CN107294728B - A intelligent hand lace for password unblock - Google Patents

A intelligent hand lace for password unblock Download PDF

Info

Publication number
CN107294728B
CN107294728B CN201710462829.7A CN201710462829A CN107294728B CN 107294728 B CN107294728 B CN 107294728B CN 201710462829 A CN201710462829 A CN 201710462829A CN 107294728 B CN107294728 B CN 107294728B
Authority
CN
China
Prior art keywords
beads
password
bracelet
bead
passive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710462829.7A
Other languages
Chinese (zh)
Other versions
CN107294728A (en
Inventor
郑皓天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningxia Haina Rendong Technology Co ltd
Original Assignee
Ningxia Haina Rendong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningxia Haina Rendong Technology Co ltd filed Critical Ningxia Haina Rendong Technology Co ltd
Priority to CN201710462829.7A priority Critical patent/CN107294728B/en
Publication of CN107294728A publication Critical patent/CN107294728A/en
Application granted granted Critical
Publication of CN107294728B publication Critical patent/CN107294728B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to an intelligent bracelet for password unlocking, which is formed by connecting a plurality of intelligent beads in series, wherein each bead can be used for carrying out signal starting and sending through a touch switch, and a starting bead combination is used as a first double active encryption password. The relative plane coordinate pattern formed by the relative spacing of the plurality of beads and the specific beads on the arm forms a second repeated code. The bracelet realizes the setting of the action track along with the movement of the hand, and obtains a third password. And during working, performing system matching through the number combination, the plane position and the motion trail to identify the operation instruction set by the user. The invention has concealment and strong security, and improves the personal privacy protection capability.

Description

A intelligent hand lace for password unblock
Technical Field
The invention relates to a password unlocking device, in particular to an intelligent bracelet for password unlocking
Background
In the current information age, how to accurately identify the identity of a person and protect the information security becomes a key social problem which must be solved. Because the traditional identity authentication is very easy to forge and lose, the social requirements are more and more difficult to meet, and the most convenient and safe solution at present is undoubtedly the biometric identification technology. The method is simple and quick, and is safe, reliable and accurate when used for identity identification. Meanwhile, the system is easier to be integrated with a computer and a safety, monitoring and management system, and realizes automatic management. Due to wide application prospect and huge social and economic benefits, the method has attracted wide attention and high importance of various countries. Each individual has a unique physiological characteristic or behavior pattern, i.e., biometric, that can be measured or automatically identified and verified. It can be divided into physiological characteristics (such as fingerprints, facial images, irises, palmprints, etc.) and behavioral characteristics (such as gait, voice, handwriting, etc.). Biometric identification is the identification and identity authentication of each individual based on a unique biometric feature between them. However, as biotechnology advances, more and more biometric passwords are easily recognized. In research experiments, researchers have been able to develop a set of artificially synthesized super "master fingerprints" (MasterPrints) that can unlock 65% of the current smart phone real fingerprint identifications. The active password comprises a simple digital password and an information encryption password, but both are easy to copy and steal, and the security vulnerability is more serious. Therefore, the single biometric features can be leaked from both passive identification and active password setting, and the biometric features combined actively and passively should be possible to be in a more secure password form.
Disclosure of Invention
The invention mainly solves the technical problems that: in order to overcome the defects of the prior art, the invention provides a method and a device for solving the security problem by combining active decryption and biometric identification passive decryption.
The technical scheme adopted by the invention for solving the technical problems is as follows: the invention discloses an intelligent bracelet for password unlocking, which is formed by connecting a plurality of intelligent beads in series, wherein each bead can be used for signal starting and sending through a touch switch, and the combination of the beads is started to serve as a first double-initiative encryption password. The relative plane coordinate pattern formed by the relative spacing of the plurality of beads and the specific beads on the arm forms a second repeated code. The bracelet realizes the setting of the action track along with the movement of the hand, and obtains a third password. And during working, performing system matching through the number, the plane position and the motion trail to identify the operation instruction set by the user.
The intelligent bracelet is provided with a specific bead as a positioning auxiliary element, and is used for determining the wearing position of the wrist and the relative position of other beads, namely an origin (201).
The bead shell on the intelligent bracelet is controlled by a touch switch, and working beads with different quantities and different intervals are set by the touch switch to generate an active cipher group. And due to the individual characteristic difference of the wrist, the elliptical states of the bracelet are different, so that the extraction of biological characteristics is formed, and a first passive cipher group is generated.
The intelligent bracelet can set the motion track password to generate a second passive password group.
In the process of transmitting the password signal, the beads in the working state are released according to signals with different frequencies through signal positioning with the origin (201), so that the signal receiving system can judge the combination and the position of the beads. This also forms the transmission and reception of the active cipher suite and the first passive cipher suite.
And in the process of continuously unlocking, decoding a second passive cipher group by carrying out statistical analysis on the wireless signal track of the origin.
The intelligent bracelet only undertakes the task of sending a password signal, and the controlled system and the identification system are formed by specific equipment outside a human body. The system comprises a wireless signal receiving module, a microprocessor system and an execution system.
The password setting of the intelligent bracelet is completed by a microprocessor of the controlled system, so that the intelligent bracelet has better unicity.
The invention has the beneficial effects that: active encryption and double-layer biological passive characteristic encryption are carried out. The security is enhanced. The existing voice verification, fingerprint verification and password verification are difficult to ensure safety. To further ensure security, it is often necessary to complicate verification, such as increasing the voice length, improving the fingerprint scanning accuracy, increasing the password length, etc., and these settings are not favorable for good customer experience when implemented. The present invention solves this problem. The effective active and passive associated encryption is completed through the combination of the normal digital password and the human motion characteristics.
Drawings
FIG. 1 is a schematic diagram of the decryption logic process of the present invention
FIG. 2 schematic diagram of an intelligent bracelet of the present invention
FIG. 3 is a schematic diagram of the internal composition of the intelligent bracelet single bead of the present invention
FIG. 4 is a schematic diagram of the combination of the intelligent bracelet working beads of the present invention
Detailed Description
The present invention is described in further detail below with reference to the attached drawings. These drawings are simplified schematic views illustrating only the basic structure of the present invention in a schematic manner, and thus show only the constitution related to the present invention.
Referring to fig. 2, the intelligent bracelet for password unlocking comprises 12 beads (203), a connecting line (204) made of flexible materials with fixed elastic coefficients, and the 12 beads are connected in series to form the bracelet. The total number can be 3 to 50, and the specific number is determined according to wearing requirements or password requirements.
Wherein, 1 of the positioning aids is set as an origin and the surface of the positioning aids is provided with a salient point (201). The origin can be confirmed by touching with a human hand. The origin is usually worn on the back of the wrist when the bracelet is deciphered. To serve as a reference point, the plane position and the spacing distance of the other beads were confirmed.
FIG. 3 illustrates the internal structure of a single bead, consisting essentially of 4 segments. The device comprises a left shell (303), a right shell (301), a middle connecting ring (302) and built-in signal transmitting module groups (304, 305 and 306).
The signal transmitting module group is fixed on the left shell, and a touch switch identifier (308) is arranged on the outer surface of the shell. When the switch is used, the surface of the bead is pressed through touch, and the switch effect is achieved. Meanwhile, the signal transmitting module group comprises a vibration element (305), and the switch state is confirmed through vibration. The power supply adopts a lithium battery or other small batteries (304). The signal transmitting device (306) is responsible for the transmission of wireless signals.
The three pieces of the housing are connected by threaded ports (310). Wherein the middle part of the connecting ring (302) is provided with a hole (309). The flexible connecting line (204) connects the 12 beads through the hole (309). Meanwhile, the flexible material is fixed by the hole in the bead, elastic expansion is not generated, and only the bead connection part is elastically expanded.
In use, it is first confirmed that the bead combination is turned on except for the origin. Opening is confirmed by vibration. For example, 6 in total as shown in fig. 4 at 401 to 406. The distance of the bead in the working state from the origin can be written 0110, 1011, 010 in a clockwise calculation. The frequency of the wireless signal transmitted by each bead is set to be different signals, and the combination of the beads is judged by identifying through the receiver.
The smart bracelet is worn into the wrist with the origin (400) rotated to the center of the arm's long axis. And start the origin working fill. Due to different bone sizes, the flexible material has different stretching lengths, and the intervals of the beads are different. Through setting for under the ideal circumstances (not flexible state), the relative position of each pearl and initial point is confirmed, and the position has changed when wearing, then the receiving terminal treater carries out positioning process, reachs the pearl position after receiving the elastic stretching influence, forms the plane coordinate picture.
And after the active password is started and the first passive password is detected and determined, performing gesture movement. And at the moment, the motion track of the original point is determined as a reference motion track, the receiving end microprocessor tracks the reference motion track, and a track curve with higher matching degree is obtained through filtering and space three-dimensional change, so that the second passive password is started. And finishing triggering the whole set command and starting to execute the operation.
The password unlocking device is used for wearing jewelry and completing the password unlocking task. According to the invention, a large amount of statistics and investigation show that obvious individual habits are always formed when a human body swings hands or carries out common gestures, and the repeatability is very high. Taking the time viewed by the user wearing the watch as an example, the invention finds that the track of the movement of the watch driven by the user needing to lift the arm has a strong rule. For example, most users bend the forearm to form an angle of approximately 90 degrees with the upper arm, at a location in the middle of the chest. This operation is often due to significant memory in the limb resulting from repeated use. The research shows that the motion track of the user is relatively fixed when the user uses the common gesture, so that the user can use the gesture as the biological feature password and the misjudgment probability can be reduced, and the gesture recognition method has more prominent substantive features and remarkable progress.
Compared with the prior art, as an intelligent bracelet for password decryption, the intelligent bracelet can obtain a safer guarantee through active digital encryption and biological sign double encryption.
In light of the foregoing description of the preferred embodiments of the present invention, it is to be understood that various changes and modifications may be made by those skilled in the art without departing from the spirit and scope of the invention. The technical scope of the present invention is not limited to the content of the specification, and must be determined according to the scope of the claims.

Claims (5)

1. An intelligent bracelet for password unlocking, characterized in that: the beads forming the bracelet have a signal sending function; the beads can select the working quantity to form signal source groups with different combinations as a first double initiative password; after the bracelet is worn by a specific wrist, the bead combination and the relative position of the signal source group form a specific plane coordinate pattern as a second passive password; meanwhile, the bracelet is provided with fixed beads which form a special track along with the movement of a human body and serve as a third passive password.
2. The smart bracelet of claim 1, wherein: the shell of the bead is made of engineering plastics, stones, glass or wood, and the touch switch is attached to the inner surface of the shell.
3. The smart bracelet of claim 1, wherein: the inside wireless signal transmitter that sets up of pearl to at least 1 pearl is as the specific auxiliary member of location identification system.
4. The smart bracelet of claim 1, wherein: the number of the beads is 3-50, the beads are used for positioning identification during touch operation, and at least 1 of other beads is in a working state.
5. The smart bracelet of claim 1, wherein: the beads emit signals with different frequencies, and the signals are received by the microprocessor to be identified.
CN201710462829.7A 2017-06-19 2017-06-19 A intelligent hand lace for password unblock Active CN107294728B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710462829.7A CN107294728B (en) 2017-06-19 2017-06-19 A intelligent hand lace for password unblock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710462829.7A CN107294728B (en) 2017-06-19 2017-06-19 A intelligent hand lace for password unblock

Publications (2)

Publication Number Publication Date
CN107294728A CN107294728A (en) 2017-10-24
CN107294728B true CN107294728B (en) 2022-05-20

Family

ID=60096525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710462829.7A Active CN107294728B (en) 2017-06-19 2017-06-19 A intelligent hand lace for password unblock

Country Status (1)

Country Link
CN (1) CN107294728B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7526114B2 (en) * 2002-11-15 2009-04-28 Bioarray Solutions Ltd. Analysis, secure access to, and transmission of array images
US9280281B2 (en) * 2012-09-12 2016-03-08 Insyde Software Corp. System and method for providing gesture-based user identification
GB201221433D0 (en) * 2012-11-28 2013-01-09 Hoverkey Ltd A method and system of providing authentication of user access to a computer resource on a mobile device
CN203841233U (en) * 2014-04-01 2014-09-24 温兵 Intelligent bracelet
CN104064010A (en) * 2014-06-27 2014-09-24 中山市品汇创新专利技术开发有限公司 Novel remote control smart bracelet
CN104462914B (en) * 2014-11-14 2018-03-27 广东欧珀移动通信有限公司 A kind of unlocking screen method and terminal
CN105326169A (en) * 2015-12-10 2016-02-17 董小丽 Multifunctional necklace
CN105809783A (en) * 2016-03-03 2016-07-27 陈健强 Automobile unlocking realization method based on gestures of intelligent bracelet and automobile unlocking realization system based on gestures of intelligent bracelet

Also Published As

Publication number Publication date
CN107294728A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
Yi et al. Glassgesture: Exploring head gesture interface of smart glasses
WO2015188538A1 (en) Mobile terminal security authentication method and system and mobile terminal
Xu et al. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication
US10877568B2 (en) Three-dimensional in-the-air finger motion based user login framework for gesture interface
CN107004311B (en) Techniques for access control using wearable devices
Yang et al. Motionauth: Motion-based authentication for wrist worn smart devices
CN110286944B (en) Method and apparatus for processing biometric information in an electronic device
US20200167450A1 (en) Identity authentication method and system
WO2017041458A1 (en) Identity recognition method, transmitting terminal, receiving terminal, wearable device and identity recognition system
Saxena et al. Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags
Li et al. Sensor-based continuous authentication using cost-effective kernel ridge regression
CN204965256U (en) Intelligence wearing equipment with fingerprint identification function
CN103944615A (en) Method and system for achieving near field unlocking according to electrocardiogram
US20160350761A1 (en) Method and Apparatus for Managing Reference Templates for User Authentication Using Behaviometrics
CN108629167A (en) A kind of more smart machine identity identifying methods of combination wearable device
US20200162455A1 (en) Multi-functional authentication apparatus and operating method for the same
CN106301778A (en) Auth method, device, system and user terminal
CN106411952B (en) One kind is every lost motion state gesture user identity identifying method and device
CN105939336A (en) Identity authentication method and system
CN105991652A (en) Identity authentication method and system
WO2019057084A1 (en) Biological recognition apparatus, biological recognition unlocking method, and terminal device
TW201802718A (en) Non-contact identity verification device and non-contact identity verification system and non-contact identity verification method ensures the protection of personal data
EP3005761A1 (en) Pairing device
Li et al. Secure UHF RFID authentication with smart devices
JP2019512786A (en) Authorization authorization method, authorization device and authorization system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220412

Address after: 750004 room 607, building 14, Yinchuan IBI Yucheng center, 490 Ning'an street, Jinfeng District, Yinchuan City, Ningxia Hui Autonomous Region

Applicant after: Ningxia Haina Rendong Technology Co.,Ltd.

Address before: 750000 6th floor, building 14, IBI Yucheng center, 490 Ning'an South Street, Jinfeng District, Yinchuan City, Ningxia Hui Autonomous Region

Applicant before: NINGXIA ACADEMY OF SOFTWARE ENGINEERING Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant