CN105844744A - Password authentication method and password lock - Google Patents

Password authentication method and password lock Download PDF

Info

Publication number
CN105844744A
CN105844744A CN201610164306.XA CN201610164306A CN105844744A CN 105844744 A CN105844744 A CN 105844744A CN 201610164306 A CN201610164306 A CN 201610164306A CN 105844744 A CN105844744 A CN 105844744A
Authority
CN
China
Prior art keywords
password
coded lock
visitors
passwords
checking
Prior art date
Application number
CN201610164306.XA
Other languages
Chinese (zh)
Inventor
胡家安
Original Assignee
成都艾德沃传感技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 成都艾德沃传感技术有限公司 filed Critical 成都艾德沃传感技术有限公司
Priority to CN201610164306.XA priority Critical patent/CN105844744A/en
Publication of CN105844744A publication Critical patent/CN105844744A/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed

Abstract

A password authentication method and a password lock are used for solving the problem that a password of a password lock is not safe due to authority limit of other persons to open the password lock. The password authentication method includes the following steps: the password lock receives a visitor password sent by a related device; the visitor password is added to a preset password set by the password lock, and the visitor password is deleted from the preset password set when preset conditions are satisfied; the password lock obtains an authentication password inputted by a user; and whether the preset password set has a password matched with the authentication password is judged, if the preset password set has the password matched with the authentication password, the password authentication is determined to pass by the password lock.

Description

A kind of method verifying password and coded lock

Technical field

The present invention relates to information security field, particularly to a kind of method verifying password and coded lock.

Background technology

At present, a lot of places are provided with coded lock, such as gate inhibition, antitheft door, luggage case, safety cabinet etc.. When using coded lock, it is ensured that the safety of password is most important.

But, during a lot of situation, user needs to allow others open coded lock, accesses if any friend to family and oneself The when that oneself not yet getting home, can want to allow friend advanced person family wait.But, if informing friend's coded lock Password, by dangerous for the password causing coded lock.

Summary of the invention

The application provides a kind of method verifying password and coded lock, is used for solving because opening coded lock to other people Authority cause the unsafe problem of coded lock password.

First aspect, the embodiment of the present invention provides a kind of method of password authentication, including: coded lock receives association The passwords of visitors that equipment sends;Described passwords of visitors is added into preset password set by described coded lock, and Pre-conditioned described passwords of visitors is deleted from described preset password set when meeting;Described coded lock obtains The checking password of user's input;And judge whether described preset password set exists and described checking password phase The password of coupling;If existing, the most described coded lock determines that password authentification is passed through.

In above-mentioned implementation, user can add passwords of visitors by associate device in coded lock so that Other people can be by passwords of visitors by password authentification, without revealing the core password of oneself.And visitor Password can pre-conditioned meet time be deactivated, it is ensured that the safety of coded lock, so realize protection coded lock In the case of safety, to the authority verified by coded lock of other user's short-terms.

In the implementation that some are possible, described method also includes: described coded lock receives described association and sets The request deleting described passwords of visitors that preparation is sent;Described coded lock responds described request, determines described presetting Condition meets.In this implementation, user can manual invalid passwords of visitors, it is ensured that close after visitor leaves The safety of code lock.

In the implementation that some are possible, described method also includes: described coded lock receives described association and sets The effective degree of the described passwords of visitors that preparation is sent;Described coded lock completes password to by described passwords of visitors The number of times of checking counts;When described number of times reaches described effective degree, described coded lock determines described Pre-conditioned satisfied.In this implementation, the inefficacy machine that coded lock will be set by associate device based on user Make invalid passwords of visitors, it is ensured that the safety of coded lock after visitor leaves.

In the implementation that some are possible, described method also includes: described coded lock receives described association and sets The out-of-service time of the described passwords of visitors that preparation is sent;When the described out-of-service time arrives, described coded lock determines Described pre-conditioned satisfied.In this implementation, the mistake that coded lock will be set by associate device based on user Imitate machine-processed invalid passwords of visitors, it is ensured that the safety of coded lock after visitor leaves.

In the implementation that some are possible, described coded lock judges whether exist in described preset password set With the password of described checking code matches, including: described coded lock judges whether deposit in described checking password In the character string identical with arbitrary password in described preset password set, the number of characters of described character string is less than institute State the number of characters of checking password;If described checking password existing pre-with first in described preset password set If the character string that password is identical, the most described coded lock determines described first preset password and described checking password phase Coupling.By this implementation, user can input the checking password comprising preset password and redundance character, Other people are difficult to peep record valid password when by password authentification to make user, protect cryptosecurity.

In the implementation that some are possible, described method also includes: input the process of passwords of visitors user In, described coded lock prompting user inputs random character.

In the implementation that some are possible, whether deposit in described coded lock judges described preset password set With the password of described checking code matches after, described method also includes: if described preset password set In do not exist and the password of described checking code matches, the most described coded lock determines that password authentification is not passed through, And send alarm information to described associate device.By this implementation, coded lock does not passes through in password authentification After, send alarm information to associate device, user is carried out safety instruction, and then can protect in time Property safety.

