CN108154588B - Unlocking method and system, readable storage medium and intelligent device - Google Patents

Unlocking method and system, readable storage medium and intelligent device Download PDF

Info

Publication number
CN108154588B
CN108154588B CN201711486572.5A CN201711486572A CN108154588B CN 108154588 B CN108154588 B CN 108154588B CN 201711486572 A CN201711486572 A CN 201711486572A CN 108154588 B CN108154588 B CN 108154588B
Authority
CN
China
Prior art keywords
voice
unlocking
time length
preset
segment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711486572.5A
Other languages
Chinese (zh)
Other versions
CN108154588A (en
Inventor
邓颇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Atte Smart Life Co ltd
Original Assignee
Shenzhen Atte Smart Life Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Atte Smart Life Co ltd filed Critical Shenzhen Atte Smart Life Co ltd
Priority to CN201711486572.5A priority Critical patent/CN108154588B/en
Publication of CN108154588A publication Critical patent/CN108154588A/en
Application granted granted Critical
Publication of CN108154588B publication Critical patent/CN108154588B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to an unlocking method, an unlocking system, a readable storage medium and intelligent equipment, wherein the unlocking method comprises the following steps: acquiring an unlocking instruction input by a user, wherein the unlocking instruction comprises a plurality of voice fragments which are sequentially arranged; sequentially judging whether the voice time length corresponding to each voice segment and the interval time length between any two adjacent voice segments respectively accord with the corresponding preset voice time length and the preset interval time length; if yes, generating an unlocking success signal is confirmed. The unlocking method has higher safety performance in practical application, and meets the requirement of practical application.

Description

Unlocking method and system, readable storage medium and intelligent device
Technical Field
The invention relates to the technical field of unlocking, in particular to an unlocking method, an unlocking system, a readable storage medium and intelligent equipment.
Background
As is well known, a door lock refers to a kind of security device for locking a door to prevent others from opening the door. The multifunctional chair is extremely common in daily life and provides great convenience for the daily life of people.
Generally, most of conventional door locks are mechanical door locks. According to the different locking techniques, the following categories can be roughly classified: (1) the handle of the door lock is spherical, the manufacturing process is relatively simple, and the manufacturing cost is low. The safety is poor, so that the door lock is generally used for indoor door locks; (2) the handle of the three-rod type handle lock is a door handle, the manufacturing process is relatively simple, and the manufacturing cost is low. Because of poor safety, the door lock is generally used for indoor door locks; (3) the lock core handle lock can be divided into a split lock and a conjoined lock, has better product safety and is commonly used for an entrance door or a room door; (4) the glass door lock has the advantages of no need of opening holes and good safety performance.
However, the safety performance of the existing door lock still needs to be improved, and certain potential safety hazard exists in practical application.
Disclosure of Invention
Based on this, the invention aims to provide an unlocking method, a system, a readable storage medium machine and an intelligent device which can improve the safety performance so as to meet the actual application requirements.
The invention provides an unlocking method, wherein the method comprises the following steps:
acquiring an unlocking instruction input by a user, wherein the unlocking instruction comprises a plurality of voice fragments which are sequentially arranged;
sequentially judging whether the voice time length corresponding to each voice segment and the interval time length between any two adjacent voice segments respectively accord with the corresponding preset voice time length and the preset interval time length;
if yes, generating an unlocking success signal is confirmed.
According to the unlocking method provided by the invention, after an unlocking instruction input by a user is received, whether the voice time length corresponding to each voice segment in the unlocking instruction and the interval time length between any two adjacent voice segments are equal to a preset time length or not is judged in sequence, and if the voice time length corresponding to each voice segment in the unlocking instruction and the interval time length between any two adjacent voice segments are equal, an unlocking success signal is confirmed to be generated, and unlocking is finished. The unlocking method provided by the invention combines the voice input characteristics of the user, integrates the voice segments and the time length of the interval duration to perform unlocking judgment, greatly improves the safety performance of the door lock, and meets the actual application requirements.
The unlocking method is characterized in that the number of notes contained in the voice segment is one or two. The number of notes of the voice segment is set to be one or two, the setting is suitable for the daily speaking mode of the user, and the actual voice unlocking is facilitated.
The unlocking method comprises the following steps that the number of the interval durations is multiple, and the time lengths corresponding to any two interval durations are equal or unequal. The setting is mainly to adapt to a longer unlocking instruction, so that the overall security of the password is improved.
The unlocking method comprises the following steps of:
analyzing the voice fragment to extract corresponding voiceprint data, and judging whether the voiceprint data accords with the corresponding voiceprint data in a preset unlocking instruction;
and if so, judging that the voice segment is consistent with the preset voice segment. Due to the uniqueness of the voice of each user, the safety of the coded lock can be improved by combining voiceprint data for judgment during unlocking.
The unlocking method, wherein the method for judging the voice segment to be consistent with the preset voice segment further comprises:
carrying out voice recognition on the voice fragments, and analyzing the voice fragments to obtain corresponding semantic text data;
judging whether the semantic text data is matched with the semantic text data corresponding to the preset voice fragment;
and if so, judging that the voice segment is consistent with the preset voice segment. The coded lock is enabled to have 'wisdom' by unlocking and judging the mode of obtaining the semantic text by carrying out voice recognition on the voice fragments, and the safety performance of the coded lock is further improved.
The unlocking method is characterized in that the unlocking instruction further comprises character segments, characters in the character segments are letters or numbers, each character segment corresponds to a character input duration, and the method further comprises the following steps:
sequentially judging whether the voice time length corresponding to each voice segment, the character input time length corresponding to each character segment and the interval time length between any two segments respectively accord with the corresponding preset voice time length, preset character input time length and the preset interval time length;
and if so, confirming to generate the unlocking success signal.
The safety performance of the coded lock is greatly improved by combining the character segments with the voice segments.
The unlocking method, wherein before the step of obtaining the unlocking instruction input by the user, the method further comprises:
after receiving an unlocking request signal, generating unlocking inquiry information according to the unlocking request signal;
when receiving a confirmation message for the unlocking inquiry message, copying the unlocking instruction stored in the first storage area to a second storage area, wherein the data reading speed of the second storage area is greater than that of the first storage area. The setting is mainly used for improving the data processing speed of the coded lock and improving the user experience.
