WO2021051667A1 - 一种解锁方法、移动终端以及解锁系统 - Google Patents

一种解锁方法、移动终端以及解锁系统 Download PDF

Info

Publication number
WO2021051667A1
WO2021051667A1 PCT/CN2019/124150 CN2019124150W WO2021051667A1 WO 2021051667 A1 WO2021051667 A1 WO 2021051667A1 CN 2019124150 W CN2019124150 W CN 2019124150W WO 2021051667 A1 WO2021051667 A1 WO 2021051667A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
mobile terminal
information
unlocked
data information
Prior art date
Application number
PCT/CN2019/124150
Other languages
English (en)
French (fr)
Inventor
袁佳鹏
Original Assignee
深圳传音控股股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音控股股份有限公司 filed Critical 深圳传音控股股份有限公司
Publication of WO2021051667A1 publication Critical patent/WO2021051667A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • This application relates to the field of mobile terminals, in particular to an unlocking method, a mobile terminal and an unlocking system.
  • the current method of unlocking the device with a mobile terminal is mainly based on remote communication technology to control the unlocking.
  • the mobile terminal unlocks by transmitting an unlocking signal to the unlocking device chip, mostly through password or fingerprint unlocking, and the mobile terminal and the unlocking device are simply unlocked.
  • the signal is transmitted through the network, even the WiFi mode and the Bluetooth mode are not used, and the unlocking method is simple and single.
  • Unlocking devices are generally used to lock important items, whether it is briefcases, password boxes, or home doors, which are relatively important. Relying only on the current way to unlock does not give users a sense of security and is indeed a security risk.
  • the purpose of this application is to provide an unlocking method, a mobile terminal, and an unlocking system, which adopts distance detection and dual authentication of unlocking data, which greatly improves safety and reliability.
  • this application provides an unlocking method for a mobile terminal, and the unlocking method includes:
  • the distance information and the unlocking data information are sent to the device to be unlocked for unlocking.
  • the unlocking data information includes:
  • Biometric unlocking information including: at least one of face data information, fingerprint data information, iris data information, and voiceprint data information; and/or,
  • the non-biometric unlocking information includes at least one of password data information, graphic data information, and gesture data information.
  • the sending the distance information and the unlocking data information to the device to be unlocked for unlocking further includes:
  • the mobile terminal transmits the distance information and the unlocking data information to the device to be unlocked for unlocking through the narrowband Internet of Things NB-IoT.
  • this application also provides an unlocking method for a mobile terminal, and the method includes:
  • the mobile terminal is controlled to unlock the device to be unlocked.
  • controlling the mobile terminal to unlock the device to be unlocked according to the comparison result includes:
  • the user is reminded, and/or unlockable device information to be unlocked is provided for the user to choose.
  • controlling the mobile terminal to unlock the device to be unlocked according to the comparison result includes:
  • the mobile terminal displays the unlockable device information to be unlocked for the user to select.
  • the preset threshold uniquely corresponds to the device to be unlocked.
  • this application also provides a mobile terminal, including:
  • the distance detection module is used to obtain the distance information between the mobile terminal and the device to be unlocked
  • the unlocking data acquisition module is used to acquire the unlocking data information input by the user;
  • the processing module is configured to send the distance information and the unlocking data information to the device to be unlocked for unlocking.
  • the mobile terminal further includes:
  • the network transmission module is configured to transmit the distance information and the unlocking data information to the device to be unlocked through the narrowband Internet of Things NB-IoT.
  • the processing module includes:
  • a comparison unit configured to compare the distance information with a preset threshold
  • the execution unit is configured to control the mobile terminal to unlock the device to be unlocked according to the comparison result.
  • the processing module further includes:
  • the display unit is used to remind the user according to the comparison result, and/or display unlockable device information to be unlocked for the user to select.
  • this application also provides an unlocking system, including:
  • At least one mobile terminal for obtaining unlocking information
  • the mobile terminal transmits the unlocking information to the device to be unlocked for unlocking through the narrowband Internet of Things NB-IoT.
  • the unlocking information includes:
  • the unlocking data information includes:
  • the biometric unlocking information includes: at least one of face data information, fingerprint data information, iris data information, and voiceprint data information; and/or,
  • the non-biometric unlocking information includes at least one of password data information, graphic data information, and gesture data information.
  • the present application also provides a computer-readable storage medium having a computer program stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the unlocking method are realized.
  • the unlocking method, mobile terminal, and unlocking system provided in this application adopt dual authentication of distance detection and unlocking data, and perform data transmission through the narrowband Internet of Things NB-IoT technology, which greatly improves security and reliability.
  • Fig. 1 is a schematic diagram of an unlocking system provided by the present application.
  • Fig. 2 is a schematic diagram of a mobile terminal in this application.
  • Fig. 3 is a schematic diagram of processing modules in the mobile terminal of the present application.
  • Fig. 4 is a flowchart of a method for unlocking a mobile terminal provided by the present application.
  • Fig. 5 is a flowchart of another method for unlocking a mobile terminal provided by the present application.
  • Fig. 6 is a schematic diagram of an embodiment of the present application.
  • Fig. 7 is a schematic diagram of a second embodiment of the present application.
  • Fig. 8 is a schematic diagram of a third embodiment of the present application.
  • the present application provides an unlocking system, which includes: an unlocking device 1 and at least one mobile terminal 2 connected through a narrowband Internet of Things NB-IoT.
  • the unlocking device 1 and the mobile terminal 2 pass through the narrowband Internet of Things NB-IoT.
  • IoT performs data transmission.
  • the mobile terminal 2 collects the distance information from the unlocking device 1 in real time, and receives the unlocking data information input by the user.
  • the unlocking data information includes biometric unlocking information and non-biometric unlocking information, biometric unlocking information It includes at least one of face data information, fingerprint data information, iris data information, and voiceprint data information.
  • the non-biometric unlocking information includes at least one of password data information, graphic data information, and gesture data information.
  • the mobile terminal 2 transmits the acquired distance information and unlocking data information to the unlocking device 1 through the narrowband Internet of Things NB-IoT.
  • the unlocking device 1 sends the distance information and unlocking data information sent by the mobile terminal 1 to the preset distance threshold and unlocking data information. Perform matching and judgment, and perform unlocking operations on unlocking data that meets the distance threshold and the matching.
  • NB-IoT Cellular-based Narrow Band Internet of Things
  • NB-IoT is built on cellular networks and only consumes about 180KHz frequency bands, and can be directly deployed on GSM networks and UMTS networks Or LTE network to reduce deployment costs and achieve smooth upgrades.
  • NB-IoT is an emerging technology in the IoT field, which supports the cellular data connection of low-power devices in the wide area network. It is also called low-power wide area network (LPWA).
  • LPWA low-power wide area network
  • NB-IoT has four major characteristics: one is wide coverage, which will provide improved indoor coverage. In the same frequency band, NB-IoT has a gain of 20dB over the existing network, and the coverage area is 100 times larger; the second is support Mass connection capability, NB-IoT can support 100,000 connections per sector, supporting low latency sensitivity, ultra-low equipment cost, low equipment power consumption and optimized network architecture; the third is lower power consumption, NB- The standby time of IoT terminal modules can be as long as 10 years; fourth is the lower module cost, and the company expects that a single connected module does not exceed $5.
  • the unlocking device 1 can be set on the door of the room, or on the safe, or on the wardrobe, or other applications where the unlocking device needs to be set.
  • the mobile terminal 2 is a computer device that can be used on the move, including but not limited to a smart phone, a notebook computer, a tablet computer, a smart watch, a smart bracelet, and the like.
  • the mobile terminal 2 further includes:
  • the distance detection module 201 is used to obtain distance information between the mobile terminal 2 and the device 1 to be unlocked;
  • the unlocking data acquisition module 202 is configured to acquire unlocking data information input by the user;
  • the processing module 203 which is connected to the distance detection module 201, the unlock data acquisition module 202, and the network transmission module 204, is configured to send the distance information and the unlock data information to the device to be unlocked 1 through the network transmission module 204;
  • the network transmission module 204 is configured to transmit the distance information and the unlocking data information to the device to be unlocked through the narrowband Internet of Things NB-IoT.
  • the distance detection module 201 may adopt a distance measuring sensor, such as an ultrasonic distance measuring sensor, a laser distance measuring sensor, an infrared distance measuring sensor, and so on.
  • a distance measuring sensor such as an ultrasonic distance measuring sensor, a laser distance measuring sensor, an infrared distance measuring sensor, and so on.
  • Ultrasonic distance sensor principle Ultrasonic has a great ability to penetrate liquids and solids, especially in solids that are opaque to sunlight. It can penetrate to a depth of tens of meters. Ultrasonic waves will cause significant reflections when they encounter impurities or interfaces. As an echo, it can produce a Doppler effect when it encounters a moving object. Therefore, ultrasonic testing is widely used in industry, national defense, biomedicine and other aspects. Ultrasound is used as a detection method. Ultrasonic waves must be generated and received. The device that completes this function is an ultrasonic sensor, which is habitually called an ultrasonic transducer or an ultrasonic probe.
  • the working principle of the laser ranging sensor When the laser sensor is working, the laser diode is aimed at the target and emits laser pulses. After being reflected by the target, the laser is scattered in all directions, and part of the scattered light returns to the sensor receiver, and is imaged into an avalanche after being received by the optical system.
  • the avalanche photodiode On the photodiode, the avalanche photodiode is an optical sensor with an internal amplification function, so it can detect extremely weak light signals, record and process the time from the light pulse sent to the return to be received, and then the target distance can be determined.
  • the infrared distance measuring sensor uses the principle that the infrared signal meets the obstacle distance and the intensity of the reflection is different to detect the distance of the obstacle.
  • the infrared ranging sensor has a pair of infrared signal transmitting and receiving diodes.
  • the transmitting tube emits infrared signals of a specific frequency
  • the receiving tube receives infrared signals of this frequency.
  • the infrared detection direction encounters an obstacle, the infrared signal is reflected back and received After receiving the diode and processing, the target distance can be measured.
  • the processing module 3 includes:
  • the comparison unit 301 is configured to compare the distance information with a preset threshold
  • the execution unit 302 is configured to control the mobile terminal to unlock the device to be unlocked according to the comparison result
  • the display unit 303 is configured to remind the user according to the comparison result, and/or display the unlockable device information to be unlocked for the user to select.
  • This application provides an unlocking method, including the following steps: the mobile terminal sends the acquired unlocking data information and the distance information from the unlocked device to the unlocked device through the narrowband Internet of Things NB-IoT, and the mobile terminal compares the distance information and the distance threshold According to the comparison result, the mobile terminal is controlled to unlock the device to be unlocked.
  • the unlocking method of the mobile terminal includes the following steps:
  • Step S1 The distance detection module in the mobile terminal obtains the distance information between the mobile terminal and the device to be unlocked;
  • Step S2 The unlocking data acquisition module in the mobile terminal acquires the unlocking data information input by the user;
  • Step S3 The mobile terminal sends the distance information, the unlocking data information, and the ID information of the mobile terminal to the device to be unlocked for unlocking through the narrowband Internet of Things NB-IoT.
  • the unlocking method of the mobile terminal further includes the following steps:
  • Step S1 The unlocking data acquisition module in the mobile terminal acquires the unlocking data information input by the user;
  • Step S2 the distance detection module in the mobile terminal obtains the distance information between the mobile terminal and the device to be unlocked;
  • Step S3 the mobile terminal compares the distance information with a preset threshold (the preset threshold uniquely corresponds to the device to be unlocked), when the distance information reaches the preset threshold, proceed to step S4, and when the distance information does not reach the preset threshold, proceed Step S5;
  • a preset threshold uniquely corresponds to the device to be unlocked
  • Step S4 The mobile terminal sends the unlocking data information and the distance information to the device to be unlocked for unlocking;
  • Step S5 The mobile terminal reminds the user, and provides unlockable device information to be unlocked for the user to choose.
  • the unlocking device is set on a password box, and the effective distance of the password box is 0.5m, so the preset threshold is set to 0.5m, and the mobile terminal uses a smart phone.
  • the smartphone is within the preset threshold, the lockbox is unlocked.
  • the unlocking device is set on the door of the house, and the effective distance of the door is 2.5m, so the preset threshold is set to 2.5m, and the mobile terminal adopts a smart watch. When the smart watch is within the preset threshold, the door is unlocked.
  • the unlocking device is set on the wardrobe door of the swimming pool.
  • the effective distance of the wardrobe door is 0.3m. Therefore, the preset threshold is set to 0.3m, and the mobile terminal adopts smart wristband. When the smart bracelet is within the preset threshold, the wardrobe door is unlocked.
  • Narrowband Internet of Things NB-IoT technology can achieve low power consumption and improve the standby durability of the terminal;
  • the real-time unlocking data acquired by the mobile terminal is not saved and deleted as needed, saving the resources of the mobile terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请提供一种解锁方法、移动终端以及解锁系统,获取移动终端与待解锁设备之间的距离信息以及用户输入的解锁数据信息,将距离信息和解锁数据信息发送至待解锁设备进行解锁,或者获取用户输入的解锁数据信息,并获取移动终端与待解锁设备之间的距离信息,并与预设阈值进行比对,根据比对结果,控制移动终端对待解锁设备进行解锁。移动终端通过窄带物联网NB-IoT将解锁信息传输至待解锁设备进行解锁。本申请采用距离检测和人脸识别双重认证,通过窄带物联网NB-IoT技术进行数据传输,并且在解锁设备端进行数据匹配,极大提升了安全性和可靠性。

Description

一种解锁方法、移动终端以及解锁系统
本专利申请要求2019年9月17日提交的中国专利申请号为201910876515.0,申请人为深圳传音控股股份有限公司,发明名称为“一种解锁方法、移动终端以及解锁系统”的优先权,该申请的全文以引用的方式并入本申请中。
技术领域
本申请涉及移动终端领域,具体涉及一种解锁方法、移动终端以及解锁系统。
背景技术
目前用移动终端来解锁设备的方法主要是以远程通信技术来控制解锁,移动终端通过给解锁设备芯片传递解锁信号来解锁,大多通过密码或者指纹解锁方式,且移动终端与解锁设备之间仅仅是通过网络传输信号,连WiFi方式和蓝牙方式都没有使用,解锁方式简单单一。解锁设备一般用来锁存重要物品,无论是公文包,密码箱,还是家中的门,都是相对来说较为重要的,仅仅依靠目前的方式解锁,并不能给用户踏实感,也确实安全风险。
发明概述
技术问题
问题的解决方案
技术解决方案
本申请的目的在于,提供一种解锁方法、移动终端以及解锁系统,采用距离检测和解锁数据双重认证,极大提升了安全性和可靠性。
为解决上述技术问题,本申请提供一种解锁方法,用于移动终端,所述解锁方法包括:
获取移动终端与待解锁设备之间的距离信息;
获取用户输入的解锁数据信息;
将所述距离信息和所述解锁数据信息发送至待解锁设备进行解锁。
作为其中一种实施方式,所述解锁数据信息包括:
生物识别解锁信息,包括:人脸数据信息、指纹数据信息、虹膜数据信息、以 及声纹数据信息中的至少一项;和/或,
非生物识别解锁信息,包括:密码数据信息、图形数据信息、手势数据信息中的至少一项。
作为其中一种实施方式,所述将所述距离信息和所述解锁数据信息发送至待解锁设备进行解锁,还包括:
将所述移动终端的ID信息发送至待解锁设备。
所述移动终端通过窄带物联网NB-IoT将所述距离信息和所述解锁数据信息传输至待解锁设备进行解锁。
为解决上述技术问题,本申请还提供一种解锁方法,用于移动终端,所述方法包括:
获取用户输入的解锁数据信息;
获取移动终端与待解锁设备之间的距离信息,并与预设阈值进行比对;
根据比对结果,控制移动终端对待解锁设备进行解锁。
作为其中一种实施方式,根据比对结果,控制移动终端对待解锁设备进行解锁,包括:
当所述距离信息达到预设阈值时,将所述解锁数据信息和所述距离信息发送至待解锁设备进行解锁;和/或,
当所述距离信息未达到预设阈值时,则提醒用户,和/或提供可解锁的待解锁设备信息以供用户选择。
作为其中一种实施方式,根据比对结果,控制移动终端对待解锁设备进行解锁,包括:
根据比对结果,移动终端显示可解锁的待解锁设备信息,以供用户选择。
所述预设阈值与待解锁设备唯一对应。
为解决上述技术问题,本申请还提供一种移动终端,包括:
距离检测模块,用于获取移动终端与待解锁设备之间的距离信息;
解锁数据获取模块,用于获取用户输入的解锁数据信息;
处理模块,用于将所述距离信息和所述解锁数据信息发送至待解锁设备进行解锁。
作为其中一种实施方式,所述移动终端,还包括:
网络传输模块,用于通过窄带物联网NB-IoT将所述距离信息和所述解锁数据信息传输至所述待解锁设备。
作为其中一种实施方式,所述处理模块,包括:
比对单元,用于将所述距离信息与预设阈值进行比对;
执行单元,用于根据比对结果控制移动终端对待解锁设备进行解锁。
所述处理模块,还包括:
显示单元,用于根据比对结果对用户进行提醒,和/或显示可解锁的待解锁设备信息以供用户选择。
为解决上述技术问题,本申请还提供一种解锁系统,包括:
至少一个移动终端,用于获取解锁信息;
所述移动终端通过窄带物联网NB-IoT将所述解锁信息传输至待解锁设备进行解锁。
所述解锁信息包括:
用户输入的解锁数据信息,和/或移动终端与待解锁设备之间的距离信息。
作为其中一种实施方式,所述解锁数据信息包括:
生物识别解锁信息,包括:人脸数据信息、指纹数据信息、虹膜数据信息、以及声纹数据信息中的至少一项;和/或,
非生物识别解锁信息,包括:密码数据信息、图形数据信息、手势数据信息中的至少一项。
为解决上述技术问题,本申请还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现所述的解锁方法的步骤。
发明的有益效果
有益效果
本申请提供的解锁方法、移动终端以及解锁系统,采用距离检测和解锁数据双重认证,通过窄带物联网NB-IoT技术进行数据传输,极大提升了安全性和可靠性。
对附图的简要说明
附图说明
图1是本申请提供的一种解锁系统的示意图。
图2是本申请中移动终端的示意图。
图3是本申请的移动终端中的处理模块的示意图。
图4是本申请提供的一种移动终端解锁方法的流程图。
图5是本申请提供的另一种移动终端解锁方法的流程图。
图6是本申请一种实施例的示意图。
图7是本申请第二种实施例的示意图。
图8是本申请第三种实施例的示意图。
本申请的实施方式
为更进一步阐述本申请为达成预定申请目的所采取的技术手段及功效,以下结合附图及较佳实施例,对本申请详细说明如下。
通过具体实施方式的说明,当可对本申请为达成预定目的所采取的技术手段及效果得以更加深入且具体的了解,然而所附图式仅是提供参考与说明之用,并非用来对本申请加以限制。
以下根据图1~图8,具体说明本申请的较佳实施例。
如图1所示,本申请提供一种解锁系统,包含:通过窄带物联网NB-IoT连接的解锁设备1和至少一个移动终端2,解锁设备1与移动终端2之间通过窄带物联网NB-IoT进行数据传输,移动终端2实时采集与解锁设备1之间的距离信息,并接收用户输入的解锁数据信息,所述解锁数据信息包括生物识别解锁信息和非生物识别解锁信息,生物识别解锁信息包括:人脸数据信息、指纹数据信息、虹膜数据信息、以及声纹数据信息中的至少一项,非生物识别解锁信息包括:密码数据信息、图形数据信息、手势数据信息中的至少一项。移动终端2将获取的距离信息和解锁数据信息通过窄带物联网NB-IoT传输给解锁设备1,解锁设备1将移动终端1发送的距离信息和解锁数据信息与预设的距离阈值和解锁数据信息进行匹配和判断,对满足距离阈值和匹配的解锁数据,进行开锁操作。
基于蜂窝的窄带物联网(Narrow Band Internet of Things,NB-IoT)成为万 物互联网络的一个重要分支,NB-IoT构建于蜂窝网络,只消耗大约180KHz的频段,可直接部署于GSM网络、UMTS网络或LTE网络,以降低部署成本、实现平滑升级。NB-IoT是IoT领域一个新兴的技术,支持低功耗设备在广域网的蜂窝数据连接,也被叫作低功耗广域网(LPWA)。
窄带物联网NB-IoT具备四大特点:一是广覆盖,将提供改进的室内覆盖,在同样的频段下,NB-IoT比现有的网络增益20dB,覆盖面积扩大100倍;二是具备支撑海量连接的能力,NB-IoT一个扇区能够支持10万个连接,支持低延时敏感度、超低的设备成本、低设备功耗和优化的网络架构;三是更低功耗,NB-IoT终端模块的待机时间可长达10年;四是更低的模块成本,企业预期的单个接连模块不超过5美元。
所述的解锁设备1可以设置在房门上,或者保险箱上,或者衣柜上,或者其他需要设置解锁设备的应用场合。
所述的移动终端2是可以在移动中使用的计算机设备,包含且不限于智能手机、笔记本电脑、平板电脑、智能手表、智能手环等。
如图2所示,所述的移动终端2进一步包含:
距离检测模块201,用于获取移动终端2与待解锁设备1之间的距离信息;
解锁数据获取模块202,用于获取用户输入的解锁数据信息;
处理模块203,其连接距离检测模块201、解锁数据获取模块202和网络传输模块204,用于将所述距离信息和所述解锁数据信息通过网络传输模块204发送给待解锁设备1;
网络传输模块204,其连接处理模块203,用于通过窄带物联网NB-IoT将所述距离信息和所述解锁数据信息传输至所述待解锁设备。
在本实施例中,所述的距离检测模块201可以采用测距传感器,例如超声波测距传感器、激光测距传感器、红外线测距传感器等等。
超声波测距传感器原理:超声波对液体、固体的穿透本领很大,尤其是在阳光不透明的固体中,它可穿透几十米的深度,超声波碰到杂质或分界面会产生显著反射形成反射成回波,碰到活动物体能产生多普勒效应。因此超声波检测广泛应用在工业、国防、生物医学等方面以超声波作为检测手段,必须产生超声 波和接收超声波,完成这种功能的装置就是超声波传感器,习惯上称为超声换能器,或者超声探头。
激光测距传感器工作原理:激光传感器工作时,先由激光二极管对准目标发射激光脉冲,经目标反射后激光向各方向散射,部分散射光返回到传感器接收器,被光学系统接收后成像到雪崩光电二极管上,雪崩光电二极管是一种内部具有放大功能的光学传感器,因此它能检测极其微弱的光信号,记录并处理从光脉冲发出到返回被接收所经历的时间,即可测定目标距离。
红外线测距传感器工作原理:红外测距传感器利用红外信号遇到障碍物距离的不同反射的强度也不同的原理,进行障碍物远近的检测。红外测距传感器具有一对红外信号发射与接收二极管,发射管发射特定频率的红外信号,接收管接收这种频率的红外信号,当红外的检测方向遇到障碍物时,红外信号反射回来被接收二极管接收,经过处理之后,即可测定目标距离。
如图3所示,所述的处理模块3包含:
比对单元301,用于将所述距离信息与预设阈值进行比对;
执行单元302,用于根据比对结果控制移动终端对待解锁设备进行解锁;
显示单元303,用于根据比对结果对用户进行提醒,和/或显示可解锁的待解锁设备信息以供用户选择。本申请提供一种解锁方法,包含以下步骤:移动终端将获取的解锁数据信息以及与解锁设备之间的距离信息通过窄带物联网NB-IoT发送给解锁设备,移动终端比对距离信息和距离阈值,根据比对结果,控制移动终端对待解锁设备进行解锁。
如图4所示,移动终端的解锁方法包含以下步骤:
步骤S1、移动终端中的距离检测模块获取移动终端与待解锁设备之间的距离信息;
步骤S2、移动终端中的解锁数据获取模块获取用户输入的解锁数据信息;
步骤S3、移动终端通过窄带物联网NB-IoT将所述距离信息和所述解锁数据信息,以及移动终端的ID信息发送至待解锁设备进行解锁。
如图5所示,移动终端的解锁方法还包含以下步骤:
步骤S1、移动终端中的解锁数据获取模块获取用户输入的解锁数据信息;
步骤S2、移动终端中的距离检测模块获取移动终端与待解锁设备之间的距离信息;
步骤S3、移动终端对比距离信息和预设阈值(所述预设阈值与待解锁设备唯一对应),当距离信息达到预设阈值时,进行步骤S4,当距离信息未达到预设阈值时,进行步骤S5;
步骤S4、移动终端将所述解锁数据信息和所述距离信息发送至待解锁设备进行解锁;
步骤S5、移动终端提醒用户,并提供可解锁的待解锁设备信息以供用户选择。如图6所示,在本申请的一个实施例中,解锁设备设置在密码箱上,密码箱的有效距离是0.5m,因此将预设阈值设置为0.5m,移动终端采用智能手机。当智能手机处于预设阈值之内,密码箱解锁。
如图7所示,在本申请的另一个实施例中,解锁设备设置在房门上,房门的有效距离是2.5m,因此将预设阈值设置为2.5m,移动终端采用智能手表。当智能手表处于预设阈值之内,房门解锁。
如图8所示,在本申请的第三种实施例中,解锁设备设置在游泳馆的衣柜门上,衣柜门的有效距离为0.3m,因此将预设阈值设置为0.3m,移动终端采用智能手环。当智能手环处于预设阈值之内,衣柜门解锁。
本申请具有以下优点:
1、解锁识别的安全性更高,安全识别比指纹提升8-20倍,应用场景广泛;
2、窄带物联网NB-IoT技术可实现低功耗,提升了终端的待机持久性;
3、增加距离检测,提升了解锁情景下的安全可靠性;
4、移动终端获取的实时解锁数据并不保存,随用随删,节省了移动终端的资源。
以上所述,仅是本申请的较佳实施例而已,并非对本申请作任何形式上的限制,虽然本申请已以较佳实施例揭露如上,然而并非用以限定本申请,任何熟悉本专业的技术人员,在不脱离本申请技术方案范围内,当可利用上述揭示的技术内容作出些许更动或修饰为等同变化的等效实施例,但凡是未脱离本申请技术方案内容,依据本申请的技术实质对以上实施例所作的任何简单修改、等同变化与 修饰,均仍属于本申请技术方案的范围内。

Claims (16)

  1. 一种解锁方法,其中,用于移动终端,所述解锁方法包括:
    获取移动终端与待解锁设备之间的距离信息;
    获取用户输入的解锁数据信息;
    将所述距离信息和所述解锁数据信息发送至待解锁设备进行解锁。
  2. 如权利要求1所述的解锁方法,其中,所述解锁数据信息包括:
    生物识别解锁信息,包括:人脸数据信息、指纹数据信息、虹膜数据信息、以及声纹数据信息中的至少一项;和/或,
    非生物识别解锁信息,包括:密码数据信息、图形数据信息、手势数据信息中的至少一项。
  3. 如权利要求2所述的解锁方法,其中,所述将所述距离信息和所述解锁数据信息发送至待解锁设备进行解锁,还包括:
    将所述移动终端的ID信息发送至待解锁设备。
  4. 如权利要求1至3任一项所述的解锁方法,其中,所述移动终端通过窄带物联网NB-IoT将所述距离信息和所述解锁数据信息传输至待解锁设备进行解锁。
  5. 一种解锁方法,用于移动终端,其中,所述方法包括:
    获取用户输入的解锁数据信息;
    获取移动终端与待解锁设备之间的距离信息,并与预设阈值进行比对;
    根据比对结果,控制移动终端对待解锁设备进行解锁。
  6. 如权利要求5所述的解锁方法,其中,根据比对结果,控制移动终端对待解锁设备进行解锁,包括:
    当所述距离信息达到预设阈值时,将所述解锁数据信息和所述距离信息发送至待解锁设备进行解锁;和/或,
    当所述距离信息未达到预设阈值时,则提醒用户,和/或提供可解锁的待解锁设备信息以供用户选择。
  7. 如权利要求5所述的解锁方法,其中,根据比对结果,控制移动终端对待解锁设备进行解锁,包括:
    根据比对结果,移动终端显示可解锁的待解锁设备信息,以供用户选择。
  8. 如权利要求5至7任一项所述的解锁方法,其中,所述预设阈值与待解锁设备唯一对应。
  9. 一种移动终端,其中,包括:
    距离检测模块,用于获取移动终端与待解锁设备之间的距离信息;
    解锁数据获取模块,用于获取用户输入的解锁数据信息;
    处理模块,用于将所述距离信息和所述解锁数据信息发送至待解锁设备进行解锁。
  10. 如权利要求9所述的移动终端,其中,所述移动终端,还包括:
    网络传输模块,用于通过窄带物联网NB-IoT将所述距离信息和所述解锁数据信息传输至所述待解锁设备。
  11. 如权利要求9所述的移动终端,其中,所述处理模块,包括:
    比对单元,用于将所述距离信息与预设阈值进行比对;
    执行单元,用于根据比对结果控制移动终端对待解锁设备进行解锁。
  12. 如权利要求11所述的移动终端,其中,所述处理模块,还包括:
    显示单元,用于根据比对结果对用户进行提醒,和/或显示可解锁的待解锁设备信息以供用户选择。
  13. 一种解锁系统,其中,包括:
    至少一个移动终端,用于获取解锁信息;
    所述移动终端通过窄带物联网NB-IoT将所述解锁信息传输至待解锁设备进行解锁。
  14. 如权利要求13所述的解锁系统,其中,所述解锁信息包括:
    用户输入的解锁数据信息,和/或移动终端与待解锁设备之间的距 离信息。
  15. 如权利要求14所述的解锁系统,其中,所述解锁数据信息包括:
    生物识别解锁信息,包括:人脸数据信息、指纹数据信息、虹膜数据信息、以及声纹数据信息中的至少一项;和/或,
    非生物识别解锁信息,包括:密码数据信息、图形数据信息、手势数据信息中的至少一项。
  16. 一种计算机可读存储介质,其中,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至8中任一项所述的解锁方法的步骤。
PCT/CN2019/124150 2019-09-17 2019-12-09 一种解锁方法、移动终端以及解锁系统 WO2021051667A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910876515.0A CN110717159A (zh) 2019-09-17 2019-09-17 一种解锁方法、移动终端以及解锁系统
CN201910876515.0 2019-09-17

Publications (1)

Publication Number Publication Date
WO2021051667A1 true WO2021051667A1 (zh) 2021-03-25

Family

ID=69209869

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/124150 WO2021051667A1 (zh) 2019-09-17 2019-12-09 一种解锁方法、移动终端以及解锁系统

Country Status (2)

Country Link
CN (1) CN110717159A (zh)
WO (1) WO2021051667A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007217903A (ja) * 2006-02-15 2007-08-30 Seiko Epson Corp キーと解錠装置と鍵装置とキー用プログラムと解錠装置用プログラム
CN102830932A (zh) * 2012-08-17 2012-12-19 东莞宇龙通信科技有限公司 终端和终端自动切换解锁方式的方法
CN105118125A (zh) * 2015-08-28 2015-12-02 移康智能科技(上海)有限公司 一种电子门锁的智能解锁方法及系统
WO2016145805A1 (zh) * 2015-08-06 2016-09-22 中兴通讯股份有限公司 移动终端解锁方法及移动终端
WO2018232662A1 (zh) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 一种移动终端解锁方法和移动终端

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107644481A (zh) * 2017-09-18 2018-01-30 深圳天珑无线科技有限公司 解锁方法、可穿戴电子设备以及锁模块
CN209368726U (zh) * 2018-12-21 2019-09-10 安徽佑赛科技股份有限公司 一种基于NB-IoT的智能地锁系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007217903A (ja) * 2006-02-15 2007-08-30 Seiko Epson Corp キーと解錠装置と鍵装置とキー用プログラムと解錠装置用プログラム
CN102830932A (zh) * 2012-08-17 2012-12-19 东莞宇龙通信科技有限公司 终端和终端自动切换解锁方式的方法
WO2016145805A1 (zh) * 2015-08-06 2016-09-22 中兴通讯股份有限公司 移动终端解锁方法及移动终端
CN105118125A (zh) * 2015-08-28 2015-12-02 移康智能科技(上海)有限公司 一种电子门锁的智能解锁方法及系统
WO2018232662A1 (zh) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 一种移动终端解锁方法和移动终端

Also Published As

Publication number Publication date
CN110717159A (zh) 2020-01-21

Similar Documents

Publication Publication Date Title
CN111671352B (zh) 一种自动门感应触发区域调整方法
Wang et al. Literature review on wireless sensing-Wi-Fi signal-based recognition of human activities
WO2020042444A1 (zh) 人体存在探测器及其人体存在探测方法
CN102385056B (zh) 一种基于多超声波传感器的导盲避碰装置
Xiao et al. Indoor anti-collision alarm system based on wearable Internet of Things for smart healthcare
TW201915804A (zh) 具有熱感應之可攜式裝置
Zhu et al. TagCare: Using RFIDs to monitor the status of the elderly living alone
CN206516016U (zh) 一种基于多传感器融合技术主动防御智能入侵探测设备
WO2021051667A1 (zh) 一种解锁方法、移动终端以及解锁系统
CN107041840B (zh) 基于数据库表方法的超声成像穴位识别仪及其识别方法
US20220283296A1 (en) Facial recognition using radio frequency sensing
CN109512436A (zh) 一种电磁波手掌生物识别装置及方法
CN110363947B (zh) 基于wifi反射信号判断非法入侵的方法和安防系统
Zhang et al. Acousticthermo: Temperature monitoring using acoustic pulse signal
CN102509372A (zh) 一种基于彩色多普勒超声扫描的防盗系统
CN209625240U (zh) 一种静脉识别身份认证装置及系统
TW201037345A (en) Signal source tracking device and tracking method
CN108828683A (zh) 太赫兹安检系统
Wang et al. Crowd counting based on CSI and convolutional neural network
CN107390209A (zh) 一种应用于智能终端的测距方法及测距系统
CN108415332A (zh) 一种基于激光雷达的家用防盗系统
CN208141396U (zh) 一种人脸识别装置
CN114236476A (zh) 一种基于生成对抗网络算法模型的自动距离跟踪系统的欺骗干扰方法
CN208255968U (zh) 一种基于zigbee的智能门禁监控系统
CN106249227A (zh) 一种测绘用红外线测距仪

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19945632

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23/08/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19945632

Country of ref document: EP

Kind code of ref document: A1