过,则当前用户为合法用户;
    若匹配不通过,则当前用户为非法用户。
  6. 如权利要求1所述的设备解锁方法,还包括:
    累计当前用户验证失败的次数,当累计次数大于阈值时,关闭用户验证功能,在预设时间段后,重新开启用户验证功能,验证当前用户是否为合法用户。
  7. 如权利要求1至6任一项所述的设备解锁方法,还包括:
    在发送所述音频密码信号之前,获取与所述待解锁设备的距离参数;
    根据所述距离参数确定发送所述音频密码信号时的信号强度;
    通过所述高频音频波段,采用对应所述信号强度的信号发送所述音频密码信号。
  8. 一种设备解锁方法,包括:
    通过高频音频波段接收音频密码信号,所述音频密码信号携带用于对待解锁设备进行解锁的解锁参数,所述音频密码信号为解锁设备在对其当前用户验证为合法用户后发送的(S301);
    解析所述音频密码信号,获取所述音频密码信号携带的解锁参数(S302);
    验证所述解锁参数,在验证通过时解锁(S303)。
  9. 如权利要求8所述的设备解锁方法,还包括:
    在检测到人体靠近时,获取靠近人体的生物特征,计算所述靠近人体的生物特征与预先存储的合法用户的生物特征的匹配度,当所述匹配度大于激活阈值时,开启语音接收功能,接收所述音频密码信号,在检测到人体远离 时,关闭语音接收功能。
  10. 如权利要求8所述的设备解锁方法,还包括:
    在累计验证失败次数达到阈值时,关闭语音接收功能,并清除累计次数。
  11. 如权利要求8至10任一项所述的设备解锁方法,其中,获取解锁参数包括:
    将接收到的模拟语音信号解码为数字语音信号;
    从所述数字语音信号选择高频音频波段的数据,作为所述解锁参数。
  12. 一种设备解锁方法,包括:
    解锁设备在需要对待解锁设备解锁时,验证当前用户是否为合法用户,若当前用户为合法用户,获取音频密码信号,所述音频密码信号携带用于对所述待解锁设备进行解锁的解锁参数,通过高频音频波段发送所述音频密码信号至所述待解锁设备(S101);
    待解锁设备通过高频音频波段接收音频密码信号,解析所述音频密码信号,获取所述音频密码信号携带的解锁参数,验证所述解锁参数,在验证通过时解锁(S102)。
  13. 一种解锁设备(41),包括:验证模块(411)及通信模块(412),其中,
    所述验证模块(411)设置为在需要对待解锁设备解锁时,验证当前用户是否为合法用户;
    所述通信模块(412)设置为若当前用户为合法用户,获取音频密码信号,所述音频密码信号携带用于对所述待解锁设备进行解锁的解锁参数,通过高频音频波段发送所述音频密码信号至所述待解锁设备。
  14. 一种待解锁设备(42),包括:接收模块(421)及解锁模块(422),其中,
    所述接收模块(421)设置为通过高频音频波段接收音频密码信号,所述音频密码信号携带用于对所述待解锁设备进行解锁的解锁参数,所述音频密码信号为解锁设备在对其当前用户验证为合法用户后发送的;
    所述解锁模块(422)设置为解析所述音频密码信号,获取所述音频密码信号携带的解锁参数,验证所述解锁参数,在验证通过时解锁。
  15. 一种设备解锁系统,包括:如权利要求13所述的解锁设备,及如权利要求14所述的待解锁设备。
PCT/CN2017/089010 2016-08-11 2017-06-19 一种设备解锁方法、系统、解锁设备及待解锁设备 WO2018028308A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610658449.6 2016-08-11
CN201610658449.6A CN107729730A (zh) 2016-08-11 2016-08-11 一种设备解锁方法、系统、解锁设备及待解锁设备

Publications (1)

Publication Number Publication Date
WO2018028308A1 true WO2018028308A1 (zh) 2018-02-15

Family

ID=61162612

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/089010 WO2018028308A1 (zh) 2016-08-11 2017-06-19 一种设备解锁方法、系统、解锁设备及待解锁设备

Country Status (2)

Country Link
CN (1) CN107729730A (zh)
WO (1) WO2018028308A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109151814A (zh) * 2018-08-27 2019-01-04 惠州Tcl移动通信有限公司 移动终端连接wifi密码传输方法、移动终端及存储介质
CN108989349B (zh) * 2018-08-31 2022-11-29 平安科技(深圳)有限公司 用户账号解锁方法、装置、计算机设备及存储介质
CN110992962B (zh) * 2019-12-04 2021-01-22 珠海格力电器股份有限公司 语音设备的唤醒调整方法、装置、语音设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104103110A (zh) * 2014-07-11 2014-10-15 孙景鑫 一种声控锁及其开锁方法
CN104331651A (zh) * 2014-10-08 2015-02-04 无锡指网生物识别科技有限公司 基于指纹和语音识别的控制系统及设备
CN104867215A (zh) * 2015-05-29 2015-08-26 上海斐讯数据通信技术有限公司 一种移动终端开锁方法、移动终端及智能锁
CN105138882A (zh) * 2015-07-30 2015-12-09 广东欧珀移动通信有限公司 一种终端解锁方法和装置
CN105513184A (zh) * 2015-12-10 2016-04-20 淮阴工学院 一种可联网音频智能锁及手机终端授权开锁方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205080624U (zh) * 2015-09-14 2016-03-09 山东山大鸥玛软件有限公司 一种声纹蓝牙锁

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104103110A (zh) * 2014-07-11 2014-10-15 孙景鑫 一种声控锁及其开锁方法
CN104331651A (zh) * 2014-10-08 2015-02-04 无锡指网生物识别科技有限公司 基于指纹和语音识别的控制系统及设备
CN104867215A (zh) * 2015-05-29 2015-08-26 上海斐讯数据通信技术有限公司 一种移动终端开锁方法、移动终端及智能锁
CN105138882A (zh) * 2015-07-30 2015-12-09 广东欧珀移动通信有限公司 一种终端解锁方法和装置
CN105513184A (zh) * 2015-12-10 2016-04-20 淮阴工学院 一种可联网音频智能锁及手机终端授权开锁方法

Also Published As

Publication number Publication date
CN107729730A (zh) 2018-02-23

Similar Documents

Publication Publication Date Title
KR101602426B1 (ko) 이동 단말을 이용한 카드 결제 장치 및 방법
US11427158B2 (en) Method and device for smart control of vehicle while defending against RSA by using mobile device
JP4565840B2 (ja) 音響2因子認証システム及び方法
KR101556654B1 (ko) 영상 통화 수행 방법 및 장치
US20070206838A1 (en) Time synchronous biometric authentication
US10957328B2 (en) Audio data transfer
CN106100845B (zh) 一种利用声波通信的身份认证方法及其系统
KR101520722B1 (ko) 사용자 인증 방법, 서버 및 사용자 단말
CN105141615A (zh) 一种远程开户方法和系统及其身份验证方法和系统
JP2005518721A5 (zh)
WO2018028308A1 (zh) 一种设备解锁方法、系统、解锁设备及待解锁设备
CN104303481A (zh) 用于远程便携无线设备认证的方法和装置
CN114072796A (zh) 具有远程验证的硬件认证令牌
JP2018506663A (ja) 自動車両の少なくとも1つの機能へのアクセスを制御する方法
KR102596874B1 (ko) 생체 정보를 이용한 서비스 수행을 위한 시스템 및 그의 제어 방법
CN106850671A (zh) 一种利用声波通信的身份认证方法及其系统
CN109671192A (zh) 一种利用耳机解锁智能门锁的方法及耳机
CN110298947B (zh) 一种开锁方法及电子锁
WO2001020463B1 (en) Security arrangement
KR101482321B1 (ko) 생체 인식을 이용한 인증서 비밀번호 대체 방법
CN107978049A (zh) 控制智能锁的方法及装置、车辆
KR101648932B1 (ko) 도어락 잠금해제 방법 및 도어락 장치
KR101934461B1 (ko) 신뢰된 실행 환경 기반의 차량 제어를 위한 사용자 단말기 및 그의 차량 제어 방법
WO2015070800A1 (zh) 指令信息的发送和接收方法及其装置
JP6923878B2 (ja) 認証装置、認証システム、認証方法およびプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17838439

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17838439

Country of ref document: EP

Kind code of ref document: A1