CN111444498B - Unlocking method and shared service system - Google Patents

Unlocking method and shared service system Download PDF

Info

Publication number
CN111444498B
CN111444498B CN202010230588.5A CN202010230588A CN111444498B CN 111444498 B CN111444498 B CN 111444498B CN 202010230588 A CN202010230588 A CN 202010230588A CN 111444498 B CN111444498 B CN 111444498B
Authority
CN
China
Prior art keywords
unlocking
password
service providing
providing end
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010230588.5A
Other languages
Chinese (zh)
Other versions
CN111444498A (en
Inventor
王昌鹏
陈晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qisheng Technology Co Ltd
Original Assignee
Beijing Qisheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qisheng Technology Co Ltd filed Critical Beijing Qisheng Technology Co Ltd
Priority to CN202010230588.5A priority Critical patent/CN111444498B/en
Publication of CN111444498A publication Critical patent/CN111444498A/en
Application granted granted Critical
Publication of CN111444498B publication Critical patent/CN111444498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides an unlocking method and a shared service system, firstly, a server receives a use request sent by a service request end and generates a first unlocking password according to the receiving time of the use request; secondly, the server returns the first unlocking password to the service request end so that the service request end sends an unlocking request carrying the first unlocking password to the service providing end; and finally, the service providing end verifies the first unlocking password by utilizing the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked. According to the method and the device for generating the first dynamic unlocking password, the dynamic first unlocking password can be generated according to the receiving time of the using request, and even if the unlocking password is intercepted, the control right of the sharing terminal cannot be obtained, so that the safety is high.

Description

Unlocking method and shared service system
Technical Field
The present application relates to the field of computer technologies, and in particular, to an unlocking method and a shared service system.
Background
With the continuous progress of technology, the popularity and the utilization rate of sharing services such as sharing bicycles, sharing automobiles, sharing charging treasures and the like are also increasing, and the sharing services become an indispensable part of life of people. In general, a user needs to request an unlocking password of a sharing terminal from a server through a client of a sharing service, the client sends the password to the sharing terminal through a bluetooth mode or the like, the sharing terminal verifies the unlocking password, and after verification is successful, the user can unlock the sharing terminal.
Disclosure of Invention
Accordingly, an object of the present application is to provide an unlocking method and a shared service system, which can prevent the control right of a shared terminal from being stolen and improve the security of the shared service system.
In a first aspect, an embodiment of the present application provides an unlocking method, which is applied to a shared service system, where the shared service system includes a service providing end and a server, and the method includes:
the server receives a use request sent by a service request end and generates a first unlocking password according to the receiving time of the use request;
the server returns the first unlocking password to the service request end so that the service request end sends an unlocking request carrying the first unlocking password to the service providing end;
and the service providing end verifies the first unlocking password by utilizing the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, the service providing end is unlocked.
In one possible implementation manner, the server receives a use request sent by a service request end, and generates a first unlocking password according to a receiving time of the use request, where the first unlocking password includes:
The server determines an initial unlocking password according to the identity of the service providing end carried in the use request;
the server selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time;
and the server adjusts the initial unlocking password according to the target password calculation rule so as to generate the first unlocking password.
In one possible implementation manner, the server receives a use request sent by a service request end, and generates a first unlocking password according to a receiving time of the use request, where the first unlocking password includes:
the server selects a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
the server adjusts the initial unlocking passwords by using each target password calculation rule respectively so as to generate a plurality of first unlocking passwords;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
And the service providing end respectively verifies each first unlocking password by utilizing the unlocking verification information generated by the receiving time, and if at least one first unlocking password passes the verification, the service providing end is unlocked.
In one possible embodiment, the method further comprises:
the server generates unlocking verification information carrying the first unlocking password and sends the unlocking verification information to the service providing end;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end compares the first unlocking password with the unlocking verification information, and if the first unlocking password carried by the unlocking request is consistent with the first unlocking password carried by the unlocking verification information, the service providing end determines that the verification is successful and unlocks the service providing end.
In a possible implementation manner, the unlocking request further carries the receiving time;
the method further comprises the steps of:
the service providing end selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request;
The service providing end adjusts an initial unlocking password corresponding to the service providing end according to a target password calculation rule so as to generate unlocking verification information carrying a second unlocking password;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end compares the first unlocking password with the second unlocking password in the unlocking verification information, and if the first unlocking password is consistent with the second unlocking password carried by the unlocking verification information, the service providing end determines that the verification is successful and unlocks the service providing end.
In a possible implementation manner, the service providing end selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request, including:
the service providing end selects a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
The service providing end adjusts the initial unlocking password corresponding to the service providing end according to a target password calculation rule to generate the unlocking verification information carrying the second unlocking password, and the method comprises the following steps:
the service providing end adjusts the initial unlocking password corresponding to the service providing end by using each target password calculation rule so as to generate a plurality of unlocking verification information carrying second unlocking passwords;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end respectively verifies the first unlocking password by using the second unlocking password carried by each unlocking verification message, and if at least one verification success exists, the service providing end is unlocked.
In one possible implementation manner, when the number of the first unlocking passwords is multiple, the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, including:
For each second unlocking password, the service providing end respectively verifies each first unlocking password by using the second unlocking password;
and if at least one verification is successful, unlocking the service providing end.
In a second aspect, an embodiment of the present application further provides another unlocking method, applied to a server, where the method includes:
receiving a use request sent by a service request end, and generating a first unlocking password according to the receiving time of the use request;
and returning the first unlocking password to the service request end, so that the service request end sends an unlocking request carrying the first unlocking password to a service providing end, and further the service providing end verifies the first unlocking password by utilizing the unlocking verification information generated by the receiving time, and the service providing end is unlocked when verification passes.
In one possible implementation manner, the receiving the use request sent by the service request end, and generating the first unlocking password according to the receiving time of receiving the use request, includes:
determining an initial unlocking password according to the identity of the service provider carried in the use request;
Selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time;
and adjusting the initial unlocking password according to the target password calculation rule to generate the first unlocking password.
In one possible implementation manner, the receiving the use request sent by the service request end, and generating the first unlocking password according to the receiving time of receiving the use request, includes:
selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
and respectively using each target password calculation rule to adjust the initial unlocking password so as to generate a plurality of first unlocking passwords.
In one possible embodiment, the method further comprises:
generating unlocking verification information carrying the first unlocking password, and sending the unlocking verification information to the service providing end, so that the service providing end verifies the first unlocking password in the unlocking request sent by the service request end according to the unlocking verification information carrying the first unlocking password.
In a third aspect, an embodiment of the present application further provides an unlocking method, applied to a service provider, including:
receiving an unlocking request carrying a first unlocking password sent by a service request terminal; the first unlocking password is generated by the server according to the receiving time of the sent use request by the service request end;
and verifying the first unlocking password by using the unlocking verification information generated by the receiving time, and unlocking the service providing end if the first unlocking password passes the verification.
In one possible embodiment, the number of the first unlocking passwords is a plurality;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and respectively verifying each first unlocking password by utilizing the unlocking verification information generated by the receiving time, and unlocking the service providing end if at least one first unlocking password passes the verification.
In one possible embodiment, the method further comprises:
receiving unlocking verification information carrying the first unlocking password, which is sent by the server;
The verifying the first unlocking password by using the unlocking verification information generated by the receiving time includes:
and comparing the first unlocking password with the unlocking verification information, if the first unlocking password carried by the unlocking request is consistent with the first unlocking password carried by the unlocking verification information, determining that the verification is successful, and unlocking the service providing end.
In a possible implementation manner, the unlocking request further carries the receiving time;
the method further comprises the steps of:
selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request;
adjusting an initial unlocking password corresponding to the service providing end according to a target password calculation rule to generate unlocking verification information carrying a second unlocking password;
the verifying the first unlocking password by using the unlocking verification information generated by the receiving time includes:
comparing the first unlocking password with the second unlocking password in the unlocking verification information, if the first unlocking password is consistent with the second unlocking password carried by the unlocking verification information, determining that verification is successful, and unlocking the service providing end.
In a possible implementation manner, the selecting, according to the receiving time carried by the unlocking request, a target password calculation rule from a plurality of candidate password calculation rules includes:
selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
the step of adjusting the initial unlocking password corresponding to the service providing end according to the target password calculation rule to generate the unlocking verification information carrying the second unlocking password comprises the following steps:
respectively using each target password calculation rule to adjust an initial unlocking password corresponding to the service providing end so as to generate a plurality of unlocking verification information carrying second unlocking passwords;
the step of verifying the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, unlocking the service providing end comprises the following steps:
and verifying the first unlocking password by using a second unlocking password carried by each unlocking verification message, and unlocking the service provider if at least one verification success exists.
In one possible implementation manner, when the number of the first unlocking passwords is multiple, the unlocking verification information generated by using the receiving time verifies the first unlocking password, and if the verification is passed, unlocking the service provider includes:
for each second unlocking password, respectively verifying each first unlocking password by using the second unlocking password;
and if at least one verification is successful, unlocking the service providing end.
In a fourth aspect, an embodiment of the present application further provides an unlocking method, applied to a service request end, where the method includes:
sending a use request to a server so that the server generates a first unlocking password according to the receiving time of the use request;
receiving the first unlocking password returned by the server and generating an unlocking request carrying the first unlocking password;
and sending the unlocking request to a service providing end so that the service providing end can verify the first unlocking password by using the unlocking verification information generated by the receiving time, and unlocking the service providing end if the first unlocking password passes the verification.
In a possible implementation manner, the generating the unlocking request carrying the first unlocking password includes:
Generating an unlocking request carrying the first unlocking password and the receiving time;
the step of sending the unlocking request to a service providing end, so that the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, unlocking the service providing end comprises the following steps:
and sending the unlocking request to a service providing end, so that the service providing end can generate unlocking verification information according to the receiving time, verifying the first unlocking password by utilizing the unlocking verification information, and unlocking the service providing end if the first unlocking password passes the verification.
In a fifth aspect, an embodiment of the present application further provides a shared service system, including a server and a service providing end, where:
the server is used for receiving a use request sent by a service request end and generating a first unlocking password according to the receiving time of the use request;
the server is further configured to return the first unlocking password to the service request end, so that the service request end sends an unlocking request carrying the first unlocking password to the service provider end;
The service providing end is used for verifying the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, the service providing end is unlocked.
In one possible implementation manner, when the server receives a use request sent by a service request end and generates a first unlocking password according to a receiving time of the use request, the method is specifically used for:
determining an initial unlocking password according to the identity of the service provider carried in the use request;
selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time;
and adjusting the initial unlocking password according to the target password calculation rule to generate the first unlocking password.
In one possible implementation manner, when receiving a use request sent by a service request end, the server is specifically configured to, when generating a first unlock code according to a time of receiving the use request:
the server selects a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
The server adjusts the initial unlocking passwords by using each target password calculation rule respectively so as to generate a plurality of first unlocking passwords;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, the service providing end is specifically used for unlocking when the service providing end:
and respectively verifying each first unlocking password by utilizing the unlocking verification information generated by the receiving time, and unlocking the service providing end if at least one first unlocking password passes the verification.
In a possible implementation manner, the server is further configured to generate unlock verification information carrying the first unlock code, and send the unlock verification information to the service provider;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, the service providing end is specifically used for unlocking when the service providing end:
and comparing the first unlocking password with the unlocking verification information, if the first unlocking password carried by the unlocking request is consistent with the first unlocking password carried by the unlocking verification information, determining that the verification is successful, and unlocking the service providing end.
In a possible implementation manner, the unlocking request further carries the receiving time;
the service provider is further configured to:
selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request;
adjusting an initial unlocking password corresponding to the service providing end according to a target password calculation rule to generate unlocking verification information carrying a second unlocking password;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end compares the first unlocking password with the second unlocking password in the unlocking verification information, and if the first unlocking password is consistent with the second unlocking password carried by the unlocking verification information, the service providing end determines that the verification is successful and unlocks the service providing end.
In one possible implementation manner, when the service provider selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request, the service provider is specifically configured to:
Selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
the service providing terminal adjusts the initial unlocking password corresponding to the service providing terminal according to the target password calculation rule so as to generate the unlocking verification information carrying the second unlocking password, and the method is specifically used for:
respectively using each target password calculation rule to adjust an initial unlocking password corresponding to the service providing end so as to generate a plurality of unlocking verification information carrying second unlocking passwords;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, the service providing end is specifically used for unlocking when the service providing end:
and verifying the first unlocking password by using a second unlocking password carried by each unlocking verification message, and unlocking the service provider if at least one verification success exists.
In one possible implementation manner, when the number of the first unlocking passwords is multiple, the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, including:
For each second unlocking password, the service providing end respectively verifies each first unlocking password by using the second unlocking password;
and if at least one verification is successful, unlocking the service providing end.
In a sixth aspect, an embodiment of the present application further provides an unlocking apparatus, configured to be used in a server, including:
the first generation module is used for receiving a use request sent by a service request end and generating a first unlocking password according to the receiving time of the use request;
the first sending module is used for returning the first unlocking password to the service request end so that the service request end sends an unlocking request carrying the first unlocking password to the service providing end, and further the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and the service providing end is unlocked when verification passes.
In one possible implementation manner, the first generating module is specifically configured to:
determining an initial unlocking password according to the identity of the service provider carried in the use request;
selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time;
And adjusting the initial unlocking password according to the target password calculation rule to generate the first unlocking password.
In one possible implementation manner, the first generating module is specifically configured to:
selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
and respectively using each target password calculation rule to adjust the initial unlocking password so as to generate a plurality of first unlocking passwords.
In a possible implementation manner, the apparatus further includes a third generating module, where the third generating module is configured to:
generating unlocking verification information carrying the first unlocking password, and sending the unlocking verification information to the service providing end, so that the service providing end verifies the first unlocking password in the unlocking request sent by the service request end according to the unlocking verification information carrying the first unlocking password.
In a seventh aspect, an embodiment of the present application further provides another unlocking device, configured to be used at a service providing end, including:
The first receiving module is used for receiving an unlocking request which is sent by the service request terminal and carries a first unlocking password; the first unlocking password is generated by the server according to the receiving time of the sent use request by the service request end;
and the verification module is used for verifying the first unlocking password by utilizing the unlocking verification information generated by the receiving time, and unlocking the service providing end if the verification is passed.
In one possible embodiment, the number of the first unlocking passwords is a plurality;
the verification module is specifically configured to:
and respectively verifying each first unlocking password by utilizing the unlocking verification information generated by the receiving time, and unlocking the service providing end if at least one first unlocking password passes the verification.
In a possible embodiment, the apparatus further comprises a second receiving module for:
receiving unlocking verification information carrying the first unlocking password, which is sent by the server;
the verification module is specifically configured to:
and comparing the first unlocking password with the unlocking verification information, if the first unlocking password carried by the unlocking request is consistent with the first unlocking password carried by the unlocking verification information, determining that the verification is successful, and unlocking the service providing end.
In a possible implementation manner, the apparatus further includes a fourth generating module, configured to:
selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request;
adjusting an initial unlocking password corresponding to the service providing end according to a target password calculation rule to generate unlocking verification information carrying a second unlocking password;
the verification module is specifically configured to:
comparing the first unlocking password with the second unlocking password in the unlocking verification information, if the first unlocking password is consistent with the second unlocking password carried by the unlocking verification information, determining that verification is successful, and unlocking the service providing end.
In one possible implementation manner, the fourth generating module is specifically configured to:
selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
respectively using each target password calculation rule to adjust an initial unlocking password corresponding to the service providing end so as to generate a plurality of unlocking verification information carrying second unlocking passwords;
The verification module is specifically configured to:
and verifying the first unlocking password by using a second unlocking password carried by each unlocking verification message, and unlocking the service provider if at least one verification success exists.
In one possible implementation manner, when the number of the first unlocking passwords is a plurality, the verification module is specifically configured to:
for each second unlocking password, respectively verifying each first unlocking password by using the second unlocking password;
and if at least one verification is successful, unlocking the service providing end.
In an eighth aspect, an embodiment of the present application further provides an unlocking apparatus, configured to serve a request end, including:
the second sending module is used for sending a use request to the server so that the server generates a first unlocking password according to the receiving time of the use request;
the second generation module is used for receiving the first unlocking password returned by the server and generating an unlocking request carrying the first unlocking password;
and the third sending module is used for sending the unlocking request to a service providing end so that the service providing end can verify the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, the service providing end is unlocked.
In one possible implementation manner, the second generating module is specifically configured to:
generating an unlocking request carrying the first unlocking password and the receiving time;
the third sending module is specifically configured to:
and sending the unlocking request to a service providing end, so that the service providing end can generate unlocking verification information according to the receiving time, verifying the first unlocking password by utilizing the unlocking verification information, and unlocking the service providing end if the first unlocking password passes the verification.
In a ninth aspect, an embodiment of the present application further provides an electronic device, including: the system comprises a processor, a memory and a bus, wherein the memory stores machine-readable instructions executable by the processor, when the electronic device is running, the processor and the memory are communicated through the bus, and the machine-readable instructions are executed by the processor to perform the steps of the unlocking method.
In a tenth aspect, embodiments of the present application also provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the unlocking method as described above.
The embodiment of the application provides an unlocking method, an unlocking device and a shared service system, wherein firstly, a server receives a use request sent by a service request end and generates a first unlocking password according to the receiving time of the use request; secondly, the server returns the first unlocking password to the service request end so that the service request end sends an unlocking request carrying the first unlocking password to the service providing end; and finally, the service providing end verifies the first unlocking password by utilizing the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked. According to the method and the device for generating the first dynamic unlocking password, the dynamic first unlocking password can be generated according to the receiving time of the using request, and even if the unlocking password is intercepted, the control right of the sharing terminal cannot be obtained, so that the safety is high.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of a shared service system according to an embodiment of the present application;
FIG. 2 is a flowchart of an unlocking method according to an embodiment of the present application;
FIG. 3 is a flowchart of another unlocking method according to an embodiment of the present application;
FIG. 4 is a flowchart of yet another unlocking method according to an embodiment of the present application;
FIG. 5 is a flowchart of yet another unlocking method provided by an embodiment of the present application;
fig. 6 is a schematic structural diagram of an unlocking device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another unlocking device according to an embodiment of the present application;
fig. 8 is a schematic structural view of still another unlocking device according to an embodiment of the present application;
fig. 9 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described with reference to the accompanying drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for the purpose of illustration and description only and are not intended to limit the scope of the present application. In addition, it should be understood that the schematic drawings are not drawn to scale. A flowchart, as used in this disclosure, illustrates operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be implemented out of order and that steps without logical context may be performed in reverse order or concurrently. Moreover, one or more other operations may be added to or removed from the flow diagrams by those skilled in the art under the direction of the present disclosure.
In addition, the described embodiments are only some, but not all, embodiments of the application. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present application.
In order to enable a person skilled in the art to use the present disclosure, the following embodiments are given in connection with a specific application scenario "unlock a shared terminal in a shared service system". It will be apparent to those having ordinary skill in the art that the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the application. While the present application is primarily described in terms of an incentive resource configuration in a service site, it should be understood that this is but one exemplary embodiment.
It should be noted that the term "comprising" will be used in embodiments of the application to indicate the presence of the features stated hereafter, but not to exclude the addition of other features.
One aspect of the present application relates to a shared services system. The shared service system can generate a dynamic unlocking password through the server according to the time of receiving the application for use, so as to unlock the service providing end, and can ensure that the control right of the service providing end is not acquired by a third party under the condition that the unlocking password is intercepted, thereby having higher safety.
It is noted that, before the present application applies, the user needs to request the unlocking password of the sharing terminal from the server through the client of the sharing service, the client sends the password to the sharing terminal through bluetooth or other modes, the sharing terminal verifies the unlocking password, and after the verification is successful, the unlocking is performed, and the user can use the sharing terminal. However, the password agreed between the shared terminal and the server is usually a static password, the static password needs to be transmitted from the server to the client and then transmitted from the client to the shared terminal, in the process of multiple transmissions, the unlocking password is easy to be stolen by a third party, and the third party can control the shared terminal at any time after stealing the unlocking password, so that the security is low.
Fig. 1 is a schematic structural diagram of a shared service system according to an embodiment of the present application. The shared services system includes a server that may include one or more of a server 110, a network 120, a service request terminal 130, a service provider 140, and a database 150.
In some embodiments, server 110 may include a processor. The processor may process information and/or data related to the service request to perform one or more of the functions described in the present application. For example, the processor may determine a service order based on a service request obtained from the service requester 130 and configure resources at the service provider 140. In some embodiments, a processor may include one or more processing cores (e.g., a single core processor (S) or a multi-core processor (S)). By way of example only, the Processor may include a central processing unit (Central Processing Unit, CPU), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), special instruction set Processor (Application Specific Instruction-set Processor, ASIP), graphics processing unit (Graphics Processing Unit, GPU), physical processing unit (Physics Processing Unit, PPU), digital signal Processor (Digital Signal Processor, DSP), field programmable gate array (Field Programmable Gate Array, FPGA), programmable logic device (Programmable Logic Device, PLD), controller, microcontroller unit, reduced instruction set computer (Reduced Instruction Set Computing, RISC), microprocessor, or the like, or any combination thereof.
In some embodiments, the device type corresponding to the service request end 130 and the service providing end 140 may be a mobile device, for example, may include a smart home device, a wearable device, a smart mobile device, a virtual reality device, or an augmented reality device, and may also be a tablet computer, a laptop computer, or a built-in device in a motor vehicle, and so on.
In some embodiments, database 150 may be connected to network 120 to communicate with one or more components in a shared services system (e.g., server 110, service requester 130, service provider 140, etc.). One or more components in the shared services system may access data or instructions stored in database 150 via network 120. In some embodiments, database 150 may be directly connected to one or more components in the shared services system, or database 150 may be part of server 110.
The resource allocation method provided by the embodiment of the present application is described in detail below with reference to the description of the shared service system shown in fig. 1.
Referring to fig. 2, fig. 2 is a flowchart of an unlocking method provided in an embodiment of the present application, where the unlocking method may be executed by one or more processors in a shared service system, and as described in fig. 2, the specific execution process is as follows:
S201, the server receives a use request sent by a service request end, and generates a first unlocking password according to the receiving time of the use request.
In the step, a user can send a use request for a service providing end to a server through a service request end, the use request can include an identity of the service providing end and an identity corresponding to the user, after receiving the use request, the server can determine whether to respond to the use request according to the identity corresponding to the user, and after determining to respond, the server can generate a first unlocking password according to the receiving time of the use request.
Wherein, since the first unlocking password is determined according to the receiving time of the use request, the first unlocking password is a dynamic password. The first unlocking password may be a one-time password (One Time Password, abbreviated as OTP) for example, which is valid for a preset period of time, and is disabled after a preset period of time, and the number of valid uses is one, and the first unlocking password is disabled once the service provider is unlocked by using the first unlocking password.
Each service provider may correspond to an initial unlock code and a plurality of candidate code calculation rules, and the server may determine the initial unlock code and the plurality of candidate code calculation rules of the service provider according to the identity of the service provider carried by the use request, select a target code calculation rule from the plurality of candidate code calculation rules according to the receiving time of the use request, and adjust the initial unlock code according to the target code calculation rule, so as to obtain the first unlock code.
Wherein, there may be a correspondence between the time of receipt and the candidate cryptographic calculation rule. For example, a day can be divided into a plurality of time periods, the time length of each time period can be several minutes, tens of seconds, and the like, each time period corresponds to a candidate password calculation rule, and the candidate password calculation rules of each day are different, so that the obtained first unlocking password cannot be predicted, cannot be reused after interception, and the safety of a service provider is ensured.
The service providing terminal may be a sharing terminal, such as a sharing bicycle, a sharing automobile, a sharing charger, etc. The service providing end can communicate with the service request end in a Bluetooth mode, a local area network mode and the like; the service request end can be an intelligent terminal held by a user, and can be communicated with a server and a service providing end; the server may also communicate with the service provider.
S202, the server returns the first unlocking password to the service request end, so that the service request end sends an unlocking request carrying the first unlocking password to the service providing end.
In the step, after the server generates the first unlocking password, the first unlocking password can be sent to the service request end, and after the service request end receives the first unlocking password, an unlocking request with the first unlocking password is generated and sent to the service providing end.
The unlocking request is used for identity authentication of the service provider to the service provider, and the first unlocking password in the unlocking request is obtained from the server, so that the unlocking request can be used for verifying whether the user uses the service provider legally.
And S203, the service providing end verifies the first unlocking password by utilizing the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked.
In this step, after receiving the unlocking request, the service provider may verify the first unlocking password in the unlocking request, so as to implement authentication of the user. Specifically, since the first unlock code is generated according to the reception time of the use request received by the server, the first unlock code can be verified using the unlock verification information generated according to the reception time.
The unlocking verification information may be generated by a server or by a service provider. Under the condition that the server generates the unlocking verification information, the server can send the unlocking verification information to the service providing end, so that the service providing end can verify the first unlocking password by using the unlocking verification information.
The unlocking verification information may include a first unlocking password, where the first unlocking password in the unlocking verification information is the same as the first unlocking password provided by the server, and is determined according to the receiving time. When the first unlocking password in the unlocking verification information is consistent with the first unlocking password in the unlocking request, verification passing can be determined, after the verification passing is determined, the service providing end can control the service providing end to enter an unlocking state, and at the moment, a user can use the service providing end to perform operations such as traveling and charging the intelligent terminal.
According to the unlocking method provided by the embodiment of the application, firstly, a server receives a use request sent by a service request end and generates a first unlocking password according to the receiving time of the use request; secondly, the server returns the first unlocking password to the service request end so that the service request end sends an unlocking request carrying the first unlocking password to the service providing end; and finally, the service providing end verifies the first unlocking password by utilizing the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked. According to the method and the device for generating the first dynamic unlocking password, the dynamic first unlocking password can be generated according to the receiving time of the using request, and even if the unlocking password is intercepted, the control right of the sharing terminal cannot be obtained, so that the safety is high.
In one possible implementation manner, the step S201 may include:
the server determines an initial unlocking password according to the identity of the service providing end carried in the use request;
the server selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time;
and the server adjusts the initial unlocking password according to the target password calculation rule so as to generate the first unlocking password.
The identity of the service providing end can be obtained by the service requesting end through scanning a two-dimensional code positioned on the service providing end, or can be determined by an application program on the service requesting end through the position of satellite positioning, the service requesting end can be added into a use request after obtaining the identity of the service providing end and sent to a server, and the server can determine whether a user can use the service providing end according to a user identifier carried by the use request after receiving the use request.
Specifically, the server may determine, according to the identity of the service provider, whether the service provider has sufficient battery power, whether the service provider has a fault of a whole or a component, whether the service provider is reserved, whether the service provider is in a use state, and the like, and in the case that the service provider is capable of being used, determine, according to the identity of the user, whether the user is qualified to use the service provider, for example, whether the identity level of the user satisfies the use of the service provider, whether the account balance of the user is sufficient, whether the credit level of the user satisfies the use of the service provider, and the like.
In the step of generating the first unlocking password by the server, the initial unlocking password is determined according to the identity of the service provider carried in the use request, and the initial password can be an initial unlocking password unique to the service provider. The initial unlocking password can be a character string with a preset length and can be composed of one or more of numbers, letters and symbols, and the initial unlocking password can be in accordance with a preset rule or random. For example, the initial unlocking password may include an identity of the corresponding service provider. The initial password may also be encrypted by an encryption protocol, which may exhibit its true meaning after decryption.
After the server determines the initial unlocking password, a plurality of candidate password calculation rules corresponding to the service provider can be determined, each candidate password calculation rule corresponds to a time period, the server can determine the target time period in which the receiving time is located first, and then determine the candidate password calculation rule corresponding to the target time period to obtain the target password calculation rule.
After the server determines the target password calculation rule, the initial unlocking password can be adjusted according to the target password calculation rule to obtain the first unlocking password.
The password calculation rule can be used for performing various operations and deformation on the initial unlocking password, and finally obtaining the first unlocking password. Different password calculation rules are different from each other, so that each first unlocking password can be unique for different service providers in different time periods.
It is noted that the key to whether a one-time password (dynamic password) can operate reliably is time synchronization, i.e., time synchronization between the service provider and the server. If the local time difference between the first unlocking password and the second unlocking password is too large, the first unlocking password in the unlocking verification information generated by the service providing end is necessarily different from the first unlocking password generated by the server, and at the moment, verification cannot be performed; even when the two local times differ less, verification failure may still be caused because the reception time may be near the edge of the preset period.
To solve the above problem, in one possible implementation, a first solution is provided:
the server receives a use request sent by a service request end, and generates a first unlocking password according to the receiving time of the use request, and the method comprises the following steps:
the server selects a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
The server adjusts the initial unlocking passwords by using each target password calculation rule respectively so as to generate a plurality of first unlocking passwords;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end respectively verifies each first unlocking password by utilizing the unlocking verification information generated by the receiving time, and if at least one first unlocking password passes the verification, the service providing end is unlocked.
In this step, the server may determine a plurality of time periods according to the reception time, and the determined plurality of time periods may be time periods before and after the reception time. For example, if the reception time is "32 minutes at 18 days of 1/2 in 2020", the time period corresponding to the reception time may be "30 minutes to 35 minutes at 18 days of 1/2 in 2020", the plurality of time periods determined by the server may include "30 minutes to 35 minutes at 18 days of 1/2 in 2020", "25 minutes to 30 minutes at 18 days of 1/2 in 2020", and "35 minutes to 40 minutes at 18 days of 1/2 in 2020", and the intermediate time point of the three time periods may be used as the time value of the time period, and the candidate password calculation rule corresponding to the time value may be determined as the target password calculation rule.
In this way, by determining a plurality of time values adjacent to the receiving time, and selecting a plurality of target password calculation rules according to the plurality of time values, a plurality of first unlocking passwords are finally determined, when the service providing end uses the unlocking verification information generated by the receiving time to verify each first unlocking password, the verification passing can be determined as long as one first unlocking password passes the verification, and the service providing end is unlocked.
In order to solve the above-mentioned problems, in one possible embodiment, a second solution is also provided:
the method further comprises the steps of:
the server generates unlocking verification information carrying the first unlocking password and sends the unlocking verification information to the service providing end;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end compares the first unlocking password with the unlocking verification information, and if the first unlocking password carried by the unlocking request is consistent with the first unlocking password carried by the unlocking verification information, the service providing end determines that the verification is successful and unlocks the service providing end.
In the step, the server directly generates unlocking verification information carrying the first unlocking password according to the receiving time and sends the unlocking verification information to the service providing end, and the service providing end directly verifies the first unlocking password sent by the service request end according to the received unlocking verification information.
However, since the service request end and the server need to communicate through multiple communication base stations, the delay is large, the waiting time of the user is long, and the service request end and the server cannot be fully suitable for the scenario, in one possible implementation manner, the embodiment further provides a third solution:
the unlocking request also carries the receiving time;
the method further comprises the steps of:
the service providing end selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request;
the service providing end adjusts an initial unlocking password corresponding to the service providing end according to a target password calculation rule so as to generate unlocking verification information carrying a second unlocking password;
The service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end compares the first unlocking password with the second unlocking password in the unlocking verification information, and if the first unlocking password is consistent with the second unlocking password carried by the unlocking verification information, the service providing end determines that the verification is successful and unlocks the service providing end.
In this step, after receiving the first unlock code sent by the server, the service request end may generate an unlock request that includes both the first unlock code and the receiving time, and may directly send the unlock request to the service providing end through bluetooth or other modes, where after receiving the unlock request sent by the service request end, the service providing end may generate unlock verification information according to the receiving time carried by the unlock request, and verify the first unlock code carried by the unlock request.
The data transmission between the server and the service request terminal has a small delay, but the delay is far smaller than the delay of the data transmission between the server and the service request terminal.
The second unlocking password is generated by the service providing end, the first unlocking password is generated by the server, the generation modes of the first unlocking password and the second unlocking password are the same, and under the condition that the user identity is legal, the first unlocking password and the second unlocking password are obtained through calculation according to the receiving time, so that the values of the first unlocking password and the second unlocking password are necessarily the same.
Further, in one possible implementation, the third solution may be used together with the first solution, resulting in a fourth solution:
the service providing end selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request, and the method comprises the following steps:
the service providing end selects a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
the service providing end adjusts the initial unlocking password corresponding to the service providing end according to a target password calculation rule to generate the unlocking verification information carrying the second unlocking password, and the method comprises the following steps:
The service providing end adjusts the initial unlocking password corresponding to the service providing end by using each target password calculation rule so as to generate a plurality of unlocking verification information carrying second unlocking passwords;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end respectively verifies the first unlocking password by using the second unlocking password carried by each unlocking verification message, and if at least one verification success exists, the service providing end is unlocked.
In the step, when the server generates a plurality of first unlocking passwords, the service providing end respectively verifies each first unlocking password according to the unlocking verification information, and when one first unlocking password passes verification, the verification is confirmed to pass and the unlocking is carried out. Thus, the server and the service provider do not need to communicate like in the second solution, and the verification failure problem caused by time asynchronization can be solved.
Or the service providing end can generate a plurality of unlocking verification information carrying second unlocking passwords according to the request time, the server only generates one first unlocking password, the service providing end can respectively compare each second unlocking password with the first unlocking password when verifying the first unlocking password, and when a group of unlocking passwords are consistent, the verification can be determined to pass.
Therefore, the computing resource of the server can be saved, and the system response speed is prevented from being slow or crashed due to the fact that the utilization rate of the computing resource is too high when the server processes a large amount of use requests.
In one possible implementation manner, when the number of the first unlocking passwords is multiple, the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, including:
for each second unlocking password, the service providing end respectively verifies each first unlocking password by using the second unlocking password;
and if at least one verification is successful, unlocking the service providing end.
Referring to fig. 3, fig. 3 is a flowchart of another unlocking method provided in the embodiment of the present application, the unlocking method may be performed by a server in the shared service system, and the following steps are explained in detail with reference to the method embodiment corresponding to fig. 2, which is not repeated herein. As shown in fig. 3, the specific implementation process of the method is as follows:
s301, receiving a use request sent by a service request end, and generating a first unlocking password according to the receiving time of the use request.
S302, returning the first unlocking password to the service request end, so that the service request end sends an unlocking request carrying the first unlocking password to a service providing end, and further the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and the service providing end is unlocked when verification passes.
In one possible implementation manner, the receiving the use request sent by the service request end, and generating the first unlocking password according to the receiving time of receiving the use request, includes:
determining an initial unlocking password according to the identity of the service provider carried in the use request;
selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time;
and adjusting the initial unlocking password according to the target password calculation rule to generate the first unlocking password.
In one possible implementation manner, the receiving the use request sent by the service request end, and generating the first unlocking password according to the receiving time of receiving the use request, includes:
selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
And respectively using each target password calculation rule to adjust the initial unlocking password so as to generate a plurality of first unlocking passwords.
In one possible embodiment, the method further comprises:
generating unlocking verification information carrying the first unlocking password, and sending the unlocking verification information to the service providing end, so that the service providing end verifies the first unlocking password in the unlocking request sent by the service request end according to the unlocking verification information carrying the first unlocking password.
Referring to fig. 4, fig. 4 is a flowchart of another unlocking method provided in the embodiment of the present application, the unlocking method may be performed by a service provider in a shared service system, and the following steps are explained in detail with reference to the method embodiment corresponding to fig. 2 and are not repeated herein. As shown in fig. 4, the specific implementation process of the method is as follows:
s401, receiving an unlocking request carrying a first unlocking password sent by a service request terminal; the first unlocking password is generated by the server according to the receiving time of the sent use request by the service request end.
And S402, verifying the first unlocking password by using the unlocking verification information generated by the receiving time, and unlocking the service providing end if the first unlocking password passes the verification.
In one possible embodiment, the number of the first unlocking passwords is a plurality;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and respectively verifying each first unlocking password by utilizing the unlocking verification information generated by the receiving time, and unlocking the service providing end if at least one first unlocking password passes the verification.
In one possible embodiment, the method further comprises:
receiving unlocking verification information carrying the first unlocking password, which is sent by the server;
the verifying the first unlocking password by using the unlocking verification information generated by the receiving time includes:
and comparing the first unlocking password with the unlocking verification information, if the first unlocking password carried by the unlocking request is consistent with the first unlocking password carried by the unlocking verification information, determining that the verification is successful, and unlocking the service providing end.
In a possible implementation manner, the unlocking request further carries the receiving time;
the method further comprises the steps of:
Selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request;
adjusting an initial unlocking password corresponding to the service providing end according to a target password calculation rule to generate unlocking verification information carrying a second unlocking password;
the verifying the first unlocking password by using the unlocking verification information generated by the receiving time includes:
comparing the first unlocking password with the second unlocking password in the unlocking verification information, if the first unlocking password is consistent with the second unlocking password carried by the unlocking verification information, determining that verification is successful, and unlocking the service providing end.
In a possible implementation manner, the selecting, according to the receiving time carried by the unlocking request, a target password calculation rule from a plurality of candidate password calculation rules includes:
selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
The step of adjusting the initial unlocking password corresponding to the service providing end according to the target password calculation rule to generate the unlocking verification information carrying the second unlocking password comprises the following steps:
respectively using each target password calculation rule to adjust an initial unlocking password corresponding to the service providing end so as to generate a plurality of unlocking verification information carrying second unlocking passwords;
the step of verifying the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, unlocking the service providing end comprises the following steps:
and verifying the first unlocking password by using a second unlocking password carried by each unlocking verification message, and unlocking the service provider if at least one verification success exists.
In one possible implementation manner, when the number of the first unlocking passwords is multiple, the unlocking verification information generated by using the receiving time verifies the first unlocking password, and if the verification is passed, unlocking the service provider includes:
for each second unlocking password, respectively verifying each first unlocking password by using the second unlocking password;
And if at least one verification is successful, unlocking the service providing end.
Referring to fig. 5, fig. 5 is a flowchart of another unlocking method provided in an embodiment of the present application, where the unlocking method may be performed by a service request end in a shared service system, and the following steps are explained in detail with reference to the method embodiment corresponding to fig. 2, which is not repeated herein. As shown in fig. 5, the specific implementation process of the method is as follows:
s501, sending a use request to a server so that the server generates a first unlocking password according to the receiving time of the use request.
S502, receiving the first unlocking password returned by the server, and generating an unlocking request carrying the first unlocking password.
S503, sending the unlocking request to a service providing end, so that the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, unlocking the service providing end.
In a possible implementation manner, the generating the unlocking request carrying the first unlocking password includes:
generating an unlocking request carrying the first unlocking password and the receiving time;
The step of sending the unlocking request to a service providing end, so that the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, unlocking the service providing end comprises the following steps:
and sending the unlocking request to a service providing end, so that the service providing end can generate unlocking verification information according to the receiving time, verifying the first unlocking password by utilizing the unlocking verification information, and unlocking the service providing end if the first unlocking password passes the verification.
Based on the same inventive concept, the embodiment of the application further provides an unlocking device corresponding to the unlocking method, and since the principle of solving the problem of the unlocking device in the embodiment of the application is similar to that of the unlocking method in the embodiment of the application, the implementation of the device can be referred to the implementation of the method, and the repetition is omitted.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an unlocking device according to an embodiment of the application. As shown in fig. 6, the unlocking apparatus 600 is used for a server, and includes:
the first generating module 610 is configured to receive a use request sent by a service request end, and generate a first unlock code according to a receiving time of the use request;
And the first sending module 620 is configured to return the first unlock code to the service request end, so that the service request end sends an unlock request carrying the first unlock code to a service provider end, and further, the service provider end verifies the first unlock code by using unlock verification information generated by the receiving time, and if verification passes, the service provider end is unlocked.
In one possible implementation, the first generating module 610 is specifically configured to:
determining an initial unlocking password according to the identity of the service provider carried in the use request;
selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time;
and adjusting the initial unlocking password according to the target password calculation rule to generate the first unlocking password.
In one possible implementation, the first generating module 610 is specifically configured to:
selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
And respectively using each target password calculation rule to adjust the initial unlocking password so as to generate a plurality of first unlocking passwords.
In a possible implementation manner, the unlocking device 600 further includes a third generating module 630, where the third generating module 630 is configured to:
generating unlocking verification information carrying the first unlocking password, and sending the unlocking verification information to the service providing end, so that the service providing end verifies the first unlocking password in the unlocking request sent by the service request end according to the unlocking verification information carrying the first unlocking password.
Referring to fig. 7, fig. 7 is a schematic structural diagram of another unlocking device according to an embodiment of the application. As shown in fig. 7, the unlocking device 700 is used for a service provider, and includes:
the first receiving module 710 is configured to receive an unlocking request carrying a first unlocking password sent by the service request end; the first unlocking password is generated by the server according to the receiving time of the sent use request by the service request end;
and the verification module 720 is configured to verify the first unlock code by using the unlock verification information generated by the receiving time, and unlock the service provider if the verification is passed.
In one possible embodiment, the number of the first unlocking passwords is a plurality;
the verification module 720 is specifically configured to:
and respectively verifying each first unlocking password by utilizing the unlocking verification information generated by the receiving time, and unlocking the service providing end if at least one first unlocking password passes the verification.
In a possible implementation manner, the apparatus further includes a second receiving module 740 configured to:
receiving unlocking verification information carrying the first unlocking password, which is sent by the server;
the verification module is specifically configured to:
and comparing the first unlocking password with the unlocking verification information, if the first unlocking password carried by the unlocking request is consistent with the first unlocking password carried by the unlocking verification information, determining that the verification is successful, and unlocking the service providing end.
In a possible implementation manner, the unlocking device 700 further includes a fourth generating module 730, configured to:
selecting a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request;
adjusting an initial unlocking password corresponding to the service providing end according to a target password calculation rule to generate unlocking verification information carrying a second unlocking password;
The verification module 720 is specifically configured to:
comparing the first unlocking password with the second unlocking password in the unlocking verification information, if the first unlocking password is consistent with the second unlocking password carried by the unlocking verification information, determining that verification is successful, and unlocking the service providing end.
In one possible implementation manner, the fourth generating module 730 is specifically configured to:
selecting a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
respectively using each target password calculation rule to adjust an initial unlocking password corresponding to the service providing end so as to generate a plurality of unlocking verification information carrying second unlocking passwords;
the verification module 720 is specifically configured to:
and verifying the first unlocking password by using a second unlocking password carried by each unlocking verification message, and unlocking the service provider if at least one verification success exists.
In one possible implementation, when the number of the first unlocking passwords is a plurality, the verification module 720 is specifically configured to:
For each second unlocking password, respectively verifying each first unlocking password by using the second unlocking password;
and if at least one verification is successful, unlocking the service providing end.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an unlocking device according to an embodiment of the application. As shown in fig. 8, the unlocking device 800 is used for a service request terminal, and includes:
a second sending module 810, configured to send a use request to a server, so that the server generates a first unlock code according to a time of receiving the use request;
the second generating module 820 is configured to receive the first unlock code returned by the server, and generate an unlock request carrying the first unlock code;
and a third sending module 830, configured to send the unlocking request to a service provider, so that the service provider verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, unlock the service provider.
In one possible implementation manner, the second generating module 820 is specifically configured to:
generating an unlocking request carrying the first unlocking password and the receiving time;
The third sending module 830 is specifically configured to:
and sending the unlocking request to a service providing end, so that the service providing end can generate unlocking verification information according to the receiving time, verifying the first unlocking password by utilizing the unlocking verification information, and unlocking the service providing end if the first unlocking password passes the verification.
Referring to fig. 9, fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the application. As shown in fig. 9, the electronic device 900 includes a processor 910, a memory 920, and a bus 930.
The memory 920 stores machine-readable instructions executable by the processor 910, when the electronic device 900 is running, the processor 910 communicates with the memory 920 through the bus 930, and when the machine-readable instructions are executed by the processor 910, the steps of the unlocking method in the method embodiments shown in the foregoing fig. 2, 3, 4 and 5 may be executed, and the specific implementation may refer to the method embodiments and will not be repeated herein.
The embodiment of the present application further provides a computer readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the steps of the unlocking method in the method embodiments shown in fig. 2, fig. 3, fig. 4 and fig. 5 may be executed, and the specific implementation manner may refer to the method embodiments and will not be repeated herein.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer readable storage medium executable by a processor. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that: the above examples are only specific embodiments of the present application, and are not intended to limit the scope of the present application, but it should be understood by those skilled in the art that the present application is not limited thereto, and that the present application is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (10)

1. An unlocking method, applied to a shared service system, the shared service system including a service provider and a server, the method comprising:
the server receives a use request sent by a service request end and generates a first unlocking password according to the receiving time of the use request, wherein the first unlocking password is a one-time password;
the server returns the first unlocking password to the service request end so that the service request end sends an unlocking request carrying the first unlocking password to the service providing end;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, the service providing end is unlocked;
the unlocking verification information is received by the service providing end from the server;
the first unlocking password is obtained by adjusting an initial unlocking password by the server according to a target password calculation rule, the target password calculation rule is obtained by the server from a plurality of candidate password calculation rules according to the receiving time, and the initial unlocking password is determined by the server according to an identity of a service providing end carried in the use request;
And the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value.
2. The method of claim 1, wherein the server receives a use request sent by a service request end, and generates a first unlock code according to a time of receiving the use request, including:
the server determines an initial unlocking password according to the identity of the service providing end carried in the use request;
the server selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time;
and the server adjusts the initial unlocking password according to the target password calculation rule so as to generate the first unlocking password.
3. The method according to claim 2, wherein the server receives a use request sent by a service request end, and generates a first unlock code according to a receiving time of the use request, including:
the server selects a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
The server adjusts the initial unlocking passwords by using each target password calculation rule respectively so as to generate a plurality of first unlocking passwords;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end respectively verifies each first unlocking password by utilizing the unlocking verification information generated by the receiving time, and if at least one first unlocking password passes the verification, the service providing end is unlocked.
4. The method according to claim 1, wherein the method further comprises:
the server generates unlocking verification information carrying the first unlocking password and sends the unlocking verification information to the service providing end;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end compares the first unlocking password with the unlocking verification information, and if the first unlocking password carried by the unlocking request is consistent with the first unlocking password carried by the unlocking verification information, the service providing end determines that the verification is successful and unlocks the service providing end.
5. The method of claim 1, wherein the unlock request further carries the receive time;
the method further comprises the steps of:
the service providing end selects a target password calculation rule from a plurality of candidate password calculation rules according to the receiving time carried by the unlocking request;
the service providing end adjusts an initial unlocking password corresponding to the service providing end according to a target password calculation rule so as to generate unlocking verification information carrying a second unlocking password;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end compares the first unlocking password with the second unlocking password in the unlocking verification information, and if the first unlocking password is consistent with the second unlocking password carried by the unlocking verification information, the service providing end determines that the verification is successful and unlocks the service providing end.
6. The method of claim 5, wherein the service provider selecting a target password calculation rule from a plurality of candidate password calculation rules according to the reception time carried by the unlocking request, comprises:
The service providing end selects a plurality of target password calculation rules from a plurality of candidate password calculation rules according to the receiving time and the time value corresponding to each candidate password calculation rule; the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value;
the service providing end adjusts the initial unlocking password corresponding to the service providing end according to a target password calculation rule to generate the unlocking verification information carrying the second unlocking password, and the method comprises the following steps:
the service providing end adjusts the initial unlocking password corresponding to the service providing end by using each target password calculation rule so as to generate a plurality of unlocking verification information carrying second unlocking passwords;
the service providing end verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, the service providing end is unlocked, and the method comprises the following steps:
and the service providing end respectively verifies the first unlocking password by using the second unlocking password carried by each unlocking verification message, and if at least one verification success exists, the service providing end is unlocked.
7. The method of claim 6, wherein when the number of the first unlocking passwords is plural, the service provider verifies the first unlocking password by using the unlocking verification information generated by the receiving time, and if the verification is passed, unlocking the service provider comprises:
for each second unlocking password, the service providing end respectively verifies each first unlocking password by using the second unlocking password;
and if at least one verification is successful, unlocking the service providing end.
8. The utility model provides a sharing service system which is characterized by comprising a server and a service providing end, wherein:
the server is used for receiving a use request sent by a service request end and generating a first unlocking password according to the receiving time of the use request, wherein the first unlocking password is a one-time password;
the server is further configured to return the first unlocking password to the service request end, so that the service request end sends an unlocking request carrying the first unlocking password to the service provider end;
the service providing end is used for verifying the first unlocking password by using the unlocking verification information generated by the receiving time, and if the first unlocking password passes the verification, the service providing end is unlocked;
The unlocking verification information is received by the service providing end from the server;
the first unlocking password is obtained by adjusting an initial unlocking password by the server according to a target password calculation rule, the target password calculation rule is obtained by the server from a plurality of candidate password calculation rules according to the receiving time, and the initial unlocking password is determined by the server according to an identity of a service providing end carried in the use request;
and the difference value between the time value corresponding to the target password calculation rule and the receiving time is smaller than a preset value.
9. An electronic device, comprising: a processor, a storage medium and a bus, the storage medium storing machine-readable instructions executable by the processor, the processor and the storage medium communicating over the bus when the electronic device is running, the processor executing the machine-readable instructions to perform the steps of the unlocking method of any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when executed by a processor, performs the steps of the unlocking method according to any of claims 1 to 7.
CN202010230588.5A 2020-03-27 2020-03-27 Unlocking method and shared service system Active CN111444498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010230588.5A CN111444498B (en) 2020-03-27 2020-03-27 Unlocking method and shared service system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010230588.5A CN111444498B (en) 2020-03-27 2020-03-27 Unlocking method and shared service system

Publications (2)

Publication Number Publication Date
CN111444498A CN111444498A (en) 2020-07-24
CN111444498B true CN111444498B (en) 2023-08-25

Family

ID=71652618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010230588.5A Active CN111444498B (en) 2020-03-27 2020-03-27 Unlocking method and shared service system

Country Status (1)

Country Link
CN (1) CN111444498B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113345167B (en) * 2021-04-27 2022-09-13 北京三快在线科技有限公司 Method and device for leasing shared objects in electronic cabinet and electronic equipment

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
CN104965645A (en) * 2015-05-29 2015-10-07 小米科技有限责任公司 Unlocking method and apparatus
EP2998940A1 (en) * 2014-09-19 2016-03-23 Skopei holding IP and Brands B.V. A method for hiring vehicles during a user-defined time frame, and a lock system for hiring of vehicles
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106652141A (en) * 2016-12-30 2017-05-10 北京拜克洛克科技有限公司 Unlocking method, unlocking system, and unlocking apparatus for bicycles
CN107274520A (en) * 2017-06-07 2017-10-20 北京小米移动软件有限公司 Information processing method and device
CN107835239A (en) * 2017-10-31 2018-03-23 柠创科技(深圳)有限公司 A kind of shared equipment unlocking method and system
CN107862803A (en) * 2017-10-31 2018-03-30 柠创科技(深圳)有限公司 Leased equipment unlocking method, Cloud Server, device end, equipment and system
CN107978056A (en) * 2017-12-25 2018-05-01 上海跃众文化传媒有限公司 A kind of electronic lock, electronic lock system and its unlocking method
CN107979472A (en) * 2017-12-01 2018-05-01 江苏乐希科技有限公司 A kind of coding lock system and authentication method
CN108234651A (en) * 2018-01-02 2018-06-29 京东方科技集团股份有限公司 A kind of shared vehicles management method, device, system and equipment, storage medium
CN109035499A (en) * 2018-06-30 2018-12-18 恒宝股份有限公司 A kind of electronic password lock authentication method based on dynamic password
CN109102607A (en) * 2018-08-09 2018-12-28 上海幸卓智能科技有限公司 Method for unlocking coded lock, system, equipment, coded lock and server
CN208819277U (en) * 2018-01-15 2019-05-03 东峡大通(北京)管理咨询有限公司 A kind of smart lock, server and intelligent terminal
CN110211268A (en) * 2019-06-04 2019-09-06 北京一砂信息技术有限公司 A kind of client, server, system, method and the storage medium of timeliness random cipher unlock smart lock

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10255740B2 (en) * 2016-12-28 2019-04-09 Jiangsu Hongbao Hardware Co., Ltd. Systems and methods for unlocking a lock

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101291228A (en) * 2008-06-18 2008-10-22 华为技术有限公司 Generating, authenticating method for super code, system and device thereof
EP2998940A1 (en) * 2014-09-19 2016-03-23 Skopei holding IP and Brands B.V. A method for hiring vehicles during a user-defined time frame, and a lock system for hiring of vehicles
CN104965645A (en) * 2015-05-29 2015-10-07 小米科技有限责任公司 Unlocking method and apparatus
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106652141A (en) * 2016-12-30 2017-05-10 北京拜克洛克科技有限公司 Unlocking method, unlocking system, and unlocking apparatus for bicycles
CN107274520A (en) * 2017-06-07 2017-10-20 北京小米移动软件有限公司 Information processing method and device
WO2019085423A1 (en) * 2017-10-31 2019-05-09 柠创控股有限公司 Shared device unlocking method, device, and system
CN107835239A (en) * 2017-10-31 2018-03-23 柠创科技(深圳)有限公司 A kind of shared equipment unlocking method and system
CN107862803A (en) * 2017-10-31 2018-03-30 柠创科技(深圳)有限公司 Leased equipment unlocking method, Cloud Server, device end, equipment and system
CN107979472A (en) * 2017-12-01 2018-05-01 江苏乐希科技有限公司 A kind of coding lock system and authentication method
CN107978056A (en) * 2017-12-25 2018-05-01 上海跃众文化传媒有限公司 A kind of electronic lock, electronic lock system and its unlocking method
CN108234651A (en) * 2018-01-02 2018-06-29 京东方科技集团股份有限公司 A kind of shared vehicles management method, device, system and equipment, storage medium
CN208819277U (en) * 2018-01-15 2019-05-03 东峡大通(北京)管理咨询有限公司 A kind of smart lock, server and intelligent terminal
CN109035499A (en) * 2018-06-30 2018-12-18 恒宝股份有限公司 A kind of electronic password lock authentication method based on dynamic password
CN109102607A (en) * 2018-08-09 2018-12-28 上海幸卓智能科技有限公司 Method for unlocking coded lock, system, equipment, coded lock and server
CN110211268A (en) * 2019-06-04 2019-09-06 北京一砂信息技术有限公司 A kind of client, server, system, method and the storage medium of timeliness random cipher unlock smart lock

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Carlo Galiotto ; George K. Papageorgiou ; Konstantinos Voulgaris ; M. Majid Butt ; Nicola Marchetti ; Constantinos B. Papadias.Unlocking the Deployment of Spectrum Sharing With a Policy Enforcement Framework.《IEEE Access》.2018,全文. *

Also Published As

Publication number Publication date
CN111444498A (en) 2020-07-24

Similar Documents

Publication Publication Date Title
Kumar et al. SEBAP: a secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing
CN110336774B (en) Mixed encryption and decryption method, equipment and system
CN102098317B (en) Data transmitting method and system applied to cloud system
CN109981562B (en) Software development kit authorization method and device
CN102215221A (en) Methods and systems for secure remote wake, boot, and login to a computer from a mobile device
CN109063450B (en) Control method of safe storage medium, safe storage medium and system
CN116458117A (en) Secure digital signatures
WO2010098789A1 (en) Multifactor authentication system and methodology
CN103037366A (en) Mobile terminal user authentication method and mobile terminal based on asymmetric cryptographic technique
CN111444498B (en) Unlocking method and shared service system
WO2020025056A1 (en) Method, device, system, and mobile terminal for security authorization
CN112422516B (en) Trusted connection method and device based on power edge calculation and computer equipment
CN112491559B (en) Identity verification method and device
CN112150151B (en) Secure payment method, apparatus, electronic device and storage medium
CN112182540B (en) Identity verification method and device
CN114139121A (en) Identity verification method and device, electronic equipment and computer readable storage medium
CN102647273B (en) Generation methods and devices of user root key and user key for trusted computing platform
CN102147900A (en) System and method for realizing payment
CN110557365A (en) Safe single sign-on method based on message authentication code
CN117395661B (en) Internet of vehicles identity authentication method, system, electronic equipment and medium
CN111695096B (en) Identity verification method and device
CN109067806B (en) Mobile storage-based secure communication method and system in Internet of vehicles environment
CN111431870B (en) Equipment login method and device
CN116915498B (en) Identification code hiding method based on arithmetic progression, login system and login method
CN116155625B (en) Key exchange method, device, electronic equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant