Passive authorization control method, device and system

文档序号:53237 发布日期:2021-09-28 浏览:37次 中文

阅读说明:本技术 被动授权控制方法、装置及系统 (Passive authorization control method, device and system ) 是由 孙达 李昕龙 谢亚娟 于 2020-03-09 设计创作,主要内容包括:本申请实施例提供一种被动授权控制方法、装置及系统,该方法应用于终端设备,包括:获取所述终端设备在不同时刻接收到的第一信号的多个信号强度,所述第一信号为锁件发送的;将所述多个信号强度输入至预设模型,得到所述锁件被攻击的概率,并根据所述锁件被攻击的概率确定是否解锁所述锁件;其中,所述预设模型为对多组训练样本学习得到的,每组训练样本包括锁件发射信号的样本信号强度和样本攻击概率。本申请实施例提供的被动授权方法、装置及系统,能够根据第一信号的多个信号强度得到锁件被攻击的概率,从而决定是否执行开锁操作,解决了被动授权系统安全性较低的问题。(The embodiment of the application provides a passive authorization control method, a device and a system, wherein the method is applied to terminal equipment and comprises the following steps: acquiring a plurality of signal strengths of first signals received by the terminal equipment at different moments, wherein the first signals are sent by a locking piece; inputting the signal intensities into a preset model to obtain the probability of the lock piece being attacked, and determining whether to unlock the lock piece according to the probability of the lock piece being attacked; the preset model is obtained by learning a plurality of groups of training samples, and each group of training samples comprises sample signal strength and sample attack probability of a lock piece transmitting signal. The passive authorization method, the passive authorization device and the passive authorization system can obtain the probability of the lock being attacked according to the signal strengths of the first signal, so that whether to execute unlocking operation is determined, and the problem of low safety of the passive authorization system is solved.)

1. A passive authorization control method is applied to a terminal device, and comprises the following steps:

acquiring a plurality of signal strengths of first signals received by the terminal equipment at different moments, wherein the first signals are sent by a locking piece;

inputting the signal intensities into a preset model to obtain the probability of the lock piece being attacked, and determining whether to unlock the lock piece according to the probability of the lock piece being attacked;

the preset model is obtained by learning a plurality of groups of training samples, and each group of training samples comprises the sample signal strength and the sample attack probability of the lock piece transmitting signals.

2. The method of claim 1, wherein inputting the plurality of signal strengths to a predetermined model to obtain a probability that the lock is attacked comprises:

arranging the signal intensities according to the time corresponding to each signal intensity to obtain a plurality of arranged signal intensities;

and inputting the arranged signal intensities into the preset model to obtain the probability of the lock piece being attacked.

3. The method of claim 1, wherein determining whether to unlock the lock based on a probability that the lock is attacked comprises:

if the probability that the locking piece is attacked is smaller than or equal to the preset probability, an unlocking instruction is sent to the locking piece, and the unlocking instruction is used for indicating the locking piece to unlock;

otherwise, receiving indication information input by a user, and determining whether to unlock the locking piece according to the indication information.

4. The method according to any one of claims 1-3, wherein the number of the plurality of signal strengths is equal to the number of the plurality of sample signal strengths included in each set of training samples;

each group of training samples comprises n sample signal intensities; the acquiring multiple signal strengths of the first signal received by the terminal device at different times includes:

performing a first operation, the first operation comprising: acquiring the ith signal intensity of the first signal and the time corresponding to the ith signal intensity; initially, i is 1, i is an integer greater than or equal to 1;

performing a second operation, the second operation comprising: judging whether the ith signal intensity is greater than or equal to the preset signal intensity, if not, updating i to be i + 1;

repeatedly executing the first operation and the second operation until the ith signal intensity is greater than or equal to the preset signal intensity, and outputting the first i signal intensities of the first signal;

if i is larger than n, sampling the first i signal intensities to obtain n signal intensities;

if i is smaller than n, performing interpolation processing on the previous i signal intensities to obtain n signal intensities.

5. The method of claim 4, wherein the preset signal strength is determined by:

when sample signal strength is collected, acquiring first signal strength of a first signal received by the terminal equipment when the locking piece is indicated to be unlocked;

determining the preset signal strength according to at least one first signal strength;

or the like, or, alternatively,

when the distance between the terminal equipment and the locking piece is within a preset distance range, acquiring a plurality of second signal strengths of a first signal received by the terminal equipment;

and obtaining the preset signal intensity according to the plurality of second signal intensities.

6. The method according to any one of claims 1-3, further comprising:

updating the preset model according to the signal strengths and the probability of the lock being attacked.

7. A passive authorization control device, comprising:

the terminal equipment comprises an acquisition module, a locking module and a processing module, wherein the acquisition module is used for acquiring a plurality of signal strengths of first signals received by the terminal equipment at different moments, and the first signals are sent by the locking element;

the processing module is used for inputting the signal intensities into a preset model to obtain the probability of the lock piece being attacked and determining whether to unlock the lock piece according to the probability of the lock piece being attacked;

the preset model is obtained by learning a plurality of groups of training samples, and each group of training samples comprises the sample signal strength and the sample attack probability of the lock piece transmitting signals.

8. A passive authorization system, comprising a terminal device and a lock, wherein:

the lock is used for transmitting a first signal;

the terminal device is configured to process the first signal according to the method of any one of claims 1 to 6.

9. A passive authorization control device, comprising: at least one processor and memory;

the memory stores computer-executable instructions;

the at least one processor executing the memory-stored computer-executable instructions cause the at least one processor to perform the passive authorization control method of any of claims 1 to 6.

10. A computer-readable storage medium having computer-executable instructions stored thereon which, when executed by a processor, implement the passive authorization control method of any of claims 1 to 6.

Technical Field

The embodiment of the application relates to the field of radio security, in particular to a passive authorization control method, device and system.

Background

In real life, it is often necessary to perform encryption operations on devices. For example, a lock of a vehicle is closed to prevent others from entering the vehicle, a gate guard is provided to prevent a person waiting for entry, and the like. When a user needs to unlock the device after the encryption operation, the user usually needs to actively execute the unlocking operation, for example, a car key is pressed to unlock a car lock, and an entrance guard is opened by swiping an entrance guard card.

The unlocking mode requires active operation of a user every time, and in order to solve the problem, one currently adopted mode is realized by using a passive authorization system. The passive authorization system is a device which can be unlocked without the active authorization of a user, for example, when a trusted smart phone is close to an entrance guard, a door lock or a car to be authorized, the entrance guard, the door lock or the car can be automatically unlocked without the active unlocking action of the user. The passive authorization system carries out radio communication through a key and a lock, because the radio power is small, if the passive authorization system can communicate with each other or detects that the signals of the two parties are strong, the passive authorization system considers that the two parties are close to each other, and then unlocking is carried out.

Such passively authorized systems, while convenient, are vulnerable to relay attacks. For example, after someone approaches to the smart phone, the radio signal transmission and amplification device is used to enable the entrance guard far away from the phone to receive the signal of the phone, so that the entrance guard mistakenly determines that the phone is close to the entrance guard, and needs to unlock, resulting in lower unlocking safety. That is, the existing passive authorization system is unlocked directly when the signal strength of the radio reaches a certain value, and is easy to attack and low in security.

Disclosure of Invention

The embodiment of the application provides a passive authorization control method, a device and a system, which are used for solving the problems that the passive authorization system performs unlocking action when the radio signal intensity is high and the safety is low.

In a first aspect, an embodiment of the present application provides a passive authorization control method, which is applied to a terminal device, and the method includes:

acquiring a plurality of signal strengths of first signals received by the terminal equipment at different moments, wherein the first signals are sent by a locking piece;

inputting the signal intensities into a preset model to obtain the probability of the lock piece being attacked, and determining whether to unlock the lock piece according to the probability of the lock piece being attacked;

the preset model is obtained by learning a plurality of groups of training samples, and each group of training samples comprises the sample signal strength and the sample attack probability of the lock piece transmitting signals.

In one possible implementation, inputting the plurality of signal strengths to a preset model to obtain a probability that the lock is attacked comprises:

arranging the signal intensities according to the time corresponding to each signal intensity to obtain a plurality of arranged signal intensities;

and inputting the arranged signal intensities into the preset model to obtain the probability of the lock piece being attacked.

In one possible implementation, determining whether to unlock the lock based on a probability that the lock is attacked includes:

if the probability that the locking piece is attacked is smaller than or equal to the preset probability, an unlocking instruction is sent to the locking piece, and the unlocking instruction is used for indicating the locking piece to unlock;

otherwise, receiving indication information input by a user, and determining whether to unlock the locking piece according to the indication information.

In one possible implementation, the number of the plurality of signal strengths is equal to the number of the plurality of sample signal strengths included in each set of training samples; each group of training samples comprises n sample signal intensities; the acquiring multiple signal strengths of the first signal received by the terminal device at different times includes:

performing a first operation, the first operation comprising: acquiring the ith signal intensity of the first signal and the time corresponding to the ith signal intensity; initially, i is 1, i is an integer greater than or equal to 1;

performing a second operation, the second operation comprising: judging whether the ith signal intensity is greater than or equal to the preset signal intensity, if not, updating i to be i + 1;

repeatedly executing the first operation and the second operation until the ith signal intensity is greater than or equal to the preset signal intensity, and outputting the first i signal intensities of the first signal;

if i is larger than n, sampling the first i signal intensities to obtain n signal intensities;

if i is smaller than n, performing interpolation processing on the previous i signal intensities to obtain n signal intensities.

In one possible implementation manner, the preset signal strength is determined by:

when sample signal strength is collected, acquiring first signal strength of a first signal received by the terminal equipment when the locking piece is indicated to be unlocked;

determining the preset signal strength according to at least one first signal strength;

or the like, or, alternatively,

when the distance between the terminal equipment and the locking piece is within a preset distance range, acquiring a plurality of second signal strengths of a first signal received by the terminal equipment;

and obtaining the preset signal intensity according to the plurality of second signal intensities.

In one possible implementation, the method further includes:

updating the preset model according to the signal strengths and the probability of the lock being attacked.

In a second aspect, an embodiment of the present application provides a passive authorization control apparatus, including:

the terminal equipment comprises an acquisition module, a locking module and a processing module, wherein the acquisition module is used for acquiring a plurality of signal strengths of first signals received by the terminal equipment at different moments, and the first signals are sent by the locking element;

the processing module is used for inputting the signal intensities into a preset model to obtain the probability of the lock piece being attacked and determining whether to unlock the lock piece according to the probability of the lock piece being attacked;

the preset model is obtained by learning a plurality of groups of training samples, and each group of training samples comprises the sample signal strength and the sample attack probability of the lock piece transmitting signals.

In a possible implementation manner, the processing module is specifically configured to:

arranging the signal intensities according to the time corresponding to each signal intensity to obtain a plurality of arranged signal intensities;

and inputting the arranged signal intensities into the preset model to obtain the probability of the lock piece being attacked.

In a possible implementation manner, the processing module is specifically configured to:

if the probability that the locking piece is attacked is smaller than or equal to the preset probability, an unlocking instruction is sent to the locking piece, and the unlocking instruction is used for indicating the locking piece to unlock;

otherwise, receiving indication information input by a user, and determining whether to unlock the locking piece according to the indication information.

In one possible implementation, the number of the plurality of signal strengths is equal to the number of the plurality of sample signal strengths included in each set of training samples; the acquisition module is specifically configured to:

performing a first operation, the first operation comprising: acquiring the ith signal intensity of the first signal and the time corresponding to the ith signal intensity; initially, i is 1, i is an integer greater than or equal to 1;

performing a second operation, the second operation comprising: judging whether the ith signal intensity is greater than or equal to the preset signal intensity, if not, updating i to be i + 1;

repeatedly executing the first operation and the second operation until the ith signal intensity is greater than or equal to the preset signal intensity, and outputting the first i signal intensities of the first signal;

if i is larger than n, sampling the first i signal intensities to obtain n signal intensities;

if i is smaller than n, performing interpolation processing on the previous i signal intensities to obtain n signal intensities.

In a possible implementation manner, the obtaining module is further configured to, when performing sample signal strength collection, obtain a first signal strength of a first signal received by the terminal device when instructing the lock to unlock;

determining the preset signal strength according to at least one first signal strength;

or the like, or, alternatively,

when the distance between the terminal equipment and the locking piece is within a preset distance range, acquiring a plurality of second signal strengths of a first signal received by the terminal equipment;

and obtaining the preset signal intensity according to the plurality of second signal intensities.

In one possible implementation, the processing module is further configured to:

updating the preset model according to the signal strengths and the probability of the lock being attacked.

In a third aspect, an embodiment of the present application provides a passive authorization system, including a terminal device and a lock, where:

the lock is used for transmitting a first signal;

the terminal device is configured to process the first signal according to the method of any of the first aspect.

In a fourth aspect, an embodiment of the present application provides a passive authorization control device, including: at least one processor and memory;

the memory stores computer-executable instructions;

the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the passive authorization control method of any of the first aspects.

In a fifth aspect, an embodiment of the present application provides a computer-readable storage medium, where computer-executable instructions are stored, and when a processor executes the computer-executable instructions, the passive authorization control method according to any one of the first aspect is implemented.

The passive authorization control method, the passive authorization control device and the passive authorization control system provided by the embodiment of the application firstly acquire a plurality of signal strengths of first signals received by terminal equipment at different moments, wherein the first signals are sent by the locking piece, and after the terminal equipment detects the first signals, the situation that the distance between the terminal equipment and the locking piece is possibly close and the locking piece is attacked can also occur. At this time, a plurality of signal strengths of the first signal are recorded to prepare for subsequently judging whether the locking piece is attacked or not. Then, input a plurality of signal strength to preset model, wherein, preset model is obtained to multiunit training sample study, and every group training sample includes the sample signal strength and the sample attack probability of latch fitting transmission signal, through the study to training sample, preset model possesses the judgement ability to after inputting a plurality of signal strength to preset model, can obtain the probability that the latch fitting is attacked, and then whether unblock latch fitting according to the probability decision that the latch fitting is attacked. According to the scheme of the embodiment of the application, after the terminal device detects the first signal, the probability that the locking piece is attacked can be obtained according to a plurality of signal strengths of the first signal, so that whether unlocking operation is executed or not is determined, the unlocking operation is avoided being executed when the locking piece is attacked, and a large safety risk is caused.

Drawings

In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.

Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;

fig. 2 is a schematic flowchart of a passive authorization control method according to an embodiment of the present application;

fig. 3 is a schematic flowchart of a passive authorization control method according to another embodiment of the present application;

fig. 4 is a schematic diagram of a first signal coverage provided by an embodiment of the present application;

fig. 5 is a schematic diagram of signal strength acquisition provided by an embodiment of the present application;

fig. 6 is a schematic diagram illustrating preset signal strength acquisition according to an embodiment of the present disclosure;

FIG. 7 is a schematic illustration of a lock distribution environment provided by an embodiment of the present application;

fig. 8 is a schematic structural diagram of a passive authorization control device according to an embodiment of the present application;

fig. 9 is a schematic structural diagram of a passive authorization system provided in an embodiment of the present application;

fig. 10 is a schematic hardware structure diagram of a passive authorization control device according to an embodiment of the present application.

Detailed Description

In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

First, the concept related to the present application will be explained.

Keyless passive entry: the Passive Keyless Enter, PKE for short, is mainly applied to the field of automobiles, and when an intelligent automobile key is close to an automobile, an automobile door can be automatically unlocked without using the key to actively open the automobile door.

Passive authorization system: the concept of passive authorization is extended from keyless passive entry, which is similar but more inclusive. When the authorized portable equipment (such as a car key, a door key, a mobile phone and the like) approaches the device to be authorized, the device to be authorized communicates with the portable equipment through radio, and the device to be authorized changes into an authorized state without active authorization of a user. Such systems are known as passive authorization systems.

RSSI: the Received Signal Strength Indication is used for representing the Signal Strength Received by the radio Signal receiving device.

One possible application scenario of the present application is described below with reference to fig. 1.

Fig. 1 is a schematic view of an application scenario provided by an embodiment of the present application, and as shown in fig. 1, the application scenario includes a vehicle 11 and a vehicle key 12, a vehicle lock 13 is installed on the vehicle 11, the vehicle lock 13 transmits radio signals to the periphery, and when the distance between the vehicle lock 13 and the vehicle key 12 is short, a wireless connection can be established through the radio signals, so that the distance between the vehicle lock 13 and the vehicle key 12 can be determined through the strength of the wireless connection. When the fact that the distance between the lock 13 and the key 12 is short is judged, the unlocking operation is executed through the mutual information between the lock 13 and the key 12.

In the embodiment of the present application, the unlocking operation is performed without the user's initiative, but is authorized by the vehicle key 12. When unlocking in the above manner, whether or not to perform the unlocking operation is determined by the signal strength between the lock 13 and the key 12, and therefore there is a risk of a relay attack.

When the lock 13 is locked, the lock 13 stably transmits radio signals outwards. Since the radio signal transmitted by the lock 13 is fixed, only the key within a certain range can receive the radio signal transmitted by the lock 13. For example, when the distance between the vehicle key 12 and the vehicle lock 13 is within 100 meters, the vehicle key 12 can detect the radio signal transmitted by the vehicle lock 13, so that a wireless connection can be established with the vehicle lock 13. Therefore, after the wireless connection between the key 12 and the lock 13 is established, the distance between the key 12 and the lock 13 is considered to be less than 100 meters, at this time, the distance between the key 12 and the lock 13 can be obtained according to the strength of the radio signal detected by the key 12, and when the distance between the key 12 and the lock 13 is less than a certain value, for example, 2 meters, the unlocking operation is controlled to be executed, and the lock 13 is opened.

The above-mentioned method has a risk of being attacked by a relay, because the key 12 determines whether to unlock the lock by detecting the strength of the radio signal, which may be affected by various factors, to obtain the distance from the lock 13. For example, a user attacks the passive authorization system through a signal amplifier. When the lock 13 transmits the radio signal to the outside, the distance between the key 12 and the lock 13 is 500 meters, and the radio signal transmitted by the lock 13 can only cover the range of about 100 meters around the lock 13, so that the key 12 cannot detect the radio signal transmitted by the lock 13 under normal conditions. A user controls the signal amplifier to amplify the radio signal transmitted by the lock 13, so that the key 12 can detect the radio signal, thereby controlling the unlocking operation. When the signal amplifier amplifies the radio signal transmitted by the lock 13, although the distance between the lock 13 and the key 12 is large, the key 12 determines that the distance between the key and the lock 13 is small, and at this time, the unlocking operation is performed, which has a large safety risk.

In order to solve the above problems, the present application provides a passive authorization control scheme, which avoids the unlocking operation performed when the passive authorization system is attacked, and improves the security of the device.

The following describes the technical solutions of the present application and how to solve the above technical problems with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.

Fig. 2 is a schematic flowchart of a passive authorization control method provided in an embodiment of the present application, and as shown in fig. 2, the method may include:

and S21, acquiring a plurality of signal strengths of first signals received by the terminal equipment at different moments, wherein the first signals are sent by the locking piece.

The passive authorization system comprises terminal equipment and a locking piece, wherein the locking piece is a locking component and can be an independent device, such as a car lock, a door access and a door lock, and the locking piece can also be a part of a device, such as an encryption component of a computer, an encryption component of a mobile phone and the like. The locking piece can be a physical device or a hardware device, such as a smart car lock, and can also be a software device, such as a computer, a mobile phone or a file and the like, which are encrypted through software.

The locking piece needs to emit a first signal outwards, and when the locking piece is a physical device or a hardware device, the physical device or the hardware device emits the first signal; when the encryption is performed by the software device, the operation performed by the locking part at this time is performed by a device that runs the software, for example, when the computer is encrypted by the software, a first signal is transmitted from the computer to the outside, when the mobile phone is encrypted by the software, a first signal is transmitted from the mobile phone to the outside, and so on.

Terminal equipment is for can controlling the latch fitting to lock or the device of unblock, and when the latch fitting was the car lock, terminal equipment can be for example for equipment such as car key, cell-phone, and when the latch fitting was entrance guard, terminal equipment can be for example for equipment such as entrance guard's card, cell-phone.

When the latch fitting outwards launches first signal, the signal strength of the first signal of transmission is stable unchangeable, and first signal possesses certain coverage. When the terminal device is in the coverage range of the first signal, the terminal device can detect the first signal, and at the moment, the terminal device can acquire the signal intensity of the first signal at regular intervals, so that a plurality of signal intensities of the first signal received at different moments are obtained.

S22, inputting the signal intensities into a preset model to obtain the probability of the lock being attacked, and determining whether to unlock the lock according to the probability of the lock being attacked;

the preset model is obtained by learning a plurality of groups of training samples, and each group of training samples comprises the sample signal strength and the sample attack probability of the lock piece transmitting signals.

Under the condition that the terminal equipment is normally not attacked, after the terminal equipment detects the first signal, the terminal equipment is in the coverage range of the first signal, and the distance between the terminal equipment and the locking piece is smaller. However, if the system is attacked, for example, the user amplifies the first signal by controlling the signal amplifier, so that the coverage of the first signal is significantly increased, which may cause the terminal device to still detect the first signal when the terminal device is far away from the locking part, and therefore, the user determines whether to unlock the terminal device directly according to the change of the signal strength of the first signal detected by the terminal device, which presents a great safety risk.

In the embodiment of the application, after a plurality of signal strengths of the first signal received by the terminal device at different moments are obtained, the plurality of signal strengths are input into the preset model to obtain the probability that the locking piece is attacked, and whether the locking piece is unlocked is determined according to the probability that the locking piece is attacked.

The model that the model was obtained for training in advance is predetermine, predetermines the model and obtains through the study of multiunit training sample, and each group training sample includes a plurality of sample signal intensity and the sample attack probability of this latch fitting transmitting signal, and wherein, the outside transmitting signal that the latch fitting can be stable, then by a sample terminal equipment after detecting the signal that the latch fitting transmitted, gather a plurality of sample signal intensity of the signal that different moments received. The sample attack probability is the probability that the locking piece is attacked, when the training sample is obtained, whether the locking piece is attacked or not can be known in advance, if yes, the sample attack probability is 1, and if not, the sample attack probability is 0. Therefore, the sample attack probability may be 0 or 1, and further, the sample attack probability may also be a value between 0 and 1, which is not particularly limited in the embodiment of the present application.

The preset model is trained through multiple groups of training samples, so that the preset model has judgment capability. After the preset model training is completed, a plurality of signal intensities are input into the preset model, and then the probability that the locking piece is attacked can be obtained.

Then, whether to unlock the lock is determined based on the probability that the lock is attacked. For example, when the probability of the lock being attacked is high, it indicates that the lock is likely to be attacked, and the lock may not be unlocked at this time, or the user may be alerted by the terminal device that there is a risk of the lock being attacked. When the probability that the locking piece is attacked is small, the environment where the locking piece is located is safe, and at the moment, unlocking operation can be executed to unlock the locking piece.

The passive authorization control method provided by the embodiment of the application is applied to the terminal equipment, and firstly, a plurality of signal strengths of first signals received by the terminal equipment at different moments are obtained, wherein the first signals are sent by the locking piece, and when the terminal equipment detects the first signals, the situation that the distance between the terminal equipment and the locking piece is possibly close and the locking piece is attacked can also occur. At this time, a plurality of signal strengths of the first signal are recorded to prepare for subsequently judging whether the locking piece is attacked or not. Then, input a plurality of signal strength to preset model, wherein, preset model is obtained to multiunit training sample study, and every group training sample includes the sample signal strength and the sample attack probability of latch fitting transmission signal, through the study to training sample, preset model possesses the judgement ability to after inputting a plurality of signal strength to preset model, can obtain the probability that the latch fitting is attacked, and then whether unblock latch fitting according to the probability decision that the latch fitting is attacked. According to the scheme of the embodiment of the application, after the terminal device detects the first signal, the probability that the locking piece is attacked can be obtained according to a plurality of signal strengths of the first signal, so that whether unlocking operation is executed or not is determined, the unlocking operation is avoided being executed when the locking piece is attacked, and a large safety risk is caused.

The embodiments of the present application will be described in detail with reference to specific examples.

Fig. 3 is a schematic flowchart of a passive authorization control method according to another embodiment of the present application, and as shown in fig. 3, the method may include:

s31, the lock emits a first signal.

The locking element in the embodiment of the present application is similar to the locking element in the embodiment shown in fig. 2, and may be a separate device, such as a car lock, a door lock, or the like, or may be a part of a device, such as an encryption component of a computer, an encryption component of a mobile phone, or the like, and thus, the description thereof is omitted.

The stable first signal of outwards launching of latch fitting, the signal strength that the latch fitting outwards launches first signal remains unchanged. The first signal may be of various types, such as a WiFi signal, a bluetooth signal, etc., or may be other types of signals. The type of first signal can be confirmed according to actual latch fitting and terminal equipment's type, for example, when terminal equipment is the cell-phone, generally be provided with bluetooth function on the cell-phone, the latch fitting can outwards launch bluetooth signal this moment, through the bluetooth agreement, when the cell-phone is nearer apart from the latch fitting, establish the bluetooth and connect. By the mode, the terminal equipment does not need to be additionally configured.

And S32, judging whether the terminal equipment detects the first signal or not, if so, executing S33, and if not, continuously detecting the first signal.

Because the first signal has a certain coverage, the terminal device can detect the first signal when the terminal device is in the coverage of the first signal, and the terminal device cannot detect the first signal when the terminal device is out of the coverage of the first signal. This process will be described below with reference to fig. 4.

Fig. 4 is a schematic diagram of a first signal coverage provided by an embodiment of the present application, as shown in fig. 4, including a locking element 41, where the locking element 41 emits a first signal outwards, and a region 42 is a coverage of the first signal. Under normal conditions, when the terminal device is in the area 42 (e.g. point a in fig. 4), a first signal can be detected and a communication connection can be established with the lock 41. When the terminal device is outside the area 42 (e.g., point B in fig. 4), the first signal cannot be detected and a communication connection cannot be established with the lock 41.

S33, the terminal device obtains a plurality of signal strengths of the first signal at different times.

In fig. 4, the range of the area 42 is relatively large, and is typically several tens of meters to several hundreds of meters, and normally, after the terminal device is in the area 42, the first signal can be detected, and then the signal strength of the first signal at different time points is collected. If the lock is attacked, it is possible that the end device is outside zone 42 when the end device detects the first signal.

Fig. 5 is a schematic diagram of signal strength acquisition provided by an embodiment of the present application, as shown in fig. 5, including a locking element 41, an area 42 and an area 43, where the locking element 41 emits a first signal outwards, the area 42 is a coverage area of the first signal, and may generally range from several tens of meters to several hundreds of meters, and the area 43 is a proximity area, and when a terminal device enters the area 43, it needs to draw a conclusion whether to unlock the locking element.

Before the conclusion of whether to unlock the lock is obtained, a preset model is firstly acquired, wherein the preset model is acquired through the following steps:

acquiring a plurality of groups of training samples, wherein each group of training samples comprises a plurality of sample signal strengths and sample attack probabilities of lock piece transmitting signals; then, inputting the signal intensities of the multiple samples into a preset model to obtain attack probability; and finally, adjusting the parameters of the preset model according to the attack probability and the sample attack probability to obtain the trained preset model.

When a training sample is acquired, a signal is first transmitted by the lock, and then a plurality of sample signal strengths are acquired by the sample terminal equipment. Optionally, in order to obtain the radio spatial characteristics near the locking element more clearly, the locking element used in the model training and the locking element actually used in the passive authorization control are the same locking element, and the sample terminal device used in the model training and the terminal device actually used in the passive authorization control are the same terminal device.

For example, when model training is performed, the locking piece a emits a signal outwards, and after the terminal device B detects the emitted signal of the locking piece a, the signal intensities of a plurality of samples of the emitted signal at different times are obtained, and the corresponding attack probability of the samples is obtained. And forming a group of training samples according to the signal intensity of each group of samples and the corresponding sample attack probability, and carrying out model training by using the training samples.

In the model training process, the signal intensities of the multiple samples are input into the preset model, so that the attack probability output by the model is obtained, wherein the attack probability is the probability that the locking piece A is attacked obtained by the preset model according to the signal intensities of the multiple samples, and a certain deviation is possible between the attack probability and the actual probability that the locking piece A is attacked. Therefore, the parameters of the preset model are adjusted according to the attack probability and the sample attack probability, and the trained preset model can be obtained.

Optionally, since it is known in advance whether the lock is attacked or not during model training, the sample attack probability may be determined to be 0 or 1, when the lock is attacked, the sample attack probability is 1, and when the lock is not attacked, the sample attack probability is 0.

And after the model training is finished, the model training method is still applied to the terminal equipment B. Terminal equipment B gathers a plurality of signal strength at different moments after detecting the signal that latch fitting A launches, inputs this preset model, obtains the probability that the latch fitting was attacked, whether unlocks latch fitting A according to the probability decision that the latch fitting was attacked.

Optionally, the preset model may be implemented by using a logistic regression algorithm in machine learning, or may be implemented by using other machine learning algorithms. The essence of the preset model is that through a large amount of data input (learning), the degree of similarity between a new set of data and previous data can be judged, and the more data is learned, the more accurate the judgment is. The implementation of the predetermined model will be exemplified by a logistic regression algorithm.

Firstly, a plurality of groups of RSSI values are required to be obtained, and the RSSI values are the sample signal strength when model training is carried out. RSSI can be recorded as a decimal between 0 and 1, and a group of RSSI values are arranged according to time sequence and x is used1,x2,x3...xnAnd (4) showing. The logistic regression algorithm requires that all training samples have the same feature number, that is, the number of the signal intensities of the plurality of samples included in each set of training samples is n, the number of the plurality of signal intensities is also n, and n is a positive integer greater than 1.

Therefore, after a group of RSSI values is collected, if the number of the group of RSSI values is not n, the group of RSSI values is interpolated or sampled, and it is ensured that the number of each group of RSSI values is n. To facilitate the mathematical calculation, a set of RSSI values is stored in a column vector, called the eigenvector.

Y represents whether a group of data is data with attack or data with normal user, 1 represents attack, and 0 represents no attack. Combining a set of characteristics and whether the set of characteristics exist attacks or not is a training sample, wherein the set of characteristics are signal strengths of a plurality of samples in the training sample, and whether the set of characteristics exist attacks or not is a sample attack probability in the training sample. The terminal equipment can put all recorded past training samples together to obtain a plurality of groups of finally used training samples:

{(x(1),y(1)),(x(2),y(2)),...,(x(m),y(m))}

wherein x(m)Feature vector, y, representing the mth set of training samples(m)Indicating whether an attack exists on the mth set of training samples, an example of a set of training samples is given below:

x0is a constant number 1, x1...xnIs the various characteristics mentioned above, i.e., n signal strengths, y indicates whether the lock has been attacked.

After the training samples are obtained, model training can be performed, taking a logistic regression algorithm as an example, the assumed function of the logistic regression algorithm is as follows:

hθ(x)=g(θTX),

wherein X represents a characteristic vector, g represents a logic function, theta is a parameter needing to be adjusted in a preset model, theta is a vector, and theta represents a logic functionTRepresenting the transpose of theta.

The output of the hypothesis function is actually a probability value: p (y ═ 1 x; θ), which is the probability that y is 1 for x with θ as a parameter. The final goal of the training is to derive the value of θ, which is a vector of parameters. After θ is obtained, a set of feature vectors is substituted into the hypothesis equation to obtain the probability that the set of data has the attack behavior.

And fitting parameters with attack probability by using a logistic regression algorithm, wherein the process of fitting (solving) theta is actually the process of solving the minimum value of the cost function. Optionally, a Sigmoid function is used as a logic function g of the hypothesis equation, so the cost function is as follows:

the work of finding the minimum of the cost function can be done very simply here using a gradient descent method. Of course, a more complex method such as a conjugate gradient method or a constrained variable scale method may be used to obtain a faster solving speed. The gradient descent method requires repeatedly updating each parameter so that J (θ) is minimized, and updating the value of θ using the following formula, where α is the learning rate designated as 0.01(J represents the number of components in θ and xjJ-th component value of the best θ parameter):

and after the theta value is obtained, the preset model training is finished.

S34, if the terminal device detects that the signal strength exceeds the predetermined signal strength, if yes, execute S35, and if no, execute S33.

After the terminal device detects the first signal, the terminal device starts to acquire a plurality of signal strengths of the first signal at different moments. One possible way of obtaining is:

performing a first operation, the first operation comprising: acquiring the ith signal intensity of the first signal and the time corresponding to the ith signal intensity; initially, i is 1, i is an integer greater than or equal to 1;

performing a second operation, the second operation comprising: judging whether the ith signal intensity is greater than or equal to the preset signal intensity, if not, updating i to be i + 1;

repeatedly executing the first operation and the second operation until the ith signal intensity is greater than or equal to the preset signal intensity, and outputting the first i signal intensities of the first signal;

and obtaining n signal intensities according to the first i signal intensities.

Specifically, the latch member stably emits a first signal outward, and after the terminal device detects the first signal, it indicates that the distance between the terminal device and the latch member may be short. At this point, the terminal device begins recording the signal strength of the first signal. After each signal strength is acquired, it is compared with a preset signal strength. And if the acquired signal intensity is less than the preset signal intensity, continuing to acquire the next signal intensity, and if the acquired signal intensity is greater than or equal to the preset signal intensity, stopping acquiring the signal intensity.

The preset signal strength is a value obtained in advance, and when the signal strength obtained by the terminal equipment reaches the preset signal strength, the conclusion that whether the locking piece needs to be unlocked is shown. The preset signal intensity is related to the intensity of the first signal during transmission, the sensitivity of the terminal equipment key for receiving the first signal and the like, and can be obtained through testing according to the preset authorization distance.

Alternatively, the user may hold the terminal device near the lock while the training sample is being collected, and then at some point may instruct the lock to unlock. When the terminal device indicates that the locking piece is unlocked, the terminal device can acquire at least one first signal strength of the first signal received at the moment, and then obtain the preset signal strength according to the at least one first signal strength. If there are a plurality of acquired first signal strengths, the preset signal strength may be obtained by averaging the plurality of first signal strengths, a maximum value or a minimum value of the plurality of first signal strengths may also be used as the preset signal strength, any one of the plurality of first signal strengths may also be used as the preset signal strength, and so on, and how to obtain the preset signal strength according to the plurality of first signal strengths is not particularly limited in the embodiment of the present application.

Another optional mode is that when the distance between the terminal device and the locking piece is within a preset distance range, a plurality of second signal strengths of the first signal received by the terminal device are obtained; and obtaining the preset signal intensity according to the plurality of second signal intensities. This process will be described below with reference to fig. 6.

Fig. 6 is a schematic diagram illustrating a preset signal strength acquisition according to an embodiment of the present invention, where as shown in fig. 6, the locking element emits the first signal outwards, and the strength of the first signal emitted outwards by the locking element is kept unchanged. Typically, the predetermined distance range may be predetermined as a user is within a range of approximately a few or ten meters from the lock to decide whether to unlock the lock. For example, the preset distance range may be determined to be 3 meters to 10 meters, 4 meters to 6 meters, or the like, and the preset distance range may be set to a value, for example, 5 meters.

In FIG. 6, the preset distance range s1-s2 is set such that s2 is greater than s 1. With s2 as the radius, the areas 62 centered on the lock are all within the coverage of the first signal. The terminal device is located in an annular region between the region 61 and the region 62, for example, a point a, a point B, a point C, a point D, and a point E in fig. 6, signal strengths of the first signal acquired when the terminal device is located at the above positions, that is, second signal strengths when the terminal device is located at the point a, the point B, the point C, the point D, and the point E, are respectively recorded, and then the preset signal strength is obtained according to the several second signal strengths. For example, the preset signal strength may be obtained by averaging the plurality of second signal strengths, or the preset signal strength may be obtained by taking the maximum value or the minimum value among the plurality of second signal strengths.

After the preset signal strength is determined, the terminal device compares the signal strength with the preset signal strength every time the terminal device acquires one signal strength. And if the acquired signal intensity is less than the preset signal intensity, continuing to acquire the next signal intensity, and if the acquired signal intensity is greater than the preset signal intensity, stopping acquiring the next signal intensity.

Fig. 5 illustrates the signal strength obtained when the two persons respectively hold the terminal device for movement. When the handheld terminal equipment of first one removed, the latch fitting was not attacked, and first one walks close to the latch fitting, and the handheld terminal equipment of first one at this moment detects the first signal of latch fitting 41 transmission to the signal strength of the first signal of beginning record. In fig. 5, 7 points are illustrated, which represent the trajectory of the nail, and the terminal device held by the nail acquires the signal intensity of the first signal detected at that time when the nail moves to the 7 points. In actual acquisition, the terminal device may perform acquisition according to a preset time interval, for example, once every 100ms, and compare the signal strength with a preset signal strength every time the signal strength is acquired. In fig. 5, when the nail moves to the 7 th point, the signal intensity acquired at this time is greater than the preset signal intensity, and the distance between the 7 th point and the region 43 is also very close, at this time, the signal intensities acquired at the 7 th point may form a feature vector, and the feature vector may be input to the preset model for determination.

When the handheld terminal device B moves, the locking piece is attacked, and the locking piece B is out of the coverage range of the first signal, namely out of the area 42, but because the locking piece is attacked, the first signal transmitted by the locking piece can be amplified, the strength of the first signal can be changed, and therefore, the first signal can be detected when the locking piece B is out of the area 42. And after the terminal equipment held by the second hand detects the first signal, the signal intensity of the first signal is also collected and compared with the preset signal intensity. When the collected signal intensity is smaller than the preset signal intensity, continuing to collect the next signal intensity, and when the collected signal intensity is larger than or equal to the preset signal intensity, stopping collecting the signal intensity, forming a feature vector by the previously collected signal intensity at the moment, and inputting the feature vector into the preset model for judgment.

When the model training is performed, the number of training samples collected initially is small, and the accuracy of the prediction result is not high, so that the training is started after a certain number (for example, 30 groups) of training samples are collected. Before the preset model does not have the judging function, the system needs to use other authorization modes temporarily, or the data are not attacked by default.

After the training samples are enough and training is carried out, the feature vectors are substituted into the hypothesis function, the theta value is substituted into the hypothesis function, and the probability value that the lock has attack is calculated. And (4) assuming that the probability value of the lock attacked calculated by the function is less than the preset probability, the lock is considered to be safe. Because the locking element may be fixedly installed in a place, such as a door access, a door lock, or may be movable, such as a car, a laptop computer. Therefore, the preset probability is adjusted according to factors such as the consistency of a specific scene and a user habit, and the specific adjusting process is not described in detail in the scheme.

In the above embodiment, if the preset model is implemented by using a logistic regression algorithm, since the logistic regression algorithm requires that the training samples are equal in number, which is n, after the first i signal intensities are obtained by the above method, if i is not equal to n, the first i signal intensities need to be sampled or interpolated.

Specifically, when i is greater than n, the first i signal intensities may be sampled to obtain n signal intensities. For example, when 600 signal strengths are collected and n is 500, 600 signal strengths are sampled at this time, resulting in 500 signal strengths.

When i is smaller than n, the previous i signal intensities can be interpolated to obtain n signal intensities. For example, when 400 signal intensities are acquired and n is 500, the 400 signal intensities are interpolated to obtain 500 signal intensities.

When i is n, the first i signal intensities may be directly used as the n signal intensities without performing interpolation processing or sampling processing.

And S35, inputting a plurality of signal strengths into a preset model to obtain the probability of the lock being attacked.

Specifically, the signal intensities are arranged according to the time corresponding to each signal intensity to obtain a plurality of arranged signal intensities; and then, inputting the arranged signal intensities into a preset model to obtain the probability of the lock piece being attacked.

The signal intensities acquired at different moments are different, and the signal intensities are arranged through the moment corresponding to each signal intensity to obtain a plurality of arranged signal intensities, so that the change process of the signal intensity can be reflected. Because the latch fitting is in certain position, consequently when terminal equipment is close to the latch fitting, the change of the signal strength that detects has certain law. In the embodiment of the application, when carrying out the model training in advance, the sample signal intensity in the training sample of adoption is the signal intensity that the latch fitting was not attacked, terminal equipment gathered when being close to the latch fitting gradually, through gathering multiunit sample signal intensity, can reflect the peripheral environment of latch fitting to a certain extent.

Specifically, after the locking element emits the first signal, the terminal device detects the signal strength of the first signal, which may reflect the distance between the locking element and the terminal device and the radio characteristics of the specific space. The terminal device inputs the collected signal intensities into a preset model, predicts whether the terminal device is in a familiar environment, and approaches the locking piece in a habitual manner. When the signal intensity that terminal equipment detected first signal is very high, predetermine the probability that the latch fitting of model output was attacked again and be less than predetermineeing the probability, terminal equipment and latch fitting can interact this moment, and terminal equipment sends the unblock instruction for the latch fitting and instructs the latch fitting unblock.

If an attacker wants to make a relay attack, the attacker needs to approach the signal relay device to the terminal equipment, and the signal strength characteristic close to the terminal equipment needs to be perfectly simulated. Because the space environment of the terminal equipment and the space environment near the locking piece are almost not the same, the signal intensity characteristics are greatly different. In addition, the habitual action of the user is simulated, the attack mode is almost unsuccessful, and the safety of the passive authorization system can be effectively improved. In addition, since the method does not need special mechanical structures, hardware circuit chips or radio antennas, and the like, the method can be used on equipment with mature general communication modes such as WiFi, Bluetooth and the like.

This process will be described below with reference to fig. 7.

Fig. 7 is a schematic view of a lock distribution environment provided by an embodiment of the present application, as shown in fig. 7, including a lock 71, a building 72, and a building 73, where the lock 71 is a door lock and is a gate of a garden. On the opposite side of the campus are buildings 72 and 73, inside which each rectangular frame represents a building, with a total of 6 buildings.

When the locking element 71 emits the first signal outwards, the building may interfere with the first signal to a certain extent, for example, partially reflect the first signal, due to the building around the locking element 71. Therefore, in an area near the building, the variation in the signal strength of the first signal detected by the terminal device may not be particularly uniform.

For example, when a person approaches the locking element 71 from point a through B, C, D, E, F, the signal strength detected by the handheld terminal device is 0.005, 0.02, 0.03, 0.08, 0.3, 0.6 in sequence, because the first signal emitted from the locking element 71 passes through the building and is shielded, which affects the detected signal strength. If there is no shelter in the park, the signal strength detected by the terminal device may be 0.1, 0.2, 0.3, 0.42, 0.53, 0.61 in sequence, and the change is relatively uniform.

Even if there is a user attacking the lock, for example, amplifying the first signal emitted from the lock 71, the holder of the terminal device passes through a1, B1, C1, D1, E1, and F1, and the signal strengths are detected to be 0.2, 0.3, 0.41, 0.52, 0.63, and 0.71 in this order. Although the signal intensity is increased in sequence, the signal intensity is changed uniformly, and a shield is arranged around the locking piece 71, when the terminal equipment approaches the locking piece 71, the signal intensity is changed non-uniformly, so that the environment where the locking piece 71 is located cannot be restored accurately although the locking piece 71 is attacked.

When carrying out the model training, through gathering the signal strength when multiunit terminal equipment is close to latch fitting 71 gradually, train the model of predetermineeing for it possesses the judgement ability to predetermine the model. Then, after the signal intensities at different moments are input into the preset model, the preset model can judge the similarity degree of the signal intensities and the signal intensities of the samples in the training sample. Therefore, adopt the scheme of this application, even there is the user to attack the latch fitting for terminal equipment can examine first signal in a distance, but hardly restores the distribution characteristic of the peripheral first signal of latch fitting, unblanks when consequently can avoiding the latch fitting to be attacked, has improved the security.

And S36, the terminal equipment judges whether the probability of the lock being attacked is less than or equal to the preset probability, if so, S37 is executed, and if not, S38 is executed.

The preset probability is a preset numerical value and is a numerical value between 0 and 1. For example, it may be set to 0.4, 0.5, 0.6, etc

And S37, the terminal equipment controls the lock to unlock.

If the probability that the locking piece is attacked is smaller than or equal to the preset probability, an unlocking instruction is sent to the locking piece, and the unlocking instruction is used for indicating the locking piece to unlock.

When the probability that the locking piece is attacked is smaller than or equal to the preset probability, the locking piece is indicated to be possibly not attacked, and the terminal equipment can control the locking piece to be unlocked.

And S38, the terminal equipment informs the user, and the user decides whether to unlock.

When the probability that the locking piece is attacked is larger than the preset probability, the locking piece is shown to be possibly attacked, the indication information input by the user is received at the moment, and whether the locking piece is unlocked or not is determined according to the indication information. When the probability that the latch fitting is attacked is greater than the preset probability, the user can be prompted through the terminal device, if the user wants to unlock, the user controls the unlocking of the latch fitting through the control terminal device, and if the user does not want to unlock, the user does not unlock the latch fitting through the control terminal device. Furthermore, if the probability that the locking piece is attacked is high, the alarm function can be performed through the terminal equipment.

And S39, inputting a plurality of signal intensities into a preset model for learning.

Optionally, after the probability that the locking element is attacked is obtained, the preset model can be updated according to the plurality of signal strengths and the probability that the locking element is attacked.

Specifically, if the probability that the locking piece is attacked is greater than the preset probability, it is determined that the locking piece is attacked, a group of training samples are formed by the signal intensities and the sample attack probability at the moment, the sample attack probability is 1, then the group of training samples are used for training the preset model again, and the parameters of the preset model are adjusted.

If the probability that the locking piece is attacked is smaller than or equal to the preset probability, determining that the locking piece is not attacked, forming a group of training samples by using the signal intensities and the sample attack probability, wherein the sample attack probability is 0, then training the preset model again by using the group of training samples, and adjusting the parameters of the preset model.

Through continuous learning and updating, the probability obtained by the preset model when judging whether the locking piece is attacked is more and more accurate.

The passive authorization control method provided by the embodiment of the application includes the steps that a plurality of signal strengths of first signals received by terminal equipment at different moments are obtained, wherein the first signals are sent by a locking piece, and when the terminal equipment detects the first signals, the fact that the distance between the terminal equipment and the locking piece is possibly close or the situation that the locking piece is attacked can occur. At this time, a plurality of signal strengths of the first signal are recorded to prepare for subsequently judging whether the locking piece is attacked or not. Then, input a plurality of signal strength to preset model, wherein, preset model is obtained to multiunit training sample study, and every group training sample includes the sample signal strength and the sample attack probability of latch fitting transmission signal, through the study to training sample, preset model possesses the judgement ability to after inputting a plurality of signal strength to preset model, can obtain the probability that the latch fitting is attacked, and then whether unblock latch fitting according to the probability decision that the latch fitting is attacked. According to the scheme of the embodiment of the application, after the terminal device detects the first signal, the probability that the locking piece is attacked can be obtained according to a plurality of signal strengths of the first signal, so that whether unlocking operation is executed or not is determined, the unlocking operation is avoided being executed when the locking piece is attacked, and a large safety risk is caused. Furthermore, the scheme provided by the embodiment of the application only needs to acquire signal strength data, does not need special devices such as mechanical, electronic appliances or radio antennas, can realize the function of preventing attack based on software, is low in arrangement cost, can use general computing equipment such as a mobile phone and the like with a wireless communication function, can reflect the possibility of the attack risk of a user when a lock piece is detected to be attacked, and meanwhile learns and predicts whether the terminal equipment is a familiar space and a familiar mode when approaching the lock piece through a machine learning method, so that an attacker is difficult to attack successfully, and the security of a passive authorization system is higher.

Fig. 8 is a schematic structural diagram of a passive authorization control device according to an embodiment of the present application, and as shown in fig. 8, the passive authorization control device includes an obtaining module 81 and a processing module 82, where:

the obtaining module 81 is configured to obtain a plurality of signal strengths of a first signal received by the terminal device at different times, where the first signal is sent by the locking component;

the processing module 82 is configured to input the plurality of signal strengths to a preset model, obtain a probability that the lock is attacked, and determine whether to unlock the lock according to the probability that the lock is attacked;

the preset model is obtained by learning a plurality of groups of training samples, and each group of training samples comprises the sample signal strength and the sample attack probability of the lock piece transmitting signals.

In a possible implementation manner, the processing module 82 is specifically configured to:

arranging the signal intensities according to the time corresponding to each signal intensity to obtain a plurality of arranged signal intensities;

and inputting the arranged signal intensities into the preset model to obtain the probability of the lock piece being attacked.

In a possible implementation manner, the processing module 82 is specifically configured to:

if the probability that the locking piece is attacked is smaller than or equal to the preset probability, an unlocking instruction is sent to the locking piece, and the unlocking instruction is used for indicating the locking piece to unlock;

otherwise, receiving indication information input by a user, and determining whether to unlock the locking piece according to the indication information.

In one possible implementation, the number of the plurality of signal strengths is equal to the number of the plurality of sample signal strengths included in each set of training samples; the acquisition module is specifically configured to:

performing a first operation, the first operation comprising: acquiring the ith signal intensity of the first signal and the time corresponding to the ith signal intensity; initially, i is 1, i is an integer greater than or equal to 1;

performing a second operation, the second operation comprising: judging whether the ith signal intensity is greater than or equal to the preset signal intensity, if not, updating i to be i + 1;

repeatedly executing the first operation and the second operation until the ith signal intensity is greater than or equal to the preset signal intensity, and outputting the first i signal intensities of the first signal;

if i is larger than n, sampling the first i signal intensities to obtain n signal intensities;

if i is smaller than n, performing interpolation processing on the previous i signal intensities to obtain n signal intensities.

In a possible implementation manner, the obtaining module 81 is further configured to, when performing sample signal strength collection, obtain a first signal strength of a first signal received by the terminal device when instructing the lock to unlock;

determining the preset signal strength according to at least one first signal strength;

or the like, or, alternatively,

when the distance between the terminal equipment and the locking piece is within a preset distance range, acquiring a plurality of second signal strengths of a first signal received by the terminal equipment;

and obtaining the preset signal intensity according to the plurality of second signal intensities.

In one possible implementation, the processing module 82 is further configured to:

updating the preset model according to the signal strengths and the probability of the lock being attacked.

The apparatus provided in the embodiment of the present application may be configured to implement the technical solution of the method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.

Fig. 9 is a schematic structural diagram of a passive authorization system according to an embodiment of the present application, as shown in fig. 9, including a terminal device 91 and a lock 92, where:

the lock 92 is used for transmitting a first signal;

the terminal device 91 is configured to process the first signal according to any one of the above-mentioned embodiments.

The locking element 92 corresponds to a device to be authorized in the passive authorization system, and the locking element 92 stably emits a first signal outward. Lock 92 may be a vehicle lock, door lock, computer lock, or the like. The terminal device 91 is a device capable of controlling the locking piece to lock or unlock, and the terminal device 91 may be a car key, an entrance guard card, a mobile phone, or the like.

Terminal equipment 91 acquires the signal strength of the first signal received at different times after detecting the first signal transmitted by lock 92, and then obtains the probability that lock 92 is attacked according to a plurality of signal strengths at different times. And finally, determining whether to unlock the lock according to the probability of the lock being attacked. The method executed by the terminal device 91 is described in detail in the above embodiment, and is not described herein again.

Fig. 10 is a schematic hardware structure diagram of a passive authorization control device provided in an embodiment of the present application, and as shown in fig. 10, the passive authorization control device includes: at least one processor 101 and a memory 102. The processor 101 and the memory 102 are connected by a bus 103.

Optionally, the model determination further comprises a communication component. For example, the communication component may include a receiver and/or a transmitter.

In a specific implementation, the at least one processor 101 executes computer-executable instructions stored by the memory 102, causing the at least one processor 101 to perform the passive authorization control method as described above.

For a specific implementation process of the processor 101, reference may be made to the above method embodiments, which implement the principle and the technical effect similarly, and this embodiment is not described herein again.

In the embodiment shown in fig. 10, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.

The memory may comprise high speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.

The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.

The present application also provides a computer-readable storage medium, in which computer-executable instructions are stored, and when a processor executes the computer-executable instructions, the passive authorization control method as described above is implemented.

The computer-readable storage medium may be implemented by any type of volatile or non-volatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. Readable storage media can be any available media that can be accessed by a general purpose or special purpose computer.

An exemplary readable storage medium is coupled to the processor such the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Of course, the processor and the readable storage medium may also reside as discrete components in the apparatus.

The division of the units is only a logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.

The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.

In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.

The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.

Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

26页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种多链路主机与天线单网卡连接的方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!