Second aspect, the embodiment of the present invention provides a kind of coded lock, including: receive unit, be used for receiving association The passwords of visitors that equipment sends;Memory element, is used for storing described passwords of visitors and preset password set; Input block, for obtaining the character of user's input;Processing unit, with described reception unit, described storage Unit and the coupling of described input block, for described passwords of visitors being added into described preset password set, And pre-conditioned meet time described passwords of visitors is deleted from described preset password set;And described After input block obtains the checking password of user's input, it is judged that whether described preset password set exists and institute State the password of checking code matches;If existing, it is determined that password authentification is passed through.

In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends Delete described passwords of visitors request;Described processing unit is additionally operable to: respond described request, determines described Pre-conditioned satisfied.

In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends The effective degree of described passwords of visitors;Described processing unit is additionally operable to: complete by described passwords of visitors The number of times of password authentification counts;And when described number of times reaches described effective degree, determine described presetting Condition meets.

In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends Out-of-service time of described passwords of visitors;Described processing unit is additionally operable to: when the described out-of-service time arrives, Determine described pre-conditioned satisfied.

In the implementation that some are possible, described processing unit is used for: judge in described preset password set Whether exist and the password of described checking code matches, including: judge whether described checking password exists The character string identical with arbitrary password in described preset password set, the number of characters of described character string is less than described The number of characters of checking password;Preset with first in described preset password set if described checking password exists The character string that password is identical, it is determined that described first preset password and described checking code matches.

In the implementation that some are possible, described coded lock also includes: Tip element, for defeated to user Go out information;Described processing unit is additionally operable to: during user inputs passwords of visitors, by described Tip element prompting user inputs random character.

In the implementation that some are possible, described coded lock also includes: transmitting element, for described pass Connection equipment sending message;Described processing unit is additionally operable to: do not exist in judging described preset password set After the password of described checking code matches, determine that password authentification is not passed through, and by described transmitting element Alarm information is sent to described associate device.

Accompanying drawing explanation

For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below The accompanying drawing used is needed to briefly introduce, it should be apparent that, the accompanying drawing in describing below is only the present invention's Some embodiments, from the point of view of those of ordinary skill in the art, in the premise not paying creative work Under, it is also possible to other accompanying drawing is obtained according to these accompanying drawings.

Fig. 1 is the structural schematic block diagram of coded lock in the embodiment of the present invention;

Fig. 2 is the schematic flow sheet of method of password authentication in the embodiment of the present invention.

Detailed description of the invention

Below by accompanying drawing and specific embodiment, technical solution of the present invention is described in detail, it should be understood that Specific features in the embodiment of the present invention and embodiment is the detailed description to technical solution of the present invention, and It not the restriction to technical solution of the present invention, in the case of not conflicting, the embodiment of the present invention and embodiment In technical characteristic can be mutually combined.

Coded lock in the embodiment of the present invention can be arranged on antitheft door, safety cabinet, luggage case.Reference Fig. 1, coded lock includes processing unit 10, memory element 20, input block 30 and receives unit 40.

Wherein, processing unit 10 is the control centre of coded lock, utilizes various interface and connection whole The various piece of coded lock, by running self-curing instruction or being stored in the instruction in memory element 20 And call the data being stored in memory element 20, perform the various functions of coded lock and process data, Thus realize password authentification.Optionally, processing unit 10 can include one or more treatment element, specifically , processing unit 10 can be central processing unit (Central Processing Unit;It is called for short: CPU), Can also be specific integrated circuit (Application Specific Intergrated Circuit;It is called for short: ASIC), Or it is configured to implement one or more integrated circuits of the embodiment of the present invention, such as: one or more Microprocessor (digital singnal processor;It is called for short: DSP), or, one or more scene can be compiled Journey gate array (Field Programmable Gate Array;It is called for short: FPGA).Preferably, processing unit 10 can be integrated with modem processor, and wherein, modem processor mainly processes radio communication.Permissible Being understood by, above-mentioned modem processor can not also be integrated in processing unit 10.Implement at some In example, processing unit 10, memory element 20 can realize on one chip, in certain embodiments, They can also realize on independent chip respectively.

Described memory element 20 can be used for storing instruction and data, it may include one or more memory elements. Memory element 20 can mainly include storing instruction area and storage data field, and storage data field can store default close Password, the checking password of user's input or the request of coded lock reception or data etc. in code set;Storage refers to Make district can store the instruction etc. needed for the operating system of coded lock, at least one function.

The implementation of input block 30 includes: one, and input block 30 is for be provided with the defeated of physical button Entering panel, each physical button is corresponding with character, and user, can be defeated by pressing the button on TIP Enter the checking password for password authentification.Its two, input block 30 is touch screen, is specifically as follows vector Pressure sensing technology touch screen, resistive technologies touch screen, capacitance technology touch screen, infrared technology touch screen, Surface acoustic wave technique touch screen, etc..Touch screen as input block 30 can show virtual key, User can input the checking password for password authentification by touching virtual key.Optionally, input block 30 can also obtain the track pattern with virtual key as node that user inputs on the touchscreen, this trajectory diagram Case or can be combined as verifying password with character string separately as verifying password.

Receive unit 40 for receiving the information that ext nal network element sends.In the embodiment of the present invention, coded lock can To be associated with one or more communication equipments (such as panel computer, smart mobile phone, intelligent watch etc.), And receive association communication equipment send request or data, such as, receive unit 40 can set from association Standby locating receives interpolation or deletes the request of passwords of visitors, or receives the carrying out coded lock of associate device transmission The parameter of configuration, etc..Generally, receive unit and include but not limited to antenna, at least one amplifier, receipts Letter machine, bonder, low-noise amplifier (Low Noise Amplifier, LNA) etc..Receive unit 40 Arbitrary communication standard or agreement can be used, include but not limited to: global system for mobile communications (Global System of Mobile communication;GSM), general packet radio service (General it is called for short: Packet Radio Service;GPRS), CDMA (Code Division Multiple Access it is called for short:; CDMA), WCDMA (Wideband Code Division Multiple Access it is called for short:;It is called for short: WCDMA), Long Term Evolution (Long Term Evolution;Be called for short: LTE), the 5th third-generation mobile communication System (The fifth generation mobile communication system;5G), Wi-Fi it is called for short: Communication, bluetooth (Bluetooth) communicate, infrared (Infrared) communicates, purple honeybee (Zigbee) communicates, Near-field communication (Near Field Communication;It is called for short: NFC).

In the implementation that some are possible, coded lock also includes transmitting element 50, for sending out to other networks Delivering letters breath, such as, transmitting element 50 can send the daily record of password authentification to associate device, or close Code checking repeatedly failure backward association equipment sends alarm information.In the embodiment of the present invention, transmitting element 50 Can integrate with receiving unit 40, it is also possible to be respectively two elements.Transmitting element 50 include but It is not limited to antenna, at least one amplifier, sender, bonder, low-noise amplifier (Low Noise Amplifier, LNA) etc..Communication standard or agreement that transmitting element 50 uses refer to receive unit 40.

In the implementation that some are possible, coded lock also includes Tip element 60, for exporting letter to user Breath.Such as, when input block 30 is the TIP being provided with physical button, Tip element 60 is permissible For being arranged on the warning light on this physical button, by lighting warning light, prompting is used for pressing this warning light pair The physical button answered.The most such as, when the touch screen that input block 30 is display virtual key, for right The Tip element 60 that user carries out pointing out can be input block 30 itself, and input block 30 can pass through The display mode changing virtual key (as changed the brightness of virtual key, color, or makes virtual key dodge Bright, mobile, etc.), prompting is for pressing the virtual key that this display mode changes.

Although not shown, coded lock can also include photographic head, warning light, audio output device, power supply, Wireless charger etc..

It addition, in the embodiment of the present invention, the mode that coded lock and associate device are associated includes: one, Coded lock by account log in remotely administered server set up is connected, and associate device login same account and Remotely administered server is set up and is connected, and then, remotely administered server can be as coded lock and associate device Between data transmission and the transfer of signalling, coded lock completes to associate with associate device.Its two, password By machine and machine (Machine to Machine between lock and associate device;It is called for short: M2M) communication Network sets up connection association of matching, or, coded lock and associate device are by purple honeybee (Zigbee) network Connect and match association, or, code lock and associate device are connected by NFC mode and match, or, Code lock is connected by bluetooth approach with associate device and matches.

The schematic flow sheet of the method for password authentication that Fig. 2 provides for the embodiment of the present invention, the method includes as follows Step:

Step 701: coded lock receives the passwords of visitors that associate device sends;

Step 702: passwords of visitors is added into preset password set by coded lock;

Step 703: coded lock obtains the checking password of user's input;

Step 704: whether coded lock judges to exist in preset password set and the password of checking code matches; The most then perform step 705;

Step 705: when there is the password with checking code matches in preset password set, coded lock is true Determine password authentification to pass through;

Step 706: coded lock pre-conditioned meet time passwords of visitors is deleted from preset password set.

Concrete, in the embodiment of the present invention, the password in preset password set is that default allowing users to is led to Cross the password of password authentification, in other words, if the password of user's input and arbitrary password in preset password set Match, then password authentification is passed through.

Under normal circumstances, preset password set includes the core password that user uses, when user needs When allowing other people open coded lock, if informing others' core password, then core password can be caused to reveal, user Have to change core password afterwards, the most inconvenient.

In order to solve this problem, in the embodiment of the present invention, user can arrange passwords of visitors by associate device, And by associate device, passwords of visitors is sent to coded lock, this passwords of visitors is added to default close by coded lock Among code set.At this moment, if the checking password having user to input mates with this passwords of visitors, then user's energy Enough by password authentification, open coded lock.

Further, pre-conditioned meet time, coded lock can delete this passwords of visitors from preset password set, Make this passwords of visitors lose efficacy, and this default volume condition manually can be triggered by user, or coded lock based on It is pre-conditioned that the inefficacy mechanism set triggers this.

As long as it addition, step 706 performs after step 702, do not limit itself and step 703~step The sequencing of 705.

In technique scheme, user can add passwords of visitors by associate device in coded lock so that Other people can be by passwords of visitors by password authentification, without revealing the core password of oneself.And visitor Password can pre-conditioned meet time be deactivated, it is ensured that the safety of coded lock, so realize protection coded lock In the case of safety, to the authority verified by coded lock of other user's short-terms.

Optionally, in the embodiment of the present invention, coded lock judges whether to meet pre-conditioned, includes but not limited to Following manner:

Mode 1, user manually deletes passwords of visitors.

Coded lock receives the request of the deletion passwords of visitors that associate device sends;Coded lock response request, determines Pre-conditioned satisfied.

Concrete, user can manually delete passwords of visitors by associate device, and this deletion is visited by associate device The request of visitor's password sends after coded lock, and coded lock upon receipt of the request, i.e. can determine that default Condition meets, and triggers the deletion of passwords of visitors so that passwords of visitors is invalid.In practical situation, user also may be used Directly to carry out deleting the operation of passwords of visitors on coded lock.

Mode 2, user setup passwords of visitors inefficacy mechanism, coded lock allows coded lock lose efficacy according to this mechanism.

Inefficacy mechanism one, coded lock receives the effective degree of the passwords of visitors that associate device sends;Coded lock pair The number of times being completed password authentification by passwords of visitors is counted;When number of times reaches effective degree, coded lock Determine pre-conditioned satisfied.

Concrete, user arranges passwords of visitors by associate device and lost efficacy after using k time, then association sets Sending to coded lock for by this effective degree k, wherein, associate device can be while sending passwords of visitors This effective degree k is sent to coded lock, it is also possible to send effectively to coded lock sending the rear of passwords of visitors Number of times.

Coded lock is after the checking password inputting user is verified, if the password being verified is close with visitor Code coupling, then count.When counting reaches effective degree k, show to use passwords of visitors to pass through close The number of times of code checking reaches k, and coded lock will delete visitor based on inefficacy mechanism one from preset password set Password, makes passwords of visitors lose efficacy.

Inefficacy mechanism two, coded lock receives the out-of-service time of the passwords of visitors that associate device sends;When losing efficacy Between arrive time, coded lock determine pre-conditioned meet.

Concrete, user arranges passwords of visitors by associate device and lost efficacy after the out-of-service time, then association sets Sending to coded lock for by this out-of-service time, wherein, associate device can be incited somebody to action while sending passwords of visitors This out-of-service time send to coded lock, it is also possible to send passwords of visitors rear to coded lock send lost efficacy time Between.

Coded lock after receiving the out-of-service time, the no matter checking what state of this passwords of visitors, just based on Inefficacy mechanism two, deletes passwords of visitors from preset password set, makes passwords of visitors lose efficacy.

Inefficacy mechanism three, in conjunction with aforementioned inefficacy mechanism one, in the case of user is not provided with effective degree, close Effective degree is set to the default value k of acquiescence by code lock1, such as default value k1Value be 1 time, in other words, visit In visitor's password disposably, if there being user by this passwords of visitors by password authentification, then coded lock is immediately From preset password set, delete this passwords of visitors, make passwords of visitors lose efficacy.

Inefficacy mechanism four, in conjunction with aforementioned inefficacy mechanism two, in the case of user is not provided with the out-of-service time, close Out-of-service time is set to the moment after receiving the acquiescence duration of passwords of visitors by code lock, such as during acquiescence a length of 3 Hour, coded lock will make passwords of visitors lose efficacy after receiving passwords of visitors 3 hours.

By any of the above-described mode, it is possible to make passwords of visitors be deactivated, it is ensured that give other people passes through coded lock Authority be short-term, interim, ensure coded lock safety.

In the implementation that some are possible, step 704: coded lock judges whether deposit in preset password set At the password with checking code matches, include but not limited to mode implemented as described below:

Mode one, strict matching way.That is, checking password and the first preset password in preset password set Time identical, checking password just mates with first password.

Mode two, Redundancy Match mode.That is, coded lock judges to verify in password whether exist and preset password The character string that in set, arbitrary password is identical, the number of characters of this character string is less than the number of characters of checking password;? When there is the character string identical with the first preset password in preset password set in checking password, first presets Password and checking code matches.

Concrete, so-called Redundancy Match mode refers to user and can input the character string being longer than preset password As checking password, as long as this checking password includes the character string identical with arbitrary preset password, this checking Password i.e. matches with this preset password.

Such as, user is if it is known that preset password is " 800008 ", then it can input " xx ... 800008 ... xx " As checking password, and by password authentification, wherein xx is any character.

Doing so and be advantageous in that, user, when input validation password, can input redundance character, and these The people peeping user's input validation password can be upset in redundance character so that it is is difficult to remember that what user inputted comprises The a lot of checking password of redundance character, and then make it be difficult to know real password effectively, play and prevent The effect of other people snooping password, protects cryptosecurity.

Optionally, in conjunction with aforesaid way two, coded lock record by the way two mode complete password and test The checking password of card, and when password authentification later receives same checking password, to associate device Send prompting message, or, it is desirable to user carry out secondary checking (can be the checking of other forms, it is possible to Think that requirement user inputs other checking password and verifies), or, so that this checking password is risky it is By, determine that password authentification is not passed through.

By the way, it is possible to the redundant code avoiding other people to be inputted by completely recorded user passes through password The situation of checking, it is ensured that cryptosecurity.

In the implementation that some are possible, coded lock is close in the checking being obtained user's input by input block During code, that is during user inputs passwords of visitors, coded lock prompting user inputs random character.

Concrete, in the mode two of abovementioned steps 704, user can be by the way of input redundance character Prevent other people from spying on password, but this needs user deliberately to input redundance character when input validation password, and The subconsciousness of this behavior and user deliberately inputting redundance character is contrary, and user is generally difficult to determine Concrete which redundance character of input, this brings puzzlement to user on the contrary.

In this implementation, coded lock, when user being detected at input validation password, can actively generate random Character is as redundance character, and points out user to input these redundance characters by Tip element 60, helps to use Family completes the input of redundance character, had both played the effect of cipher antipeeping, and will not bring to user again the most true Determine the puzzlement of redundance character.

In the implementation that some are possible, the judged result in step 704 then performs following steps when being no:

Step 707: if not existing in preset password set and the password of checking code matches, then coded lock Determine that password authentification is not passed through, and send alarm information to associate device.

Concrete, all of preset password all inputs with user in preset password set checking password is not Timing, coded lock determines that password authentification is not passed through, and sends alarm information to associate device, to inform user Other people just attempt to use illegal checking password to open coded lock.

Wherein, alarm information can also include the photographic head arranged on coded lock, or associate with coded lock The photo in separate camera gathered coded lock front, allow the user to that whom knows and open at view close Code lock, it is ensured that property safety.

Optionally, coded lock is specifically after the continuous frequency of failure of password authentification reaches threshold value t, just to association Equipment sends described alarm information, to reduce the interference to user.

In technique scheme, coded lock, after password authentification is not passed through, sends alarm information to associate device, User is carried out safety instruction, and then property safety can be protected in time.

Based on identical inventive concept, the embodiment of the present invention provides a kind of coded lock, with continued reference to Fig. 1, and should Coded lock includes processing unit 10, memory element 20, input block 30 and receives unit 40.

Wherein, unit 40 is received for receiving the passwords of visitors that associate device sends.

Memory element 20 is used for storing passwords of visitors and preset password set.

Input block 30 is for obtaining the character of user's input.

Processing unit 10 couples with reception unit 40, memory element 20 and input block 30 respectively, uses In passwords of visitors being added into preset password set, and pre-conditioned meet time by passwords of visitors from preset close Code set is deleted;And after input block 30 obtains the checking password of user's input, it is judged that preset close Whether code set exists and the password of checking code matches;If existing, it is determined that password authentification is passed through.

In a kind of possible implementation, receive unit 40 and be additionally operable to: receive deleting of associate device transmission Request except passwords of visitors;

Processing unit 10 is additionally operable to: response request, determines pre-conditioned satisfied.

In a kind of possible implementation, receive unit 40 and be additionally operable to: receive the visit that associate device sends The effective degree of visitor's password;

Processing unit 10 is additionally operable to: count the number of times being completed password authentification by passwords of visitors;And When number of times reaches effective degree, determine pre-conditioned satisfied.

In a kind of possible implementation, receive unit 40 and be additionally operable to: receive the visit that associate device sends The out-of-service time of visitor's password;

Processing unit 10 is additionally operable to: when the out-of-service time arrives, and determines pre-conditioned satisfied.

Whether, in a kind of possible implementation, processing unit 10 is used for: judge in preset password set Exist and the password of checking code matches, including: judge to verify in password whether exist and preset password collection The character string that in conjunction, arbitrary password is identical, the number of characters of described character string is less than the character of described checking password Number;If checking password existing the character string identical with the first preset password in preset password set, the most really Fixed first preset password and checking code matches.

In a kind of possible implementation, coded lock also includes Tip element 60, for carrying to user's output Show information;

Processing unit 10 is additionally operable to: during user inputs passwords of visitors, is carried by Tip element 60 Show that user inputs random character.

In a kind of possible implementation, coded lock also includes:

Transmitting element 50, for sending message to associate device;

Processing unit 10 is additionally operable to: do not exist in judging preset password set and checking code matches Password after, determine that password authentification is not passed through, and by transmitting element 50 to associate device send alarm disappear Breath.

The function that in above-mentioned coded lock, each component units is realized is referred in the method for password authentication of Fig. 2 respectively The implementation of step, and in coded lock the implementation of each component units refer to before to list each in Fig. 1 The description of unit, does not repeats them here.

The one or more technical schemes provided in the embodiment of the present invention, at least have the following technical effect that or excellent Point:

User can add passwords of visitors by associate device in coded lock so that other people can pass through visitor Password passes through password authentification, without revealing the core password of oneself.And passwords of visitors can be pre-conditioned It is deactivated when meeting, it is ensured that the safety of coded lock, and then realizes, in the case of protection coded lock safety, giving The authority verified by coded lock of other user's short-terms.

Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can use complete hardware embodiment, complete software implementation or knot The form of the embodiment in terms of conjunction software and hardware.And, the present invention can use and wherein wrap one or more Computer-usable storage medium containing computer usable program code (include but not limited to disk memory, CD-ROM, optical memory etc.) form of the upper computer program implemented.

The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and / or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.

These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart The function specified in flow process and/or one square frame of block diagram or multiple square frame.

Although preferred embodiments of the present invention have been described, but those skilled in the art once know base This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.

Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.

Claims (14)

1. a method of password authentication, it is characterised in that including:
Coded lock receives the passwords of visitors that associate device sends;
Described passwords of visitors is added into preset password set by described coded lock, and pre-conditioned meet time will Described passwords of visitors is deleted from described preset password set;
Described coded lock obtains the checking password of user's input;And
Judge whether described preset password set exists and the password of described checking code matches;
If existing, the most described coded lock determines that password authentification is passed through.
2. the method for claim 1, it is characterised in that described method also includes:
Described coded lock receives the request deleting described passwords of visitors that described associate device sends;
Described coded lock responds described request, determines described pre-conditioned satisfied.
3. the method for claim 1, it is characterised in that described method also includes:
Described coded lock receives the effective degree of the described passwords of visitors that described associate device sends;
The number of times being completed password authentification by described passwords of visitors is counted by described coded lock;
When described number of times reaches described effective degree, described coded lock determines described pre-conditioned satisfied.
4. the method for claim 1, it is characterised in that described method also includes:
Described coded lock receives the out-of-service time of the described passwords of visitors that described associate device sends;
When the described out-of-service time arrives, described coded lock determines described pre-conditioned satisfied.
5. the method as according to any one of claim 1-4, it is characterised in that described coded lock judges Whether described preset password set exists and the password of described checking code matches, including:
Whether described coded lock judges to exist in described checking password arbitrary close with described preset password set The character string that code-phase is same, the number of characters of described character string is less than the number of characters of described checking password;
If described checking password exists the word identical with the first preset password in described preset password set Symbol string, the most described coded lock determines described first preset password and described checking code matches.
6. the method as according to any one of claim 1-4, it is characterised in that described method also includes:
During user inputs passwords of visitors, described coded lock prompting user inputs random character.
7. the method as described in any one of claim 1-4, it is characterised in that judge at described coded lock Whether described preset password set exists with the password of described checking code matches after, described method is also Including:
If described preset password set not existing and the password of described checking code matches, the most described password Lock determines that password authentification is not passed through, and sends alarm information to described associate device.
8. a coded lock, it is characterised in that including:
Receive unit, for receiving the passwords of visitors that associate device sends;
Memory element, is used for storing described passwords of visitors and preset password set;
Input block, for obtaining the character of user's input;
Processing unit, couples with described reception unit, described memory element and described input block, is used for Described passwords of visitors is added into described preset password set, and pre-conditioned meet time by close for described visitor Code is deleted from described preset password set;And the checking password of user's input is obtained at described input block After, it is judged that whether described preset password set exists and the password of described checking code matches;If existing, Then determine that password authentification is passed through.
9. coded lock as claimed in claim 8, it is characterised in that described reception unit is additionally operable to: connect Receive the request deleting described passwords of visitors that described associate device sends;
Described processing unit is additionally operable to: respond described request, determines described pre-conditioned satisfied.
10. coded lock as claimed in claim 8, it is characterised in that described reception unit is additionally operable to: connect Receive the effective degree of the described passwords of visitors that described associate device sends;
Described processing unit is additionally operable to: count the number of times being completed password authentification by described passwords of visitors Number;And when described number of times reaches described effective degree, determine described pre-conditioned satisfied.
11. coded locks as claimed in claim 8, it is characterised in that described reception unit is additionally operable to: connect Receive the out-of-service time of the described passwords of visitors that described associate device sends;
Described processing unit is additionally operable to: when the described out-of-service time arrives, and determines described pre-conditioned satisfied.
12. coded locks as according to any one of claim 8-11, it is characterised in that described process list Unit is used for: judge whether exist in described preset password set and the password of described checking code matches, bag Include:
Judge whether described checking password exists the word identical with arbitrary password in described preset password set Symbol string, the number of characters of described character string is less than the number of characters of described checking password;
If described checking password exists the word identical with the first preset password in described preset password set Symbol string, it is determined that described first preset password and described checking code matches.
13. coded locks as according to any one of claim 8-11, it is characterised in that described coded lock Also include:
Tip element, for exporting information to user;
Described processing unit is additionally operable to: during user inputs passwords of visitors, by described Tip element Prompting user inputs random character.
14. coded locks as described in any one of claim 8-10, it is characterised in that described coded lock is also Including:
Transmitting element, for sending message to described associate device;
Described processing unit is additionally operable to: do not exist close with described checking in judging described preset password set After the password of code-phase coupling, determine that password authentification is not passed through, and set to described association by described transmitting element Preparation send alarm information.
CN201610164306.XA 2016-03-21 2016-03-21 Password authentication method and password lock CN105844744A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610164306.XA CN105844744A (en) 2016-03-21 2016-03-21 Password authentication method and password lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610164306.XA CN105844744A (en) 2016-03-21 2016-03-21 Password authentication method and password lock

Publications (1)

Publication Number Publication Date
CN105844744A true CN105844744A (en) 2016-08-10

Family

ID=56587796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610164306.XA CN105844744A (en) 2016-03-21 2016-03-21 Password authentication method and password lock

Country Status (1)

Country Link
CN (1) CN105844744A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system
CN106934885A (en) * 2017-02-20 2017-07-07 广东亚太天能科技股份有限公司 Smart lock and remote unlocking method
CN107295165A (en) * 2017-06-09 2017-10-24 深圳市欧唯科技有限公司 A kind of tamper-proof unlocking method based on fuzzy matching
CN107301705A (en) * 2017-06-29 2017-10-27 合肥步瑞吉智能家居有限公司 A kind of intelligent lock control method of owner without line justification
CN107331006A (en) * 2017-06-29 2017-11-07 合肥步瑞吉智能家居有限公司 A kind of intelligent wireless lock control system based on validation of information
CN107464329A (en) * 2017-09-26 2017-12-12 深圳市欧瑞博电子有限公司 The temporary password management method of intelligent door lock, apparatus and system
CN107785963A (en) * 2017-10-31 2018-03-09 北京伊电园网络科技有限公司 A kind of charging method and charging system
CN108230496A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 A kind of time segment management method, system based on cloud lock account
CN108449177A (en) * 2018-03-16 2018-08-24 东莞盛世科技电子实业有限公司 The use control method and system of temporary password
CN108932771A (en) * 2018-05-23 2018-12-04 王力安防科技股份有限公司 A kind of long-range temporary Authorization, method for unlocking and system
CN109285252A (en) * 2018-09-29 2019-01-29 百度在线网络技术(北京)有限公司 Lock control method and device
CN109584425A (en) * 2018-12-20 2019-04-05 合肥凌极西雅电子科技有限公司 A kind of gate inhibition's method for managing security based on interim identity
CN109636952A (en) * 2017-10-05 2019-04-16 林劲璋 Access control system and its management method
CN110443925A (en) * 2019-08-06 2019-11-12 深圳市沃特沃德股份有限公司 Generation method, device, storage medium and the computer equipment of temporary password

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4256051B2 (en) * 2000-03-31 2009-04-22 パナソニック株式会社 RFID tag device
CN104504789A (en) * 2014-12-05 2015-04-08 深圳天珑无线科技有限公司 Access control management method and access control management device
CN104835232A (en) * 2015-05-25 2015-08-12 郭萌 Voice-control lock
CN104966017A (en) * 2015-07-13 2015-10-07 广东欧珀移动通信有限公司 Password input protection system and method
CN104966336A (en) * 2015-05-29 2015-10-07 深圳光启智能光子技术有限公司 Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus
CN105243715A (en) * 2015-10-28 2016-01-13 成都卫士通信息产业股份有限公司 Dynamic two-dimensional bar code based automatic registration method and system for district visiting users

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4256051B2 (en) * 2000-03-31 2009-04-22 パナソニック株式会社 RFID tag device
CN104504789A (en) * 2014-12-05 2015-04-08 深圳天珑无线科技有限公司 Access control management method and access control management device
CN104835232A (en) * 2015-05-25 2015-08-12 郭萌 Voice-control lock
CN104966336A (en) * 2015-05-29 2015-10-07 深圳光启智能光子技术有限公司 Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus
CN104966017A (en) * 2015-07-13 2015-10-07 广东欧珀移动通信有限公司 Password input protection system and method
CN105243715A (en) * 2015-10-28 2016-01-13 成都卫士通信息产业股份有限公司 Dynamic two-dimensional bar code based automatic registration method and system for district visiting users

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
罗家坤,陈建英: "《互联网+智能家居:颠覆与重构传统家居产业链》", 31 December 2015 *
金纯: "《BLE低功耗蓝牙技术开发指南》", 31 January 2016 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system
CN106934885A (en) * 2017-02-20 2017-07-07 广东亚太天能科技股份有限公司 Smart lock and remote unlocking method
CN107295165A (en) * 2017-06-09 2017-10-24 深圳市欧唯科技有限公司 A kind of tamper-proof unlocking method based on fuzzy matching
CN107301705A (en) * 2017-06-29 2017-10-27 合肥步瑞吉智能家居有限公司 A kind of intelligent lock control method of owner without line justification
CN107331006A (en) * 2017-06-29 2017-11-07 合肥步瑞吉智能家居有限公司 A kind of intelligent wireless lock control system based on validation of information
CN107464329A (en) * 2017-09-26 2017-12-12 深圳市欧瑞博电子有限公司 The temporary password management method of intelligent door lock, apparatus and system
CN109636952A (en) * 2017-10-05 2019-04-16 林劲璋 Access control system and its management method
CN107785963A (en) * 2017-10-31 2018-03-09 北京伊电园网络科技有限公司 A kind of charging method and charging system
CN107785963B (en) * 2017-10-31 2020-11-24 杭州小电科技股份有限公司 Charging method and charging system
CN108230496A (en) * 2017-12-21 2018-06-29 广东汇泰龙科技有限公司 A kind of time segment management method, system based on cloud lock account
CN108449177A (en) * 2018-03-16 2018-08-24 东莞盛世科技电子实业有限公司 The use control method and system of temporary password
CN108932771A (en) * 2018-05-23 2018-12-04 王力安防科技股份有限公司 A kind of long-range temporary Authorization, method for unlocking and system
CN109285252A (en) * 2018-09-29 2019-01-29 百度在线网络技术(北京)有限公司 Lock control method and device
CN109584425A (en) * 2018-12-20 2019-04-05 合肥凌极西雅电子科技有限公司 A kind of gate inhibition's method for managing security based on interim identity
CN110443925A (en) * 2019-08-06 2019-11-12 深圳市沃特沃德股份有限公司 Generation method, device, storage medium and the computer equipment of temporary password

Similar Documents

Publication Publication Date Title
US9531548B2 (en) Security system for handheld wireless devices using time-variable encryption keys
CN107038777B (en) Safety communication method based on intelligent door lock system and intelligent door lock system thereof
CN104380764B (en) For the method for the customer data base for the characteristic of vehicle being registered in Internet Server equipment
CN103488924B (en) A kind of unlocking processing method of terminal, device and equipment
US10073960B1 (en) Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
US9391985B2 (en) Environment-based two-factor authentication without geo-location
US10008054B2 (en) Smart door lock
US8467770B1 (en) System for securing a mobile terminal
CN102695166B (en) Protection to the safety element being coupled to NFC circuit
CN104012168B (en) Simplified mobile communication equipment
US8045961B2 (en) Systems for wireless authentication based on bluetooth proximity
US8260262B2 (en) Systems for three factor authentication challenge
JP4848360B2 (en) Wireless authentication method and wireless authentication system
US7810146B2 (en) Security device, terminal device, gate device, and device
CN105303659B (en) A kind of gate inhibition's personal identification method and device based on ultrasonic wave
US7257374B1 (en) Automatic security locking method and system for wireless-enabled devices
CN104517336B (en) Yunmen access control system and its implementation based on mobile internet
US7882541B2 (en) Authentication system in information processing terminal using mobile information processing device
CN103204134B (en) Vehicle operating authority authorizes system and vehicle operating authority control method
CN103607536B (en) The control method and camera of camera
CN102547502B (en) Headset, headset use control method and terminal
US8750797B2 (en) Proximity access and alarm apparatus
JP4245151B2 (en) Mobile phone with use restriction function and method of restricting use of the machine
US7400906B2 (en) Mobile communication terminal
CN103328278B (en) For the method that mobile phone is matched with motor vehicles and lock/unlock device

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170303

Address after: Room 501, building, Tianfu Software Park, hi tech Zone, Sichuan, Chengdu, China, D5

Applicant after: Hu Jiaan

Address before: 610000 Tianfu Software Park, Tianfu Avenue, Sichuan, Chengdu D7-303

Applicant before: CHENGDU IDW SENSING TECHNOLOGY CO., LTD.

Effective date of registration: 20170303

Address after: Room 501, building, Tianfu Software Park, hi tech Zone, Sichuan, Chengdu, China, D5

Applicant after: Hu Jiaan

Address before: 610000 Tianfu Software Park, Tianfu Avenue, Sichuan, Chengdu D7-303

Applicant before: CHENGDU IDW SENSING TECHNOLOGY CO., LTD.

C41 Transfer of patent application or patent right or utility model
RJ01 Rejection of invention patent application after publication

Application publication date: 20160810

RJ01 Rejection of invention patent application after publication