The invention also provides an unlocking system, wherein the unlocking system comprises:
the instruction acquisition module is used for acquiring an unlocking instruction input by a user, wherein the unlocking instruction comprises a plurality of voice fragments which are sequentially arranged;
the unlocking judgment module is used for sequentially judging whether the voice time length corresponding to each voice segment and the interval time length between any two adjacent voice segments respectively accord with the corresponding preset voice time length and the preset interval time length;
and the unlocking execution module is used for confirming and generating an unlocking success signal when the voice time length corresponding to the voice fragment and the interval time length between any two adjacent voice fragments are respectively consistent with the corresponding preset voice time length and the preset interval time length.
The invention also proposes a readable storage medium on which a computer program is stored, wherein the program, when executed by a processor, implements the unlocking method as described above.
The invention also provides an intelligent device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the unlocking method, and the intelligent device is an intelligent lock.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
Fig. 1 is a flowchart of an unlocking method according to a first embodiment of the present invention;
fig. 2 is a flowchart of an unlocking method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an unlocking system according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an unlocking system according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an intelligent lock according to a fifth embodiment of the present invention.
Detailed Description
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Preferred embodiments of the present invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
In view of the problems that the safety performance of the existing door lock is still to be improved and certain potential safety hazards exist in practical application, the invention provides a novel unlocking method. Referring to fig. 1, the unlocking method in the first embodiment of the present invention is applied to an intelligent lock, wherein the method includes the following steps:
s101, an unlocking instruction input by a user is obtained, and the unlocking instruction comprises a plurality of voice segments which are sequentially arranged.
In this embodiment, be equipped with a voice recording device on this intelligence tool to lock, this voice recording device is used for typeeing the unblock instruction of user's input. In this embodiment, the unlocking instruction is a voice unlocking instruction, which includes a plurality of voice segments. It should be noted here that, for each speech segment, each speech segment is composed of musical notes, and the number of musical notes may be one, two or more. In the present embodiment, the number of notes of a speech piece is two. The number of notes of the voice segment is set to be one or two, and the setting is mainly used for catering to the daily speaking mode of the user. For example, for the voice unlock instruction "sesame open door", it includes two voice segments "sesame" and "open door". For the speech segment "sesame", it contains the musical notes "sesame" and "numb", and for the speech segment "door open", it contains the musical notes "open" and "door".
S102, whether the voice time length corresponding to each voice segment and the interval time length between any two adjacent voice segments respectively accord with the corresponding preset voice time length and the preset interval time length is sequentially judged.
As for the voice unlock instruction, as described above, it includes a plurality of voice segments. It should also be noted that there is a gap duration between two adjacent speech segments. For example, for the above-mentioned speech segments "sesame" and "open door", an interval duration exists therebetween, for example, the interval duration is 1 s. In addition, each voice segment also has a voice duration, for example, in this embodiment, the voice duration corresponding to the voice segment "sesame" is 2s, and the voice duration corresponding to the voice segment "open gate" is also 2 s. In addition, for the interval duration, when a plurality of interval durations exist in the voice unlocking instruction, the time corresponding to each interval duration may be equal or unequal, and depending on the voice input characteristics of the voice input person, the setting may widen the actual user group and adapt to people with different voice speeds.
In this step, after receiving an unlocking instruction of a user, sequentially judging whether the voice time length corresponding to each voice segment in the unlocking instruction and each interval time length are equal to a preset voice time length and a preset interval time length respectively. For example, in the present embodiment, in the voice unlock instruction "sesame open door", the voice time length of the voice segment "sesame" and the voice segment "open door" is 2s, and the interval time length is 1 s. Therefore, in this step, it is only necessary to compare whether the corresponding voice time length and the interval time length are equal to the corresponding time length in the pre-recorded unlocking instruction.
And S103, if yes, generating an unlocking success signal.
As described above, for the unlock instruction "sesame open door", the voice time length of the voice segment "sesame" and the voice segment "open door" is 2s, and the interval time length is 1 s. When the corresponding voice time length and the interval time length in the currently input voice unlocking instruction and the pre-recorded voice are equal, the unlocking success can be confirmed, an unlocking success signal is correspondingly generated, and the unlocking is completed.
According to the unlocking method provided by the invention, after an unlocking instruction input by a user is received, whether the voice time length corresponding to each voice segment in the unlocking instruction and the interval time length between any two adjacent voice segments are equal to a preset time length or not is judged in sequence, and if the voice time length corresponding to each voice segment in the unlocking instruction and the interval time length between any two adjacent voice segments are equal, an unlocking success signal is confirmed to be generated, and unlocking is finished. The unlocking method provided by the invention combines the voice input characteristics of the user, integrates the voice segments and the time length of the interval duration to perform unlocking judgment, greatly improves the safety performance of the door lock, and meets the actual application requirements.
Referring to fig. 2, for the unlocking method according to the second embodiment of the present invention, in order to improve the security of the intelligent lock, the lock is encrypted and locked by combining characters and voice.
First, in this embodiment, an "unlock start" button is provided on the intelligent lock, and when a user presses down, the control system on the intelligent lock receives an unlock request signal, and the control system generates an unlock inquiry message according to the unlock request signal. The unlocking inquiry information is displayed on a miniature display screen of the intelligent lock, and comprises two options, namely 'determining to unlock' and 'abandoning to unlock', for the user to select. When the user selects the "determine to start unlocking" option, the control system enters the unlock standby mode at this time.
It should be added here that, before unlocking, the user has set an unlocking password into the control system of the intelligent lock, and the unlocking password includes voice segment information and character segment information, and both are stored in the first storage area. However, since the first storage area is a hard storage medium, the speed of reading data from the first storage area is relatively slow, which may affect the alignment time of the user input signal.
In order to solve the problem, in the embodiment, after the user presses the "confirm start unlocking" key, that is, the control system receives a confirmation message for the unlocking inquiry message, the unlocking character signal and the unlocking voice signal stored in the first storage area are copied to the second storage area at this time. Because the data reading speed of the second storage area is higher than that of the first storage area, normal comparison of unlocking instructions input by a user can be ensured.
In this embodiment, the above-mentioned character segments may be letters or numbers. For example, it may be "1", "A", "5", or "F", etc.; the voice segment is composed of musical notes, for example, the voice segment can be "hello" or "please open the door". It should be noted that, for the voice segment, in a specific unlocking process, an object to be subjected to unlocking comparison may be the input voice itself (and also include biological features such as a voiceprint of the voice), or may be semantic text information corresponding to the voice segment after being analyzed, for example, the semantic text corresponding to the voice segment after being analyzed is "hello" or "please open the door". It can be understood that the safety of the coded lock can be greatly improved through the mode of voiceprint and semantic text recognition, and therefore the requirement of practical application is met.
When a user unlocks the intelligent lockset, an unlocking instruction containing a character segment and a voice segment is correspondingly input. As described above, free combination is possible between the character segment and the voice segment. For example, the unlocking instruction input by the user is: the intelligent lock comprises a lock body, a lock handle, a lock key, a control system and an unlocking key, wherein the lock body comprises a lock body, the lock body comprises a lock handle, the lock handle is connected with the lock body, the lock body comprises a.
Further, after the user inputs an unlocking instruction, the control system in the intelligent lockset judges and compares the unlocking instruction input by the user with a preset unlocking key. Specifically, whether the voice time length corresponding to each voice segment, the character input time length corresponding to each character segment and the interval time length between any two segments respectively accord with the corresponding preset voice time length, preset character input time length and preset interval time length is judged in sequence; if yes, generating an unlocking success signal is confirmed.
For example, the password command entered in advance is "1", "hello", "F", "please open the door", "a". Then the control system of the intelligent lockset compares the unlocking instructions input by the user in sequence, and the signal comparison of the next sequence can be carried out only when the signal comparison of the current sequence is successful. For example, the first bit of the preset password command is "1", and only when the number input by the user is also "1", it is compared whether the voice segment input by the user matches the preset voice segment. It is understood that successful unlocking can only be determined if the entire sequence is successfully aligned. It should also be noted here that the interval duration between two adjacent segments must also be the same as the preset interval duration. Otherwise, if only one character segment or voice segment is different from the preset password in the comparison and judgment process, the unlocking is judged to be unsuccessful, and the unlocking operation is directly quitted.
In addition, in this embodiment, whether a speech segment matches a pre-recorded speech segment is determined, and there are several different ways: (1) one is that only the voiceprint data corresponding to the voice fragment input by the user is compared with the voiceprint data corresponding to the preset unlocking voice signal, and if the voiceprint data and the preset unlocking voice signal are consistent, the voice fragment comparison is confirmed to be successful; (2) the other method is that the voice fragment input by the user is analyzed to obtain corresponding semantic text data, and if the semantic text data is consistent with the semantic text data corresponding to the preset unlocking voice signal, the voice fragment comparison is confirmed to be successful; (3) and the voice fragment comparison is judged to be successful only if the requirement that the voiceprint data and the semantic text data are consistent with the preset unlocking voice signal is met at the same time. In practical application, the setting can be specifically performed according to the requirement of the security level.
Referring to fig. 3, for the unlocking system provided in the third embodiment of the present invention, the unlocking system includes an instruction obtaining module 10, an unlocking determining module 20, and an unlocking executing module 30, which are connected in sequence;
the instruction obtaining module 10 is specifically configured to:
acquiring an unlocking instruction input by a user, wherein the unlocking instruction comprises a plurality of voice fragments which are sequentially arranged;
the unlocking determination module 20 is specifically configured to:
sequentially judging whether the voice time length corresponding to each voice segment and the interval time length between any two adjacent voice segments respectively accord with the corresponding preset voice time length and the preset interval time length;
the unlocking execution module 30 is specifically configured to:
and when the voice time length corresponding to the voice fragment and the interval time length between any two adjacent voice fragments are respectively consistent with the corresponding preset voice time length and the preset interval time length, confirming to generate an unlocking success signal.
Referring to fig. 4, an unlocking system according to a fourth embodiment of the present invention is provided, where the unlocking system includes an instruction obtaining module 10, an unlocking determining module 20, an unlocking executing module 30, and a storage scheduling module 40, which are connected in sequence;
the instruction obtaining module 10 is specifically configured to:
acquiring an unlocking instruction input by a user, wherein the unlocking instruction comprises a plurality of voice fragments which are sequentially arranged;
the unlocking determination module 20 is specifically configured to:
sequentially judging whether the voice time length corresponding to each voice segment and the interval time length between any two adjacent voice segments respectively accord with the corresponding preset voice time length and the preset interval time length;
the unlocking execution module 30 is specifically configured to:
when the voice time length corresponding to the voice segments and the interval time length between any two adjacent voice segments are respectively consistent with the corresponding preset voice time length and the preset interval time length, confirming to generate an unlocking success signal;
the storage scheduling module 40 is specifically configured to:
after receiving an unlocking request signal, generating unlocking inquiry information according to the unlocking request signal;
when receiving a confirmation message for the unlocking inquiry message, copying the unlocking instruction stored in the first storage area to a second storage area, wherein the data reading speed of the second storage area is greater than that of the first storage area.
The unlocking determination module 20 is further specifically configured to:
analyzing the voice fragment to extract corresponding voiceprint data, and judging whether the voiceprint data accords with the corresponding voiceprint data in a preset unlocking instruction;
and if so, judging that the voice segment is consistent with the preset voice segment.
The unlocking determination module 20 is further specifically configured to:
carrying out voice recognition on the voice fragments, and analyzing the voice fragments to obtain corresponding semantic text data;
judging whether the semantic text data is matched with the semantic text data corresponding to the preset voice fragment;
and if so, judging that the voice segment is consistent with the preset voice segment.
The unlocking determination module 20 is further specifically configured to:
sequentially judging whether the voice time length corresponding to each voice segment, the character input time length corresponding to each character segment and the interval time length between any two segments respectively accord with the corresponding preset voice time length, preset character input time length and the preset interval time length;
and if so, confirming to generate the unlocking success signal.
Referring to fig. 5, for the intelligent lock 200 according to the fifth embodiment of the present invention, the intelligent lock 200 includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, wherein the processor implements the unlocking method as described above when executing the program, an electronic display screen 202 is disposed in the middle of the upper portion of the intelligent lock 200, a voice input device 201 is disposed on each of two sides of the electronic display screen 202, and the voice input device 201 is mainly used for inputting an unlocking instruction input by a user. In addition, a key area 203 is further disposed on the intelligent lock 200, wherein the key area 203 includes a letter key area 2031 and a number key area 2032. The letter key area 2031 includes 26 letters, and the number key area 2032 includes ten number keys. The user can carry out multiple independent assortments when carrying out the key and predetermineeing, and this has improved intelligent tool to lock's security performance undoubtedly greatly.
The invention also proposes a readable storage medium on which a computer program is stored, wherein the program, when executed by a processor, implements the unlocking method as described above.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
Those skilled in the art will appreciate that all or part of the steps in the method for implementing the above embodiments may be implemented by a program instructing the relevant hardware. The program may be stored in a computer-readable storage medium. Which when executed comprises the steps of the method described above. The storage medium includes: ROM/RAM, magnetic disk, optical disk, etc.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (9)

1. An unlocking method, characterized in that it comprises the following steps:
acquiring an unlocking instruction input by a user, wherein the unlocking instruction comprises a plurality of voice fragments which are sequentially arranged;
the number of notes contained in the voice segment is one or two;
sequentially judging whether the voice time length corresponding to each voice segment and the interval time length between any two adjacent voice segments respectively accord with the corresponding preset voice time length and the preset interval time length;
if yes, generating an unlocking success signal is confirmed.
2. The unlocking method according to claim 1, wherein the number of the interval durations is plural, and the time lengths corresponding to any two of the interval durations are equal or unequal.
3. The unlocking method according to claim 1, wherein the method for determining that the voice segment coincides with a preset voice segment comprises the following steps:
analyzing the voice fragment to extract corresponding voiceprint data, and judging whether the voiceprint data accords with the corresponding voiceprint data in a preset unlocking instruction;
and if so, judging that the voice segment is consistent with the preset voice segment.
4. The unlocking method according to claim 3, wherein the method for determining that the voice segment coincides with a preset voice segment further comprises:
carrying out voice recognition on the voice fragments, and analyzing the voice fragments to obtain corresponding semantic text data;
judging whether the semantic text data is matched with the semantic text data corresponding to the preset voice fragment;
and if so, judging that the voice segment is consistent with the preset voice segment.
5. The unlocking method according to claim 3, wherein the unlocking instruction further comprises character segments, characters in the character segments are letters or numbers, each character segment corresponds to a character input duration, and the method further comprises:
sequentially judging whether the voice time length corresponding to each voice segment, the character input time length corresponding to each character segment and the interval time length between any two segments respectively accord with the corresponding preset voice time length, preset character input time length and the preset interval time length;
and if so, confirming to generate the unlocking success signal.
6. The unlocking method according to claim 1, wherein before the step of acquiring the unlocking instruction input by the user, the method further comprises:
after receiving an unlocking request signal, generating unlocking inquiry information according to the unlocking request signal;
when receiving a confirmation message for the unlocking inquiry message, copying the unlocking instruction stored in the first storage area to a second storage area, wherein the data reading speed of the second storage area is greater than that of the first storage area.
7. An unlocking system, characterized in that it comprises:
the instruction acquisition module is used for acquiring an unlocking instruction input by a user, wherein the unlocking instruction comprises a plurality of voice fragments which are sequentially arranged; the number of notes contained in the voice segment is one or two;
the unlocking judgment module is used for sequentially judging whether the voice time length corresponding to each voice segment and the interval time length between any two adjacent voice segments respectively accord with the corresponding preset voice time length and the preset interval time length;
and the unlocking execution module is used for confirming and generating an unlocking success signal when the voice time length corresponding to the voice fragment and the interval time length between any two adjacent voice fragments are respectively consistent with the corresponding preset voice time length and the preset interval time length.
8. A readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the unlocking method according to any one of the claims 1 to 6.
9. An intelligent device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the unlocking method according to any one of claims 1 to 6, and the intelligent device is an intelligent lock.
CN201711486572.5A 2017-12-29 2017-12-29 Unlocking method and system, readable storage medium and intelligent device Active CN108154588B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711486572.5A CN108154588B (en) 2017-12-29 2017-12-29 Unlocking method and system, readable storage medium and intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711486572.5A CN108154588B (en) 2017-12-29 2017-12-29 Unlocking method and system, readable storage medium and intelligent device

Publications (2)

Publication Number Publication Date
CN108154588A CN108154588A (en) 2018-06-12
CN108154588B true CN108154588B (en) 2020-11-27

Family

ID=62460046

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711486572.5A Active CN108154588B (en) 2017-12-29 2017-12-29 Unlocking method and system, readable storage medium and intelligent device

Country Status (1)

Country Link
CN (1) CN108154588B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7243110B2 (en) * 2018-10-02 2023-03-22 ソニーグループ株式会社 Information processing device and information processing method, computer program, and package reception support system
CN109636953A (en) * 2018-10-24 2019-04-16 厦门科路德科技有限公司 A kind of specific instruction bullet cabinet control method and device based on speech recognition
CN109801409B (en) * 2018-12-11 2023-07-14 平安科技(深圳)有限公司 Voice unlocking method and electronic equipment
CN112711780A (en) * 2019-10-25 2021-04-27 中车株洲电力机车研究所有限公司 Memory unlocking method, system, storage medium and computer equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1662956A (en) * 2002-06-19 2005-08-31 皇家飞利浦电子股份有限公司 Mega speaker identification (ID) system and corresponding methods therefor
CN101467204A (en) * 2005-05-27 2009-06-24 普提克斯科技股份有限公司 Method and system for bio-metric voice print authentication
CN102124515A (en) * 2008-06-17 2011-07-13 声感有限公司 Speaker characterization through speech analysis
CN103366745A (en) * 2012-03-29 2013-10-23 三星电子(中国)研发中心 Method for protecting terminal equipment based on speech recognition and terminal equipment
CN103729584A (en) * 2012-10-16 2014-04-16 北京千橡网景科技发展有限公司 Method and device used for unlocking screen
CN105185379A (en) * 2015-06-17 2015-12-23 百度在线网络技术(北京)有限公司 Voiceprint authentication method and voiceprint authentication device
CN106098068A (en) * 2016-06-12 2016-11-09 腾讯科技(深圳)有限公司 A kind of method for recognizing sound-groove and device
CN106548779A (en) * 2015-09-21 2017-03-29 中兴通讯股份有限公司 Child lock starts method and device
US9646607B2 (en) * 2014-03-10 2017-05-09 Dell Products, L.P. Managing wake-on-voice buffer quality based on system boot profiling
CN107221333A (en) * 2016-03-21 2017-09-29 中兴通讯股份有限公司 A kind of identity authentication method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006154484A (en) * 2004-11-30 2006-06-15 Sony Corp Apparatus and method for speech processing, program, and recording medium
CN106205610B (en) * 2016-06-29 2019-11-26 联想(北京)有限公司 A kind of voice information identification method and equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1662956A (en) * 2002-06-19 2005-08-31 皇家飞利浦电子股份有限公司 Mega speaker identification (ID) system and corresponding methods therefor
CN101467204A (en) * 2005-05-27 2009-06-24 普提克斯科技股份有限公司 Method and system for bio-metric voice print authentication
CN102124515A (en) * 2008-06-17 2011-07-13 声感有限公司 Speaker characterization through speech analysis
CN103366745A (en) * 2012-03-29 2013-10-23 三星电子(中国)研发中心 Method for protecting terminal equipment based on speech recognition and terminal equipment
CN103729584A (en) * 2012-10-16 2014-04-16 北京千橡网景科技发展有限公司 Method and device used for unlocking screen
US9646607B2 (en) * 2014-03-10 2017-05-09 Dell Products, L.P. Managing wake-on-voice buffer quality based on system boot profiling
CN105185379A (en) * 2015-06-17 2015-12-23 百度在线网络技术(北京)有限公司 Voiceprint authentication method and voiceprint authentication device
CN106548779A (en) * 2015-09-21 2017-03-29 中兴通讯股份有限公司 Child lock starts method and device
CN107221333A (en) * 2016-03-21 2017-09-29 中兴通讯股份有限公司 A kind of identity authentication method and device
CN106098068A (en) * 2016-06-12 2016-11-09 腾讯科技(深圳)有限公司 A kind of method for recognizing sound-groove and device

Also Published As

Publication number Publication date
CN108154588A (en) 2018-06-12

Similar Documents

Publication Publication Date Title
CN108154588B (en) Unlocking method and system, readable storage medium and intelligent device
US8112278B2 (en) Enhancing the response of biometric access systems
JP4826277B2 (en) User authentication method, system having user authentication function, apparatus having user authentication function, and computer software
WO2017080311A1 (en) Method and device for improving fingerprint template and terminal device
CN104851164B (en) Intelligent lock with biological feature recognition function and control method thereof
WO2007075529A2 (en) Method and apparatus for providing fingerprint authentication and actuation
JP2004227589A (en) User authentication method and device
CN108734838A (en) It is a kind of that there is the smart lock based on video raw body signature verification device
CN104951679A (en) Unlocking method and unlocking device of terminal equipment
CN110399708A (en) A kind of dual-identity authentication method, apparatus and electronic equipment
EP3428820B1 (en) Terminal voice unlocking method and terminal
KR100353422B1 (en) Method of driving control for fingerprint identification door-lock system
JP2009175815A (en) Biometrics authentication system
CN110648673A (en) Voice recognition method and system for intelligent stamping machine
KR100353423B1 (en) Method of driving control for fingerprint identification door-lock system
CN116860706B (en) Experimental data text storage method and system
CN111641751B (en) Screen unlocking method and device of terminal equipment, terminal equipment and storage medium
CN105867771A (en) Mobile terminal and method and device for turning off application programs
CN104134257A (en) Speech-recognition intelligent antitheft lock
KR20070019363A (en) Method of biomass authentication for reducing FAR
KR101847469B1 (en) Apparatus and method for controlling car door using trunk trigger button
CN102211220B (en) Key cutting method based on biometrics identification
CN106407786A (en) Intelligent unlocking method and system
CN101414910A (en) Method and apparatus for improving information input safety
CN111563982A (en) Multi-system dual-mode intelligent lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant