CN105844744A - Password authentication method and password lock - Google Patents
Password authentication method and password lock Download PDFInfo
- Publication number
- CN105844744A CN105844744A CN201610164306.XA CN201610164306A CN105844744A CN 105844744 A CN105844744 A CN 105844744A CN 201610164306 A CN201610164306 A CN 201610164306A CN 105844744 A CN105844744 A CN 105844744A
- Authority
- CN
- China
- Prior art keywords
- password
- coded lock
- visitors
- passwords
- checking
- Prior art date
Links
- 230000001143 conditioned Effects 0.000 claims description 24
- 238000000034 methods Methods 0.000 claims description 14
- 230000001808 coupling Effects 0.000 claims description 5
- 238000010168 coupling process Methods 0.000 claims description 5
- 238000005859 coupling reactions Methods 0.000 claims description 5
- 238000002360 preparation methods Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 9
- 238000010586 diagrams Methods 0.000 description 7
- 238000004590 computer program Methods 0.000 description 5
- 238000003860 storage Methods 0.000 description 5
- 238000005516 engineering processes Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000006011 modification reactions Methods 0.000 description 3
- 238000003825 pressing Methods 0.000 description 3
- 241000256844 Apis mellifera Species 0.000 description 2
- 280000086786 Radio Service companies 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 280000874760 Third Generation companies 0.000 description 1
- 208000008918 Voyeurism Diseases 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004364 calculation methods Methods 0.000 description 1
- 230000000875 corresponding Effects 0.000 description 1
- 235000019800 disodium phosphate Nutrition 0.000 description 1
- 230000002401 inhibitory effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000203 mixtures Substances 0.000 description 1
- 230000003287 optical Effects 0.000 description 1
- 244000144985 peep Species 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000001960 triggered Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
Abstract
Description
Technical field
The present invention relates to information security field, particularly to a kind of method verifying password and coded lock.
Background technology
At present, a lot of places are provided with coded lock, such as gate inhibition, antitheft door, luggage case, safety cabinet etc.. When using coded lock, it is ensured that the safety of password is most important.
But, during a lot of situation, user needs to allow others open coded lock, accesses if any friend to family and oneself The when that oneself not yet getting home, can want to allow friend advanced person family wait.But, if informing friend's coded lock Password, by dangerous for the password causing coded lock.
Summary of the invention
The application provides a kind of method verifying password and coded lock, is used for solving because opening coded lock to other people Authority cause the unsafe problem of coded lock password.
First aspect, the embodiment of the present invention provides a kind of method of password authentication, including: coded lock receives association The passwords of visitors that equipment sends;Described passwords of visitors is added into preset password set by described coded lock, and Pre-conditioned described passwords of visitors is deleted from described preset password set when meeting;Described coded lock obtains The checking password of user's input;And judge whether described preset password set exists and described checking password phase The password of coupling;If existing, the most described coded lock determines that password authentification is passed through.
In above-mentioned implementation, user can add passwords of visitors by associate device in coded lock so that Other people can be by passwords of visitors by password authentification, without revealing the core password of oneself.And visitor Password can pre-conditioned meet time be deactivated, it is ensured that the safety of coded lock, so realize protection coded lock In the case of safety, to the authority verified by coded lock of other user's short-terms.
In the implementation that some are possible, described method also includes: described coded lock receives described association and sets The request deleting described passwords of visitors that preparation is sent;Described coded lock responds described request, determines described presetting Condition meets.In this implementation, user can manual invalid passwords of visitors, it is ensured that close after visitor leaves The safety of code lock.
In the implementation that some are possible, described method also includes: described coded lock receives described association and sets The effective degree of the described passwords of visitors that preparation is sent;Described coded lock completes password to by described passwords of visitors The number of times of checking counts;When described number of times reaches described effective degree, described coded lock determines described Pre-conditioned satisfied.In this implementation, the inefficacy machine that coded lock will be set by associate device based on user Make invalid passwords of visitors, it is ensured that the safety of coded lock after visitor leaves.
In the implementation that some are possible, described method also includes: described coded lock receives described association and sets The out-of-service time of the described passwords of visitors that preparation is sent;When the described out-of-service time arrives, described coded lock determines Described pre-conditioned satisfied.In this implementation, the mistake that coded lock will be set by associate device based on user Imitate machine-processed invalid passwords of visitors, it is ensured that the safety of coded lock after visitor leaves.
In the implementation that some are possible, described coded lock judges whether exist in described preset password set With the password of described checking code matches, including: described coded lock judges whether deposit in described checking password In the character string identical with arbitrary password in described preset password set, the number of characters of described character string is less than institute State the number of characters of checking password;If described checking password existing pre-with first in described preset password set If the character string that password is identical, the most described coded lock determines described first preset password and described checking password phase Coupling.By this implementation, user can input the checking password comprising preset password and redundance character, Other people are difficult to peep record valid password when by password authentification to make user, protect cryptosecurity.
In the implementation that some are possible, described method also includes: input the process of passwords of visitors user In, described coded lock prompting user inputs random character.
In the implementation that some are possible, whether deposit in described coded lock judges described preset password set With the password of described checking code matches after, described method also includes: if described preset password set In do not exist and the password of described checking code matches, the most described coded lock determines that password authentification is not passed through, And send alarm information to described associate device.By this implementation, coded lock does not passes through in password authentification After, send alarm information to associate device, user is carried out safety instruction, and then can protect in time Property safety.
Second aspect, the embodiment of the present invention provides a kind of coded lock, including: receive unit, be used for receiving association The passwords of visitors that equipment sends;Memory element, is used for storing described passwords of visitors and preset password set; Input block, for obtaining the character of user's input;Processing unit, with described reception unit, described storage Unit and the coupling of described input block, for described passwords of visitors being added into described preset password set, And pre-conditioned meet time described passwords of visitors is deleted from described preset password set;And described After input block obtains the checking password of user's input, it is judged that whether described preset password set exists and institute State the password of checking code matches;If existing, it is determined that password authentification is passed through.
In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends Delete described passwords of visitors request;Described processing unit is additionally operable to: respond described request, determines described Pre-conditioned satisfied.
In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends The effective degree of described passwords of visitors;Described processing unit is additionally operable to: complete by described passwords of visitors The number of times of password authentification counts;And when described number of times reaches described effective degree, determine described presetting Condition meets.
In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends Out-of-service time of described passwords of visitors;Described processing unit is additionally operable to: when the described out-of-service time arrives, Determine described pre-conditioned satisfied.
In the implementation that some are possible, described processing unit is used for: judge in described preset password set Whether exist and the password of described checking code matches, including: judge whether described checking password exists The character string identical with arbitrary password in described preset password set, the number of characters of described character string is less than described The number of characters of checking password;Preset with first in described preset password set if described checking password exists The character string that password is identical, it is determined that described first preset password and described checking code matches.
In the implementation that some are possible, described coded lock also includes: Tip element, for defeated to user Go out information;Described processing unit is additionally operable to: during user inputs passwords of visitors, by described Tip element prompting user inputs random character.
In the implementation that some are possible, described coded lock also includes: transmitting element, for described pass Connection equipment sending message;Described processing unit is additionally operable to: do not exist in judging described preset password set After the password of described checking code matches, determine that password authentification is not passed through, and by described transmitting element Alarm information is sent to described associate device.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below The accompanying drawing used is needed to briefly introduce, it should be apparent that, the accompanying drawing in describing below is only the present invention's Some embodiments, from the point of view of those of ordinary skill in the art, in the premise not paying creative work Under, it is also possible to other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the structural schematic block diagram of coded lock in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of method of password authentication in the embodiment of the present invention.
Detailed description of the invention
Below by accompanying drawing and specific embodiment, technical solution of the present invention is described in detail, it should be understood that Specific features in the embodiment of the present invention and embodiment is the detailed description to technical solution of the present invention, and It not the restriction to technical solution of the present invention, in the case of not conflicting, the embodiment of the present invention and embodiment In technical characteristic can be mutually combined.
Coded lock in the embodiment of the present invention can be arranged on antitheft door, safety cabinet, luggage case.Reference Fig. 1, coded lock includes processing unit 10, memory element 20, input block 30 and receives unit 40.
Wherein, processing unit 10 is the control centre of coded lock, utilizes various interface and connection whole The various piece of coded lock, by running self-curing instruction or being stored in the instruction in memory element 20 And call the data being stored in memory element 20, perform the various functions of coded lock and process data, Thus realize password authentification.Optionally, processing unit 10 can include one or more treatment element, specifically , processing unit 10 can be central processing unit (Central Processing Unit;It is called for short: CPU), Can also be specific integrated circuit (Application Specific Intergrated Circuit;It is called for short: ASIC), Or it is configured to implement one or more integrated circuits of the embodiment of the present invention, such as: one or more Microprocessor (digital singnal processor;It is called for short: DSP), or, one or more scene can be compiled Journey gate array (Field Programmable Gate Array;It is called for short: FPGA).Preferably, processing unit 10 can be integrated with modem processor, and wherein, modem processor mainly processes radio communication.Permissible Being understood by, above-mentioned modem processor can not also be integrated in processing unit 10.Implement at some In example, processing unit 10, memory element 20 can realize on one chip, in certain embodiments, They can also realize on independent chip respectively.
Described memory element 20 can be used for storing instruction and data, it may include one or more memory elements. Memory element 20 can mainly include storing instruction area and storage data field, and storage data field can store default close Password, the checking password of user's input or the request of coded lock reception or data etc. in code set;Storage refers to Make district can store the instruction etc. needed for the operating system of coded lock, at least one function.
The implementation of input block 30 includes: one, and input block 30 is for be provided with the defeated of physical button Entering panel, each physical button is corresponding with character, and user, can be defeated by pressing the button on TIP Enter the checking password for password authentification.Its two, input block 30 is touch screen, is specifically as follows vector Pressure sensing technology touch screen, resistive technologies touch screen, capacitance technology touch screen, infrared technology touch screen, Surface acoustic wave technique touch screen, etc..Touch screen as input block 30 can show virtual key, User can input the checking password for password authentification by touching virtual key.Optionally, input block 30 can also obtain the track pattern with virtual key as node that user inputs on the touchscreen, this trajectory diagram Case or can be combined as verifying password with character string separately as verifying password.
Receive unit 40 for receiving the information that ext nal network element sends.In the embodiment of the present invention, coded lock can To be associated with one or more communication equipments (such as panel computer, smart mobile phone, intelligent watch etc.), And receive association communication equipment send request or data, such as, receive unit 40 can set from association Standby locating receives interpolation or deletes the request of passwords of visitors, or receives the carrying out coded lock of associate device transmission The parameter of configuration, etc..Generally, receive unit and include but not limited to antenna, at least one amplifier, receipts Letter machine, bonder, low-noise amplifier (Low Noise Amplifier, LNA) etc..Receive unit 40 Arbitrary communication standard or agreement can be used, include but not limited to: global system for mobile communications (Global System of Mobile communication;GSM), general packet radio service (General it is called for short: Packet Radio Service;GPRS), CDMA (Code Division Multiple Access it is called for short:; CDMA), WCDMA (Wideband Code Division Multiple Access it is called for short:;It is called for short: WCDMA), Long Term Evolution (Long Term Evolution;Be called for short: LTE), the 5th third-generation mobile communication System (The fifth generation mobile communication system;5G), Wi-Fi it is called for short: Communication, bluetooth (Bluetooth) communicate, infrared (Infrared) communicates, purple honeybee (Zigbee) communicates, Near-field communication (Near Field Communication;It is called for short: NFC).
In the implementation that some are possible, coded lock also includes transmitting element 50, for sending out to other networks Delivering letters breath, such as, transmitting element 50 can send the daily record of password authentification to associate device, or close Code checking repeatedly failure backward association equipment sends alarm information.In the embodiment of the present invention, transmitting element 50 Can integrate with receiving unit 40, it is also possible to be respectively two elements.Transmitting element 50 include but It is not limited to antenna, at least one amplifier, sender, bonder, low-noise amplifier (Low Noise Amplifier, LNA) etc..Communication standard or agreement that transmitting element 50 uses refer to receive unit 40.
In the implementation that some are possible, coded lock also includes Tip element 60, for exporting letter to user Breath.Such as, when input block 30 is the TIP being provided with physical button, Tip element 60 is permissible For being arranged on the warning light on this physical button, by lighting warning light, prompting is used for pressing this warning light pair The physical button answered.The most such as, when the touch screen that input block 30 is display virtual key, for right The Tip element 60 that user carries out pointing out can be input block 30 itself, and input block 30 can pass through The display mode changing virtual key (as changed the brightness of virtual key, color, or makes virtual key dodge Bright, mobile, etc.), prompting is for pressing the virtual key that this display mode changes.
Although not shown, coded lock can also include photographic head, warning light, audio output device, power supply, Wireless charger etc..
It addition, in the embodiment of the present invention, the mode that coded lock and associate device are associated includes: one, Coded lock by account log in remotely administered server set up is connected, and associate device login same account and Remotely administered server is set up and is connected, and then, remotely administered server can be as coded lock and associate device Between data transmission and the transfer of signalling, coded lock completes to associate with associate device.Its two, password By machine and machine (Machine to Machine between lock and associate device;It is called for short: M2M) communication Network sets up connection association of matching, or, coded lock and associate device are by purple honeybee (Zigbee) network Connect and match association, or, code lock and associate device are connected by NFC mode and match, or, Code lock is connected by bluetooth approach with associate device and matches.
The schematic flow sheet of the method for password authentication that Fig. 2 provides for the embodiment of the present invention, the method includes as follows Step:
Step 701: coded lock receives the passwords of visitors that associate device sends;
Step 702: passwords of visitors is added into preset password set by coded lock;
Step 703: coded lock obtains the checking password of user's input;
Step 704: whether coded lock judges to exist in preset password set and the password of checking code matches; The most then perform step 705;
Step 705: when there is the password with checking code matches in preset password set, coded lock is true Determine password authentification to pass through;
Step 706: coded lock pre-conditioned meet time passwords of visitors is deleted from preset password set.
Concrete, in the embodiment of the present invention, the password in preset password set is that default allowing users to is led to Cross the password of password authentification, in other words, if the password of user's input and arbitrary password in preset password set Match, then password authentification is passed through.
Under normal circumstances, preset password set includes the core password that user uses, when user needs When allowing other people open coded lock, if informing others' core password, then core password can be caused to reveal, user Have to change core password afterwards, the most inconvenient.
In order to solve this problem, in the embodiment of the present invention, user can arrange passwords of visitors by associate device, And by associate device, passwords of visitors is sent to coded lock, this passwords of visitors is added to default close by coded lock Among code set.At this moment, if the checking password having user to input mates with this passwords of visitors, then user's energy Enough by password authentification, open coded lock.
Further, pre-conditioned meet time, coded lock can delete this passwords of visitors from preset password set, Make this passwords of visitors lose efficacy, and this default volume condition manually can be triggered by user, or coded lock based on It is pre-conditioned that the inefficacy mechanism set triggers this.
As long as it addition, step 706 performs after step 702, do not limit itself and step 703~step The sequencing of 705.
In technique scheme, user can add passwords of visitors by associate device in coded lock so that Other people can be by passwords of visitors by password authentification, without revealing the core password of oneself.And visitor Password can pre-conditioned meet time be deactivated, it is ensured that the safety of coded lock, so realize protection coded lock In the case of safety, to the authority verified by coded lock of other user's short-terms.
Optionally, in the embodiment of the present invention, coded lock judges whether to meet pre-conditioned, includes but not limited to Following manner:
Mode 1, user manually deletes passwords of visitors.
Coded lock receives the request of the deletion passwords of visitors that associate device sends;Coded lock response request, determines Pre-conditioned satisfied.
Concrete, user can manually delete passwords of visitors by associate device, and this deletion is visited by associate device The request of visitor's password sends after coded lock, and coded lock upon receipt of the request, i.e. can determine that default Condition meets, and triggers the deletion of passwords of visitors so that passwords of visitors is invalid.In practical situation, user also may be used Directly to carry out deleting the operation of passwords of visitors on coded lock.
Mode 2, user setup passwords of visitors inefficacy mechanism, coded lock allows coded lock lose efficacy according to this mechanism.
Inefficacy mechanism one, coded lock receives the effective degree of the passwords of visitors that associate device sends;Coded lock pair The number of times being completed password authentification by passwords of visitors is counted;When number of times reaches effective degree, coded lock Determine pre-conditioned satisfied.
Concrete, user arranges passwords of visitors by associate device and lost efficacy after using k time, then association sets Sending to coded lock for by this effective degree k, wherein, associate device can be while sending passwords of visitors This effective degree k is sent to coded lock, it is also possible to send effectively to coded lock sending the rear of passwords of visitors Number of times.
Coded lock is after the checking password inputting user is verified, if the password being verified is close with visitor Code coupling, then count.When counting reaches effective degree k, show to use passwords of visitors to pass through close The number of times of code checking reaches k, and coded lock will delete visitor based on inefficacy mechanism one from preset password set Password, makes passwords of visitors lose efficacy.
Inefficacy mechanism two, coded lock receives the out-of-service time of the passwords of visitors that associate device sends;When losing efficacy Between arrive time, coded lock determine pre-conditioned meet.
Concrete, user arranges passwords of visitors by associate device and lost efficacy after the out-of-service time, then association sets Sending to coded lock for by this out-of-service time, wherein, associate device can be incited somebody to action while sending passwords of visitors This out-of-service time send to coded lock, it is also possible to send passwords of visitors rear to coded lock send lost efficacy time Between.
Coded lock after receiving the out-of-service time, the no matter checking what state of this passwords of visitors, just based on Inefficacy mechanism two, deletes passwords of visitors from preset password set, makes passwords of visitors lose efficacy.
Inefficacy mechanism three, in conjunction with aforementioned inefficacy mechanism one, in the case of user is not provided with effective degree, close Effective degree is set to the default value k of acquiescence by code lock1, such as default value k1Value be 1 time, in other words, visit In visitor's password disposably, if there being user by this passwords of visitors by password authentification, then coded lock is immediately From preset password set, delete this passwords of visitors, make passwords of visitors lose efficacy.
Inefficacy mechanism four, in conjunction with aforementioned inefficacy mechanism two, in the case of user is not provided with the out-of-service time, close Out-of-service time is set to the moment after receiving the acquiescence duration of passwords of visitors by code lock, such as during acquiescence a length of 3 Hour, coded lock will make passwords of visitors lose efficacy after receiving passwords of visitors 3 hours.
By any of the above-described mode, it is possible to make passwords of visitors be deactivated, it is ensured that give other people passes through coded lock Authority be short-term, interim, ensure coded lock safety.
In the implementation that some are possible, step 704: coded lock judges whether deposit in preset password set At the password with checking code matches, include but not limited to mode implemented as described below:
Mode one, strict matching way.That is, checking password and the first preset password in preset password set Time identical, checking password just mates with first password.
Mode two, Redundancy Match mode.That is, coded lock judges to verify in password whether exist and preset password The character string that in set, arbitrary password is identical, the number of characters of this character string is less than the number of characters of checking password;? When there is the character string identical with the first preset password in preset password set in checking password, first presets Password and checking code matches.
Concrete, so-called Redundancy Match mode refers to user and can input the character string being longer than preset password As checking password, as long as this checking password includes the character string identical with arbitrary preset password, this checking Password i.e. matches with this preset password.
Such as, user is if it is known that preset password is " 800008 ", then it can input " xx ... 800008 ... xx " As checking password, and by password authentification, wherein xx is any character.
Doing so and be advantageous in that, user, when input validation password, can input redundance character, and these The people peeping user's input validation password can be upset in redundance character so that it is is difficult to remember that what user inputted comprises The a lot of checking password of redundance character, and then make it be difficult to know real password effectively, play and prevent The effect of other people snooping password, protects cryptosecurity.
Optionally, in conjunction with aforesaid way two, coded lock record by the way two mode complete password and test The checking password of card, and when password authentification later receives same checking password, to associate device Send prompting message, or, it is desirable to user carry out secondary checking (can be the checking of other forms, it is possible to Think that requirement user inputs other checking password and verifies), or, so that this checking password is risky it is By, determine that password authentification is not passed through.
By the way, it is possible to the redundant code avoiding other people to be inputted by completely recorded user passes through password The situation of checking, it is ensured that cryptosecurity.
In the implementation that some are possible, coded lock is close in the checking being obtained user's input by input block During code, that is during user inputs passwords of visitors, coded lock prompting user inputs random character.
Concrete, in the mode two of abovementioned steps 704, user can be by the way of input redundance character Prevent other people from spying on password, but this needs user deliberately to input redundance character when input validation password, and The subconsciousness of this behavior and user deliberately inputting redundance character is contrary, and user is generally difficult to determine Concrete which redundance character of input, this brings puzzlement to user on the contrary.
In this implementation, coded lock, when user being detected at input validation password, can actively generate random Character is as redundance character, and points out user to input these redundance characters by Tip element 60, helps to use Family completes the input of redundance character, had both played the effect of cipher antipeeping, and will not bring to user again the most true Determine the puzzlement of redundance character.
In the implementation that some are possible, the judged result in step 704 then performs following steps when being no:
Step 707: if not existing in preset password set and the password of checking code matches, then coded lock Determine that password authentification is not passed through, and send alarm information to associate device.
Concrete, all of preset password all inputs with user in preset password set checking password is not Timing, coded lock determines that password authentification is not passed through, and sends alarm information to associate device, to inform user Other people just attempt to use illegal checking password to open coded lock.
Wherein, alarm information can also include the photographic head arranged on coded lock, or associate with coded lock The photo in separate camera gathered coded lock front, allow the user to that whom knows and open at view close Code lock, it is ensured that property safety.
Optionally, coded lock is specifically after the continuous frequency of failure of password authentification reaches threshold value t, just to association Equipment sends described alarm information, to reduce the interference to user.
In technique scheme, coded lock, after password authentification is not passed through, sends alarm information to associate device, User is carried out safety instruction, and then property safety can be protected in time.
Based on identical inventive concept, the embodiment of the present invention provides a kind of coded lock, with continued reference to Fig. 1, and should Coded lock includes processing unit 10, memory element 20, input block 30 and receives unit 40.
Wherein, unit 40 is received for receiving the passwords of visitors that associate device sends.
Memory element 20 is used for storing passwords of visitors and preset password set.
Input block 30 is for obtaining the character of user's input.
Processing unit 10 couples with reception unit 40, memory element 20 and input block 30 respectively, uses In passwords of visitors being added into preset password set, and pre-conditioned meet time by passwords of visitors from preset close Code set is deleted;And after input block 30 obtains the checking password of user's input, it is judged that preset close Whether code set exists and the password of checking code matches;If existing, it is determined that password authentification is passed through.
In a kind of possible implementation, receive unit 40 and be additionally operable to: receive deleting of associate device transmission Request except passwords of visitors;
Processing unit 10 is additionally operable to: response request, determines pre-conditioned satisfied.
In a kind of possible implementation, receive unit 40 and be additionally operable to: receive the visit that associate device sends The effective degree of visitor's password;
Processing unit 10 is additionally operable to: count the number of times being completed password authentification by passwords of visitors;And When number of times reaches effective degree, determine pre-conditioned satisfied.
In a kind of possible implementation, receive unit 40 and be additionally operable to: receive the visit that associate device sends The out-of-service time of visitor's password;
Processing unit 10 is additionally operable to: when the out-of-service time arrives, and determines pre-conditioned satisfied.
Whether, in a kind of possible implementation, processing unit 10 is used for: judge in preset password set Exist and the password of checking code matches, including: judge to verify in password whether exist and preset password collection The character string that in conjunction, arbitrary password is identical, the number of characters of described character string is less than the character of described checking password Number;If checking password existing the character string identical with the first preset password in preset password set, the most really Fixed first preset password and checking code matches.
In a kind of possible implementation, coded lock also includes Tip element 60, for carrying to user's output Show information;
Processing unit 10 is additionally operable to: during user inputs passwords of visitors, is carried by Tip element 60 Show that user inputs random character.
In a kind of possible implementation, coded lock also includes:
Transmitting element 50, for sending message to associate device;
Processing unit 10 is additionally operable to: do not exist in judging preset password set and checking code matches Password after, determine that password authentification is not passed through, and by transmitting element 50 to associate device send alarm disappear Breath.
The function that in above-mentioned coded lock, each component units is realized is referred in the method for password authentication of Fig. 2 respectively The implementation of step, and in coded lock the implementation of each component units refer to before to list each in Fig. 1 The description of unit, does not repeats them here.
The one or more technical schemes provided in the embodiment of the present invention, at least have the following technical effect that or excellent Point:
User can add passwords of visitors by associate device in coded lock so that other people can pass through visitor Password passes through password authentification, without revealing the core password of oneself.And passwords of visitors can be pre-conditioned It is deactivated when meeting, it is ensured that the safety of coded lock, and then realizes, in the case of protection coded lock safety, giving The authority verified by coded lock of other user's short-terms.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can use complete hardware embodiment, complete software implementation or knot The form of the embodiment in terms of conjunction software and hardware.And, the present invention can use and wherein wrap one or more Computer-usable storage medium containing computer usable program code (include but not limited to disk memory, CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and / or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart The function specified in flow process and/or one square frame of block diagram or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know base This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610164306.XA CN105844744A (en) | 2016-03-21 | 2016-03-21 | Password authentication method and password lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610164306.XA CN105844744A (en) | 2016-03-21 | 2016-03-21 | Password authentication method and password lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105844744A true CN105844744A (en) | 2016-08-10 |
Family
ID=56587796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610164306.XA CN105844744A (en) | 2016-03-21 | 2016-03-21 | Password authentication method and password lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105844744A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106530470A (en) * | 2016-12-14 | 2017-03-22 | 余仁植 | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system |
CN106934885A (en) * | 2017-02-20 | 2017-07-07 | 广东亚太天能科技股份有限公司 | Smart lock and remote unlocking method |
CN107295165A (en) * | 2017-06-09 | 2017-10-24 | 深圳市欧唯科技有限公司 | A kind of tamper-proof unlocking method based on fuzzy matching |
CN107301705A (en) * | 2017-06-29 | 2017-10-27 | 合肥步瑞吉智能家居有限公司 | A kind of intelligent lock control method of owner without line justification |
CN107331006A (en) * | 2017-06-29 | 2017-11-07 | 合肥步瑞吉智能家居有限公司 | A kind of intelligent wireless lock control system based on validation of information |
CN107464329A (en) * | 2017-09-26 | 2017-12-12 | 深圳市欧瑞博电子有限公司 | The temporary password management method of intelligent door lock, apparatus and system |
CN107785963A (en) * | 2017-10-31 | 2018-03-09 | 北京伊电园网络科技有限公司 | A kind of charging method and charging system |
CN108230496A (en) * | 2017-12-21 | 2018-06-29 | 广东汇泰龙科技有限公司 | A kind of time segment management method, system based on cloud lock account |
CN108449177A (en) * | 2018-03-16 | 2018-08-24 | 东莞盛世科技电子实业有限公司 | The use control method and system of temporary password |
CN108932771A (en) * | 2018-05-23 | 2018-12-04 | 王力安防科技股份有限公司 | A kind of long-range temporary Authorization, method for unlocking and system |
CN109285252A (en) * | 2018-09-29 | 2019-01-29 | 百度在线网络技术(北京)有限公司 | Lock control method and device |
CN109584425A (en) * | 2018-12-20 | 2019-04-05 | 合肥凌极西雅电子科技有限公司 | A kind of gate inhibition's method for managing security based on interim identity |
CN109636952A (en) * | 2017-10-05 | 2019-04-16 | 林劲璋 | Access control system and its management method |
CN110443925A (en) * | 2019-08-06 | 2019-11-12 | 深圳市沃特沃德股份有限公司 | Generation method, device, storage medium and the computer equipment of temporary password |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4256051B2 (en) * | 2000-03-31 | 2009-04-22 | パナソニック株式会社 | RFID tag device |
CN104504789A (en) * | 2014-12-05 | 2015-04-08 | 深圳天珑无线科技有限公司 | Access control management method and access control management device |
CN104835232A (en) * | 2015-05-25 | 2015-08-12 | 郭萌 | Voice-control lock |
CN104966017A (en) * | 2015-07-13 | 2015-10-07 | 广东欧珀移动通信有限公司 | Password input protection system and method |
CN104966336A (en) * | 2015-05-29 | 2015-10-07 | 深圳光启智能光子技术有限公司 | Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus |
CN105243715A (en) * | 2015-10-28 | 2016-01-13 | 成都卫士通信息产业股份有限公司 | Dynamic two-dimensional bar code based automatic registration method and system for district visiting users |
-
2016
- 2016-03-21 CN CN201610164306.XA patent/CN105844744A/en not_active Application Discontinuation
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4256051B2 (en) * | 2000-03-31 | 2009-04-22 | パナソニック株式会社 | RFID tag device |
CN104504789A (en) * | 2014-12-05 | 2015-04-08 | 深圳天珑无线科技有限公司 | Access control management method and access control management device |
CN104835232A (en) * | 2015-05-25 | 2015-08-12 | 郭萌 | Voice-control lock |
CN104966336A (en) * | 2015-05-29 | 2015-10-07 | 深圳光启智能光子技术有限公司 | Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus |
CN104966017A (en) * | 2015-07-13 | 2015-10-07 | 广东欧珀移动通信有限公司 | Password input protection system and method |
CN105243715A (en) * | 2015-10-28 | 2016-01-13 | 成都卫士通信息产业股份有限公司 | Dynamic two-dimensional bar code based automatic registration method and system for district visiting users |
Non-Patent Citations (2)
Title |
---|
罗家坤,陈建英: "《互联网+智能家居:颠覆与重构传统家居产业链》", 31 December 2015 * |
金纯: "《BLE低功耗蓝牙技术开发指南》", 31 January 2016 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106530470A (en) * | 2016-12-14 | 2017-03-22 | 余仁植 | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system |
CN106934885A (en) * | 2017-02-20 | 2017-07-07 | 广东亚太天能科技股份有限公司 | Smart lock and remote unlocking method |
CN107295165A (en) * | 2017-06-09 | 2017-10-24 | 深圳市欧唯科技有限公司 | A kind of tamper-proof unlocking method based on fuzzy matching |
CN107301705A (en) * | 2017-06-29 | 2017-10-27 | 合肥步瑞吉智能家居有限公司 | A kind of intelligent lock control method of owner without line justification |
CN107331006A (en) * | 2017-06-29 | 2017-11-07 | 合肥步瑞吉智能家居有限公司 | A kind of intelligent wireless lock control system based on validation of information |
CN107464329A (en) * | 2017-09-26 | 2017-12-12 | 深圳市欧瑞博电子有限公司 | The temporary password management method of intelligent door lock, apparatus and system |
CN109636952A (en) * | 2017-10-05 | 2019-04-16 | 林劲璋 | Access control system and its management method |
CN107785963A (en) * | 2017-10-31 | 2018-03-09 | 北京伊电园网络科技有限公司 | A kind of charging method and charging system |
CN107785963B (en) * | 2017-10-31 | 2020-11-24 | 杭州小电科技股份有限公司 | Charging method and charging system |
CN108230496A (en) * | 2017-12-21 | 2018-06-29 | 广东汇泰龙科技有限公司 | A kind of time segment management method, system based on cloud lock account |
CN108449177A (en) * | 2018-03-16 | 2018-08-24 | 东莞盛世科技电子实业有限公司 | The use control method and system of temporary password |
CN108932771A (en) * | 2018-05-23 | 2018-12-04 | 王力安防科技股份有限公司 | A kind of long-range temporary Authorization, method for unlocking and system |
CN109285252A (en) * | 2018-09-29 | 2019-01-29 | 百度在线网络技术(北京)有限公司 | Lock control method and device |
CN109584425A (en) * | 2018-12-20 | 2019-04-05 | 合肥凌极西雅电子科技有限公司 | A kind of gate inhibition's method for managing security based on interim identity |
CN110443925A (en) * | 2019-08-06 | 2019-11-12 | 深圳市沃特沃德股份有限公司 | Generation method, device, storage medium and the computer equipment of temporary password |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9531548B2 (en) | Security system for handheld wireless devices using time-variable encryption keys | |
CN107038777B (en) | Safety communication method based on intelligent door lock system and intelligent door lock system thereof | |
CN104380764B (en) | For the method for the customer data base for the characteristic of vehicle being registered in Internet Server equipment | |
CN103488924B (en) | A kind of unlocking processing method of terminal, device and equipment | |
US10073960B1 (en) | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use | |
US9391985B2 (en) | Environment-based two-factor authentication without geo-location | |
US10008054B2 (en) | Smart door lock | |
US8467770B1 (en) | System for securing a mobile terminal | |
CN102695166B (en) | Protection to the safety element being coupled to NFC circuit | |
CN104012168B (en) | Simplified mobile communication equipment | |
US8045961B2 (en) | Systems for wireless authentication based on bluetooth proximity | |
US8260262B2 (en) | Systems for three factor authentication challenge | |
JP4848360B2 (en) | Wireless authentication method and wireless authentication system | |
US7810146B2 (en) | Security device, terminal device, gate device, and device | |
CN105303659B (en) | A kind of gate inhibition's personal identification method and device based on ultrasonic wave | |
US7257374B1 (en) | Automatic security locking method and system for wireless-enabled devices | |
CN104517336B (en) | Yunmen access control system and its implementation based on mobile internet | |
US7882541B2 (en) | Authentication system in information processing terminal using mobile information processing device | |
CN103204134B (en) | Vehicle operating authority authorizes system and vehicle operating authority control method | |
CN103607536B (en) | The control method and camera of camera | |
CN102547502B (en) | Headset, headset use control method and terminal | |
US8750797B2 (en) | Proximity access and alarm apparatus | |
JP4245151B2 (en) | Mobile phone with use restriction function and method of restricting use of the machine | |
US7400906B2 (en) | Mobile communication terminal | |
CN103328278B (en) | For the method that mobile phone is matched with motor vehicles and lock/unlock device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
C06 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
C10 | Entry into substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170303 Address after: Room 501, building, Tianfu Software Park, hi tech Zone, Sichuan, Chengdu, China, D5 Applicant after: Hu Jiaan Address before: 610000 Tianfu Software Park, Tianfu Avenue, Sichuan, Chengdu D7-303 Applicant before: CHENGDU IDW SENSING TECHNOLOGY CO., LTD. Effective date of registration: 20170303 Address after: Room 501, building, Tianfu Software Park, hi tech Zone, Sichuan, Chengdu, China, D5 Applicant after: Hu Jiaan Address before: 610000 Tianfu Software Park, Tianfu Avenue, Sichuan, Chengdu D7-303 Applicant before: CHENGDU IDW SENSING TECHNOLOGY CO., LTD. |
|
C41 | Transfer of patent application or patent right or utility model | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160810 |
|
RJ01 | Rejection of invention patent application after publication |