CN105844744A - Password authentication method and password lock - Google Patents
Password authentication method and password lock Download PDFInfo
- Publication number
- CN105844744A CN105844744A CN201610164306.XA CN201610164306A CN105844744A CN 105844744 A CN105844744 A CN 105844744A CN 201610164306 A CN201610164306 A CN 201610164306A CN 105844744 A CN105844744 A CN 105844744A
- Authority
- CN
- China
- Prior art keywords
- password
- coded lock
- visitors
- passwords
- checking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
A password authentication method and a password lock are used for solving the problem that a password of a password lock is not safe due to authority limit of other persons to open the password lock. The password authentication method includes the following steps: the password lock receives a visitor password sent by a related device; the visitor password is added to a preset password set by the password lock, and the visitor password is deleted from the preset password set when preset conditions are satisfied; the password lock obtains an authentication password inputted by a user; and whether the preset password set has a password matched with the authentication password is judged, if the preset password set has the password matched with the authentication password, the password authentication is determined to pass by the password lock.
Description
Technical field
The present invention relates to information security field, particularly to a kind of method verifying password and coded lock.
Background technology
At present, a lot of places are provided with coded lock, such as gate inhibition, antitheft door, luggage case, safety cabinet etc..
When using coded lock, it is ensured that the safety of password is most important.
But, during a lot of situation, user needs to allow others open coded lock, accesses if any friend to family and oneself
The when that oneself not yet getting home, can want to allow friend advanced person family wait.But, if informing friend's coded lock
Password, by dangerous for the password causing coded lock.
Summary of the invention
The application provides a kind of method verifying password and coded lock, is used for solving because opening coded lock to other people
Authority cause the unsafe problem of coded lock password.
First aspect, the embodiment of the present invention provides a kind of method of password authentication, including: coded lock receives association
The passwords of visitors that equipment sends;Described passwords of visitors is added into preset password set by described coded lock, and
Pre-conditioned described passwords of visitors is deleted from described preset password set when meeting;Described coded lock obtains
The checking password of user's input;And judge whether described preset password set exists and described checking password phase
The password of coupling;If existing, the most described coded lock determines that password authentification is passed through.
In above-mentioned implementation, user can add passwords of visitors by associate device in coded lock so that
Other people can be by passwords of visitors by password authentification, without revealing the core password of oneself.And visitor
Password can pre-conditioned meet time be deactivated, it is ensured that the safety of coded lock, so realize protection coded lock
In the case of safety, to the authority verified by coded lock of other user's short-terms.
In the implementation that some are possible, described method also includes: described coded lock receives described association and sets
The request deleting described passwords of visitors that preparation is sent;Described coded lock responds described request, determines described presetting
Condition meets.In this implementation, user can manual invalid passwords of visitors, it is ensured that close after visitor leaves
The safety of code lock.
In the implementation that some are possible, described method also includes: described coded lock receives described association and sets
The effective degree of the described passwords of visitors that preparation is sent;Described coded lock completes password to by described passwords of visitors
The number of times of checking counts;When described number of times reaches described effective degree, described coded lock determines described
Pre-conditioned satisfied.In this implementation, the inefficacy machine that coded lock will be set by associate device based on user
Make invalid passwords of visitors, it is ensured that the safety of coded lock after visitor leaves.
In the implementation that some are possible, described method also includes: described coded lock receives described association and sets
The out-of-service time of the described passwords of visitors that preparation is sent;When the described out-of-service time arrives, described coded lock determines
Described pre-conditioned satisfied.In this implementation, the mistake that coded lock will be set by associate device based on user
Imitate machine-processed invalid passwords of visitors, it is ensured that the safety of coded lock after visitor leaves.
In the implementation that some are possible, described coded lock judges whether exist in described preset password set
With the password of described checking code matches, including: described coded lock judges whether deposit in described checking password
In the character string identical with arbitrary password in described preset password set, the number of characters of described character string is less than institute
State the number of characters of checking password;If described checking password existing pre-with first in described preset password set
If the character string that password is identical, the most described coded lock determines described first preset password and described checking password phase
Coupling.By this implementation, user can input the checking password comprising preset password and redundance character,
Other people are difficult to peep record valid password when by password authentification to make user, protect cryptosecurity.
In the implementation that some are possible, described method also includes: input the process of passwords of visitors user
In, described coded lock prompting user inputs random character.
In the implementation that some are possible, whether deposit in described coded lock judges described preset password set
With the password of described checking code matches after, described method also includes: if described preset password set
In do not exist and the password of described checking code matches, the most described coded lock determines that password authentification is not passed through,
And send alarm information to described associate device.By this implementation, coded lock does not passes through in password authentification
After, send alarm information to associate device, user is carried out safety instruction, and then can protect in time
Property safety.
Second aspect, the embodiment of the present invention provides a kind of coded lock, including: receive unit, be used for receiving association
The passwords of visitors that equipment sends;Memory element, is used for storing described passwords of visitors and preset password set;
Input block, for obtaining the character of user's input;Processing unit, with described reception unit, described storage
Unit and the coupling of described input block, for described passwords of visitors being added into described preset password set,
And pre-conditioned meet time described passwords of visitors is deleted from described preset password set;And described
After input block obtains the checking password of user's input, it is judged that whether described preset password set exists and institute
State the password of checking code matches;If existing, it is determined that password authentification is passed through.
In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends
Delete described passwords of visitors request;Described processing unit is additionally operable to: respond described request, determines described
Pre-conditioned satisfied.
In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends
The effective degree of described passwords of visitors;Described processing unit is additionally operable to: complete by described passwords of visitors
The number of times of password authentification counts;And when described number of times reaches described effective degree, determine described presetting
Condition meets.
In the implementation that some are possible, described reception unit is additionally operable to: receives described associate device and sends
Out-of-service time of described passwords of visitors;Described processing unit is additionally operable to: when the described out-of-service time arrives,
Determine described pre-conditioned satisfied.
In the implementation that some are possible, described processing unit is used for: judge in described preset password set
Whether exist and the password of described checking code matches, including: judge whether described checking password exists
The character string identical with arbitrary password in described preset password set, the number of characters of described character string is less than described
The number of characters of checking password;Preset with first in described preset password set if described checking password exists
The character string that password is identical, it is determined that described first preset password and described checking code matches.
In the implementation that some are possible, described coded lock also includes: Tip element, for defeated to user
Go out information;Described processing unit is additionally operable to: during user inputs passwords of visitors, by described
Tip element prompting user inputs random character.
In the implementation that some are possible, described coded lock also includes: transmitting element, for described pass
Connection equipment sending message;Described processing unit is additionally operable to: do not exist in judging described preset password set
After the password of described checking code matches, determine that password authentification is not passed through, and by described transmitting element
Alarm information is sent to described associate device.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below
The accompanying drawing used is needed to briefly introduce, it should be apparent that, the accompanying drawing in describing below is only the present invention's
Some embodiments, from the point of view of those of ordinary skill in the art, in the premise not paying creative work
Under, it is also possible to other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the structural schematic block diagram of coded lock in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of method of password authentication in the embodiment of the present invention.
Detailed description of the invention
Below by accompanying drawing and specific embodiment, technical solution of the present invention is described in detail, it should be understood that
Specific features in the embodiment of the present invention and embodiment is the detailed description to technical solution of the present invention, and
It not the restriction to technical solution of the present invention, in the case of not conflicting, the embodiment of the present invention and embodiment
In technical characteristic can be mutually combined.
Coded lock in the embodiment of the present invention can be arranged on antitheft door, safety cabinet, luggage case.Reference
Fig. 1, coded lock includes processing unit 10, memory element 20, input block 30 and receives unit 40.
Wherein, processing unit 10 is the control centre of coded lock, utilizes various interface and connection whole
The various piece of coded lock, by running self-curing instruction or being stored in the instruction in memory element 20
And call the data being stored in memory element 20, perform the various functions of coded lock and process data,
Thus realize password authentification.Optionally, processing unit 10 can include one or more treatment element, specifically
, processing unit 10 can be central processing unit (Central Processing Unit;It is called for short: CPU),
Can also be specific integrated circuit (Application Specific Intergrated Circuit;It is called for short: ASIC),
Or it is configured to implement one or more integrated circuits of the embodiment of the present invention, such as: one or more
Microprocessor (digital singnal processor;It is called for short: DSP), or, one or more scene can be compiled
Journey gate array (Field Programmable Gate Array;It is called for short: FPGA).Preferably, processing unit
10 can be integrated with modem processor, and wherein, modem processor mainly processes radio communication.Permissible
Being understood by, above-mentioned modem processor can not also be integrated in processing unit 10.Implement at some
In example, processing unit 10, memory element 20 can realize on one chip, in certain embodiments,
They can also realize on independent chip respectively.
Described memory element 20 can be used for storing instruction and data, it may include one or more memory elements.
Memory element 20 can mainly include storing instruction area and storage data field, and storage data field can store default close
Password, the checking password of user's input or the request of coded lock reception or data etc. in code set;Storage refers to
Make district can store the instruction etc. needed for the operating system of coded lock, at least one function.
The implementation of input block 30 includes: one, and input block 30 is for be provided with the defeated of physical button
Entering panel, each physical button is corresponding with character, and user, can be defeated by pressing the button on TIP
Enter the checking password for password authentification.Its two, input block 30 is touch screen, is specifically as follows vector
Pressure sensing technology touch screen, resistive technologies touch screen, capacitance technology touch screen, infrared technology touch screen,
Surface acoustic wave technique touch screen, etc..Touch screen as input block 30 can show virtual key,
User can input the checking password for password authentification by touching virtual key.Optionally, input block
30 can also obtain the track pattern with virtual key as node that user inputs on the touchscreen, this trajectory diagram
Case or can be combined as verifying password with character string separately as verifying password.
Receive unit 40 for receiving the information that ext nal network element sends.In the embodiment of the present invention, coded lock can
To be associated with one or more communication equipments (such as panel computer, smart mobile phone, intelligent watch etc.),
And receive association communication equipment send request or data, such as, receive unit 40 can set from association
Standby locating receives interpolation or deletes the request of passwords of visitors, or receives the carrying out coded lock of associate device transmission
The parameter of configuration, etc..Generally, receive unit and include but not limited to antenna, at least one amplifier, receipts
Letter machine, bonder, low-noise amplifier (Low Noise Amplifier, LNA) etc..Receive unit 40
Arbitrary communication standard or agreement can be used, include but not limited to: global system for mobile communications (Global
System of Mobile communication;GSM), general packet radio service (General it is called for short:
Packet Radio Service;GPRS), CDMA (Code Division Multiple Access it is called for short:;
CDMA), WCDMA (Wideband Code Division Multiple Access it is called for short:;It is called for short:
WCDMA), Long Term Evolution (Long Term Evolution;Be called for short: LTE), the 5th third-generation mobile communication
System (The fifth generation mobile communication system;5G), Wi-Fi it is called for short:
Communication, bluetooth (Bluetooth) communicate, infrared (Infrared) communicates, purple honeybee (Zigbee) communicates,
Near-field communication (Near Field Communication;It is called for short: NFC).
In the implementation that some are possible, coded lock also includes transmitting element 50, for sending out to other networks
Delivering letters breath, such as, transmitting element 50 can send the daily record of password authentification to associate device, or close
Code checking repeatedly failure backward association equipment sends alarm information.In the embodiment of the present invention, transmitting element 50
Can integrate with receiving unit 40, it is also possible to be respectively two elements.Transmitting element 50 include but
It is not limited to antenna, at least one amplifier, sender, bonder, low-noise amplifier (Low Noise
Amplifier, LNA) etc..Communication standard or agreement that transmitting element 50 uses refer to receive unit 40.
In the implementation that some are possible, coded lock also includes Tip element 60, for exporting letter to user
Breath.Such as, when input block 30 is the TIP being provided with physical button, Tip element 60 is permissible
For being arranged on the warning light on this physical button, by lighting warning light, prompting is used for pressing this warning light pair
The physical button answered.The most such as, when the touch screen that input block 30 is display virtual key, for right
The Tip element 60 that user carries out pointing out can be input block 30 itself, and input block 30 can pass through
The display mode changing virtual key (as changed the brightness of virtual key, color, or makes virtual key dodge
Bright, mobile, etc.), prompting is for pressing the virtual key that this display mode changes.
Although not shown, coded lock can also include photographic head, warning light, audio output device, power supply,
Wireless charger etc..
It addition, in the embodiment of the present invention, the mode that coded lock and associate device are associated includes: one,
Coded lock by account log in remotely administered server set up is connected, and associate device login same account and
Remotely administered server is set up and is connected, and then, remotely administered server can be as coded lock and associate device
Between data transmission and the transfer of signalling, coded lock completes to associate with associate device.Its two, password
By machine and machine (Machine to Machine between lock and associate device;It is called for short: M2M) communication
Network sets up connection association of matching, or, coded lock and associate device are by purple honeybee (Zigbee) network
Connect and match association, or, code lock and associate device are connected by NFC mode and match, or,
Code lock is connected by bluetooth approach with associate device and matches.
The schematic flow sheet of the method for password authentication that Fig. 2 provides for the embodiment of the present invention, the method includes as follows
Step:
Step 701: coded lock receives the passwords of visitors that associate device sends;
Step 702: passwords of visitors is added into preset password set by coded lock;
Step 703: coded lock obtains the checking password of user's input;
Step 704: whether coded lock judges to exist in preset password set and the password of checking code matches;
The most then perform step 705;
Step 705: when there is the password with checking code matches in preset password set, coded lock is true
Determine password authentification to pass through;
Step 706: coded lock pre-conditioned meet time passwords of visitors is deleted from preset password set.
Concrete, in the embodiment of the present invention, the password in preset password set is that default allowing users to is led to
Cross the password of password authentification, in other words, if the password of user's input and arbitrary password in preset password set
Match, then password authentification is passed through.
Under normal circumstances, preset password set includes the core password that user uses, when user needs
When allowing other people open coded lock, if informing others' core password, then core password can be caused to reveal, user
Have to change core password afterwards, the most inconvenient.
In order to solve this problem, in the embodiment of the present invention, user can arrange passwords of visitors by associate device,
And by associate device, passwords of visitors is sent to coded lock, this passwords of visitors is added to default close by coded lock
Among code set.At this moment, if the checking password having user to input mates with this passwords of visitors, then user's energy
Enough by password authentification, open coded lock.
Further, pre-conditioned meet time, coded lock can delete this passwords of visitors from preset password set,
Make this passwords of visitors lose efficacy, and this default volume condition manually can be triggered by user, or coded lock based on
It is pre-conditioned that the inefficacy mechanism set triggers this.
As long as it addition, step 706 performs after step 702, do not limit itself and step 703~step
The sequencing of 705.
In technique scheme, user can add passwords of visitors by associate device in coded lock so that
Other people can be by passwords of visitors by password authentification, without revealing the core password of oneself.And visitor
Password can pre-conditioned meet time be deactivated, it is ensured that the safety of coded lock, so realize protection coded lock
In the case of safety, to the authority verified by coded lock of other user's short-terms.
Optionally, in the embodiment of the present invention, coded lock judges whether to meet pre-conditioned, includes but not limited to
Following manner:
Mode 1, user manually deletes passwords of visitors.
Coded lock receives the request of the deletion passwords of visitors that associate device sends;Coded lock response request, determines
Pre-conditioned satisfied.
Concrete, user can manually delete passwords of visitors by associate device, and this deletion is visited by associate device
The request of visitor's password sends after coded lock, and coded lock upon receipt of the request, i.e. can determine that default
Condition meets, and triggers the deletion of passwords of visitors so that passwords of visitors is invalid.In practical situation, user also may be used
Directly to carry out deleting the operation of passwords of visitors on coded lock.
Mode 2, user setup passwords of visitors inefficacy mechanism, coded lock allows coded lock lose efficacy according to this mechanism.
Inefficacy mechanism one, coded lock receives the effective degree of the passwords of visitors that associate device sends;Coded lock pair
The number of times being completed password authentification by passwords of visitors is counted;When number of times reaches effective degree, coded lock
Determine pre-conditioned satisfied.
Concrete, user arranges passwords of visitors by associate device and lost efficacy after using k time, then association sets
Sending to coded lock for by this effective degree k, wherein, associate device can be while sending passwords of visitors
This effective degree k is sent to coded lock, it is also possible to send effectively to coded lock sending the rear of passwords of visitors
Number of times.
Coded lock is after the checking password inputting user is verified, if the password being verified is close with visitor
Code coupling, then count.When counting reaches effective degree k, show to use passwords of visitors to pass through close
The number of times of code checking reaches k, and coded lock will delete visitor based on inefficacy mechanism one from preset password set
Password, makes passwords of visitors lose efficacy.
Inefficacy mechanism two, coded lock receives the out-of-service time of the passwords of visitors that associate device sends;When losing efficacy
Between arrive time, coded lock determine pre-conditioned meet.
Concrete, user arranges passwords of visitors by associate device and lost efficacy after the out-of-service time, then association sets
Sending to coded lock for by this out-of-service time, wherein, associate device can be incited somebody to action while sending passwords of visitors
This out-of-service time send to coded lock, it is also possible to send passwords of visitors rear to coded lock send lost efficacy time
Between.
Coded lock after receiving the out-of-service time, the no matter checking what state of this passwords of visitors, just based on
Inefficacy mechanism two, deletes passwords of visitors from preset password set, makes passwords of visitors lose efficacy.
Inefficacy mechanism three, in conjunction with aforementioned inefficacy mechanism one, in the case of user is not provided with effective degree, close
Effective degree is set to the default value k of acquiescence by code lock1, such as default value k1Value be 1 time, in other words, visit
In visitor's password disposably, if there being user by this passwords of visitors by password authentification, then coded lock is immediately
From preset password set, delete this passwords of visitors, make passwords of visitors lose efficacy.
Inefficacy mechanism four, in conjunction with aforementioned inefficacy mechanism two, in the case of user is not provided with the out-of-service time, close
Out-of-service time is set to the moment after receiving the acquiescence duration of passwords of visitors by code lock, such as during acquiescence a length of 3
Hour, coded lock will make passwords of visitors lose efficacy after receiving passwords of visitors 3 hours.
By any of the above-described mode, it is possible to make passwords of visitors be deactivated, it is ensured that give other people passes through coded lock
Authority be short-term, interim, ensure coded lock safety.
In the implementation that some are possible, step 704: coded lock judges whether deposit in preset password set
At the password with checking code matches, include but not limited to mode implemented as described below:
Mode one, strict matching way.That is, checking password and the first preset password in preset password set
Time identical, checking password just mates with first password.
Mode two, Redundancy Match mode.That is, coded lock judges to verify in password whether exist and preset password
The character string that in set, arbitrary password is identical, the number of characters of this character string is less than the number of characters of checking password;?
When there is the character string identical with the first preset password in preset password set in checking password, first presets
Password and checking code matches.
Concrete, so-called Redundancy Match mode refers to user and can input the character string being longer than preset password
As checking password, as long as this checking password includes the character string identical with arbitrary preset password, this checking
Password i.e. matches with this preset password.
Such as, user is if it is known that preset password is " 800008 ", then it can input " xx ... 800008 ... xx "
As checking password, and by password authentification, wherein xx is any character.
Doing so and be advantageous in that, user, when input validation password, can input redundance character, and these
The people peeping user's input validation password can be upset in redundance character so that it is is difficult to remember that what user inputted comprises
The a lot of checking password of redundance character, and then make it be difficult to know real password effectively, play and prevent
The effect of other people snooping password, protects cryptosecurity.
Optionally, in conjunction with aforesaid way two, coded lock record by the way two mode complete password and test
The checking password of card, and when password authentification later receives same checking password, to associate device
Send prompting message, or, it is desirable to user carry out secondary checking (can be the checking of other forms, it is possible to
Think that requirement user inputs other checking password and verifies), or, so that this checking password is risky it is
By, determine that password authentification is not passed through.
By the way, it is possible to the redundant code avoiding other people to be inputted by completely recorded user passes through password
The situation of checking, it is ensured that cryptosecurity.
In the implementation that some are possible, coded lock is close in the checking being obtained user's input by input block
During code, that is during user inputs passwords of visitors, coded lock prompting user inputs random character.
Concrete, in the mode two of abovementioned steps 704, user can be by the way of input redundance character
Prevent other people from spying on password, but this needs user deliberately to input redundance character when input validation password, and
The subconsciousness of this behavior and user deliberately inputting redundance character is contrary, and user is generally difficult to determine
Concrete which redundance character of input, this brings puzzlement to user on the contrary.
In this implementation, coded lock, when user being detected at input validation password, can actively generate random
Character is as redundance character, and points out user to input these redundance characters by Tip element 60, helps to use
Family completes the input of redundance character, had both played the effect of cipher antipeeping, and will not bring to user again the most true
Determine the puzzlement of redundance character.
In the implementation that some are possible, the judged result in step 704 then performs following steps when being no:
Step 707: if not existing in preset password set and the password of checking code matches, then coded lock
Determine that password authentification is not passed through, and send alarm information to associate device.
Concrete, all of preset password all inputs with user in preset password set checking password is not
Timing, coded lock determines that password authentification is not passed through, and sends alarm information to associate device, to inform user
Other people just attempt to use illegal checking password to open coded lock.
Wherein, alarm information can also include the photographic head arranged on coded lock, or associate with coded lock
The photo in separate camera gathered coded lock front, allow the user to that whom knows and open at view close
Code lock, it is ensured that property safety.
Optionally, coded lock is specifically after the continuous frequency of failure of password authentification reaches threshold value t, just to association
Equipment sends described alarm information, to reduce the interference to user.
In technique scheme, coded lock, after password authentification is not passed through, sends alarm information to associate device,
User is carried out safety instruction, and then property safety can be protected in time.
Based on identical inventive concept, the embodiment of the present invention provides a kind of coded lock, with continued reference to Fig. 1, and should
Coded lock includes processing unit 10, memory element 20, input block 30 and receives unit 40.
Wherein, unit 40 is received for receiving the passwords of visitors that associate device sends.
Memory element 20 is used for storing passwords of visitors and preset password set.
Input block 30 is for obtaining the character of user's input.
Processing unit 10 couples with reception unit 40, memory element 20 and input block 30 respectively, uses
In passwords of visitors being added into preset password set, and pre-conditioned meet time by passwords of visitors from preset close
Code set is deleted;And after input block 30 obtains the checking password of user's input, it is judged that preset close
Whether code set exists and the password of checking code matches;If existing, it is determined that password authentification is passed through.
In a kind of possible implementation, receive unit 40 and be additionally operable to: receive deleting of associate device transmission
Request except passwords of visitors;
Processing unit 10 is additionally operable to: response request, determines pre-conditioned satisfied.
In a kind of possible implementation, receive unit 40 and be additionally operable to: receive the visit that associate device sends
The effective degree of visitor's password;
Processing unit 10 is additionally operable to: count the number of times being completed password authentification by passwords of visitors;And
When number of times reaches effective degree, determine pre-conditioned satisfied.
In a kind of possible implementation, receive unit 40 and be additionally operable to: receive the visit that associate device sends
The out-of-service time of visitor's password;
Processing unit 10 is additionally operable to: when the out-of-service time arrives, and determines pre-conditioned satisfied.
Whether, in a kind of possible implementation, processing unit 10 is used for: judge in preset password set
Exist and the password of checking code matches, including: judge to verify in password whether exist and preset password collection
The character string that in conjunction, arbitrary password is identical, the number of characters of described character string is less than the character of described checking password
Number;If checking password existing the character string identical with the first preset password in preset password set, the most really
Fixed first preset password and checking code matches.
In a kind of possible implementation, coded lock also includes Tip element 60, for carrying to user's output
Show information;
Processing unit 10 is additionally operable to: during user inputs passwords of visitors, is carried by Tip element 60
Show that user inputs random character.
In a kind of possible implementation, coded lock also includes:
Transmitting element 50, for sending message to associate device;
Processing unit 10 is additionally operable to: do not exist in judging preset password set and checking code matches
Password after, determine that password authentification is not passed through, and by transmitting element 50 to associate device send alarm disappear
Breath.
The function that in above-mentioned coded lock, each component units is realized is referred in the method for password authentication of Fig. 2 respectively
The implementation of step, and in coded lock the implementation of each component units refer to before to list each in Fig. 1
The description of unit, does not repeats them here.
The one or more technical schemes provided in the embodiment of the present invention, at least have the following technical effect that or excellent
Point:
User can add passwords of visitors by associate device in coded lock so that other people can pass through visitor
Password passes through password authentification, without revealing the core password of oneself.And passwords of visitors can be pre-conditioned
It is deactivated when meeting, it is ensured that the safety of coded lock, and then realizes, in the case of protection coded lock safety, giving
The authority verified by coded lock of other user's short-terms.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can use complete hardware embodiment, complete software implementation or knot
The form of the embodiment in terms of conjunction software and hardware.And, the present invention can use and wherein wrap one or more
Computer-usable storage medium containing computer usable program code (include but not limited to disk memory,
CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention
The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and
/ or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding
The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating
The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one
The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set
In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory
Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart
The function specified in flow process and/or one square frame of block diagram or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know base
This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted
Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention
Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and
Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.
Claims (14)
1. a method of password authentication, it is characterised in that including:
Coded lock receives the passwords of visitors that associate device sends;
Described passwords of visitors is added into preset password set by described coded lock, and pre-conditioned meet time will
Described passwords of visitors is deleted from described preset password set;
Described coded lock obtains the checking password of user's input;And
Judge whether described preset password set exists and the password of described checking code matches;
If existing, the most described coded lock determines that password authentification is passed through.
2. the method for claim 1, it is characterised in that described method also includes:
Described coded lock receives the request deleting described passwords of visitors that described associate device sends;
Described coded lock responds described request, determines described pre-conditioned satisfied.
3. the method for claim 1, it is characterised in that described method also includes:
Described coded lock receives the effective degree of the described passwords of visitors that described associate device sends;
The number of times being completed password authentification by described passwords of visitors is counted by described coded lock;
When described number of times reaches described effective degree, described coded lock determines described pre-conditioned satisfied.
4. the method for claim 1, it is characterised in that described method also includes:
Described coded lock receives the out-of-service time of the described passwords of visitors that described associate device sends;
When the described out-of-service time arrives, described coded lock determines described pre-conditioned satisfied.
5. the method as according to any one of claim 1-4, it is characterised in that described coded lock judges
Whether described preset password set exists and the password of described checking code matches, including:
Whether described coded lock judges to exist in described checking password arbitrary close with described preset password set
The character string that code-phase is same, the number of characters of described character string is less than the number of characters of described checking password;
If described checking password exists the word identical with the first preset password in described preset password set
Symbol string, the most described coded lock determines described first preset password and described checking code matches.
6. the method as according to any one of claim 1-4, it is characterised in that described method also includes:
During user inputs passwords of visitors, described coded lock prompting user inputs random character.
7. the method as described in any one of claim 1-4, it is characterised in that judge at described coded lock
Whether described preset password set exists with the password of described checking code matches after, described method is also
Including:
If described preset password set not existing and the password of described checking code matches, the most described password
Lock determines that password authentification is not passed through, and sends alarm information to described associate device.
8. a coded lock, it is characterised in that including:
Receive unit, for receiving the passwords of visitors that associate device sends;
Memory element, is used for storing described passwords of visitors and preset password set;
Input block, for obtaining the character of user's input;
Processing unit, couples with described reception unit, described memory element and described input block, is used for
Described passwords of visitors is added into described preset password set, and pre-conditioned meet time by close for described visitor
Code is deleted from described preset password set;And the checking password of user's input is obtained at described input block
After, it is judged that whether described preset password set exists and the password of described checking code matches;If existing,
Then determine that password authentification is passed through.
9. coded lock as claimed in claim 8, it is characterised in that described reception unit is additionally operable to: connect
Receive the request deleting described passwords of visitors that described associate device sends;
Described processing unit is additionally operable to: respond described request, determines described pre-conditioned satisfied.
10. coded lock as claimed in claim 8, it is characterised in that described reception unit is additionally operable to: connect
Receive the effective degree of the described passwords of visitors that described associate device sends;
Described processing unit is additionally operable to: count the number of times being completed password authentification by described passwords of visitors
Number;And when described number of times reaches described effective degree, determine described pre-conditioned satisfied.
11. coded locks as claimed in claim 8, it is characterised in that described reception unit is additionally operable to: connect
Receive the out-of-service time of the described passwords of visitors that described associate device sends;
Described processing unit is additionally operable to: when the described out-of-service time arrives, and determines described pre-conditioned satisfied.
12. coded locks as according to any one of claim 8-11, it is characterised in that described process list
Unit is used for: judge whether exist in described preset password set and the password of described checking code matches, bag
Include:
Judge whether described checking password exists the word identical with arbitrary password in described preset password set
Symbol string, the number of characters of described character string is less than the number of characters of described checking password;
If described checking password exists the word identical with the first preset password in described preset password set
Symbol string, it is determined that described first preset password and described checking code matches.
13. coded locks as according to any one of claim 8-11, it is characterised in that described coded lock
Also include:
Tip element, for exporting information to user;
Described processing unit is additionally operable to: during user inputs passwords of visitors, by described Tip element
Prompting user inputs random character.
14. coded locks as described in any one of claim 8-10, it is characterised in that described coded lock is also
Including:
Transmitting element, for sending message to described associate device;
Described processing unit is additionally operable to: do not exist close with described checking in judging described preset password set
After the password of code-phase coupling, determine that password authentification is not passed through, and set to described association by described transmitting element
Preparation send alarm information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610164306.XA CN105844744A (en) | 2016-03-21 | 2016-03-21 | Password authentication method and password lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610164306.XA CN105844744A (en) | 2016-03-21 | 2016-03-21 | Password authentication method and password lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105844744A true CN105844744A (en) | 2016-08-10 |
Family
ID=56587796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610164306.XA Pending CN105844744A (en) | 2016-03-21 | 2016-03-21 | Password authentication method and password lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105844744A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106530470A (en) * | 2016-12-14 | 2017-03-22 | 余仁植 | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system |
CN106934885A (en) * | 2017-02-20 | 2017-07-07 | 广东亚太天能科技股份有限公司 | Smart lock and remote unlocking method |
CN107295165A (en) * | 2017-06-09 | 2017-10-24 | 深圳市欧唯科技有限公司 | A kind of tamper-proof unlocking method based on fuzzy matching |
CN107301705A (en) * | 2017-06-29 | 2017-10-27 | 合肥步瑞吉智能家居有限公司 | A kind of intelligent lock control method of owner without line justification |
CN107331006A (en) * | 2017-06-29 | 2017-11-07 | 合肥步瑞吉智能家居有限公司 | A kind of intelligent wireless lock control system based on validation of information |
CN107464329A (en) * | 2017-09-26 | 2017-12-12 | 深圳市欧瑞博电子有限公司 | The temporary password management method of intelligent door lock, apparatus and system |
CN107785963A (en) * | 2017-10-31 | 2018-03-09 | 北京伊电园网络科技有限公司 | A kind of charging method and charging system |
CN108230496A (en) * | 2017-12-21 | 2018-06-29 | 广东汇泰龙科技有限公司 | A kind of time segment management method, system based on cloud lock account |
CN108449177A (en) * | 2018-03-16 | 2018-08-24 | 东莞盛世科技电子实业有限公司 | The use control method and system of temporary password |
CN108932771A (en) * | 2018-05-23 | 2018-12-04 | 王力安防科技股份有限公司 | A kind of long-range temporary Authorization, method for unlocking and system |
CN109285252A (en) * | 2018-09-29 | 2019-01-29 | 百度在线网络技术(北京)有限公司 | Lock control method and device |
CN109584425A (en) * | 2018-12-20 | 2019-04-05 | 合肥凌极西雅电子科技有限公司 | A kind of gate inhibition's method for managing security based on interim identity |
CN109636952A (en) * | 2017-10-05 | 2019-04-16 | 林劲璋 | Access control system and its management method |
CN110443925A (en) * | 2019-08-06 | 2019-11-12 | 深圳市沃特沃德股份有限公司 | Generation method, device, storage medium and the computer equipment of temporary password |
CN112819999A (en) * | 2020-12-31 | 2021-05-18 | 重庆房慧科技有限公司 | Intelligent security system |
CN114495329A (en) * | 2022-01-21 | 2022-05-13 | 珠海格力电器股份有限公司 | Intelligent door lock unlocking method and device, storage medium and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4256051B2 (en) * | 2000-03-31 | 2009-04-22 | パナソニック株式会社 | RFID tag device |
CN104504789A (en) * | 2014-12-05 | 2015-04-08 | 深圳天珑无线科技有限公司 | Access control management method and access control management device |
CN104835232A (en) * | 2015-05-25 | 2015-08-12 | 郭萌 | Voice-control lock |
CN104966336A (en) * | 2015-05-29 | 2015-10-07 | 深圳光启智能光子技术有限公司 | Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus |
CN104966017A (en) * | 2015-07-13 | 2015-10-07 | 广东欧珀移动通信有限公司 | Password input protection system and method |
CN105243715A (en) * | 2015-10-28 | 2016-01-13 | 成都卫士通信息产业股份有限公司 | Dynamic two-dimensional bar code based automatic registration method and system for district visiting users |
-
2016
- 2016-03-21 CN CN201610164306.XA patent/CN105844744A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4256051B2 (en) * | 2000-03-31 | 2009-04-22 | パナソニック株式会社 | RFID tag device |
CN104504789A (en) * | 2014-12-05 | 2015-04-08 | 深圳天珑无线科技有限公司 | Access control management method and access control management device |
CN104835232A (en) * | 2015-05-25 | 2015-08-12 | 郭萌 | Voice-control lock |
CN104966336A (en) * | 2015-05-29 | 2015-10-07 | 深圳光启智能光子技术有限公司 | Intelligent lock, intelligent lock authorization management method, and intelligent lock authorization management apparatus |
CN104966017A (en) * | 2015-07-13 | 2015-10-07 | 广东欧珀移动通信有限公司 | Password input protection system and method |
CN105243715A (en) * | 2015-10-28 | 2016-01-13 | 成都卫士通信息产业股份有限公司 | Dynamic two-dimensional bar code based automatic registration method and system for district visiting users |
Non-Patent Citations (3)
Title |
---|
周洪涛: "《智能大厦控制系统》", 31 October 2007 * |
罗家坤,陈建英: "《互联网+智能家居:颠覆与重构传统家居产业链》", 31 December 2015 * |
金纯: "《BLE低功耗蓝牙技术开发指南》", 31 January 2016 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106530470A (en) * | 2016-12-14 | 2017-03-22 | 余仁植 | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system |
CN106934885A (en) * | 2017-02-20 | 2017-07-07 | 广东亚太天能科技股份有限公司 | Smart lock and remote unlocking method |
CN107295165A (en) * | 2017-06-09 | 2017-10-24 | 深圳市欧唯科技有限公司 | A kind of tamper-proof unlocking method based on fuzzy matching |
CN107301705A (en) * | 2017-06-29 | 2017-10-27 | 合肥步瑞吉智能家居有限公司 | A kind of intelligent lock control method of owner without line justification |
CN107331006A (en) * | 2017-06-29 | 2017-11-07 | 合肥步瑞吉智能家居有限公司 | A kind of intelligent wireless lock control system based on validation of information |
CN107464329A (en) * | 2017-09-26 | 2017-12-12 | 深圳市欧瑞博电子有限公司 | The temporary password management method of intelligent door lock, apparatus and system |
CN109636952A (en) * | 2017-10-05 | 2019-04-16 | 林劲璋 | Access control system and its management method |
CN107785963A (en) * | 2017-10-31 | 2018-03-09 | 北京伊电园网络科技有限公司 | A kind of charging method and charging system |
CN107785963B (en) * | 2017-10-31 | 2020-11-24 | 杭州小电科技股份有限公司 | Charging method and charging system |
CN108230496A (en) * | 2017-12-21 | 2018-06-29 | 广东汇泰龙科技有限公司 | A kind of time segment management method, system based on cloud lock account |
CN108449177A (en) * | 2018-03-16 | 2018-08-24 | 东莞盛世科技电子实业有限公司 | The use control method and system of temporary password |
US11657128B2 (en) | 2018-03-16 | 2023-05-23 | Smart Electronic Industrial (Dong Guan) Co., Ltd. | Temporary password usage control method and system |
CN108932771A (en) * | 2018-05-23 | 2018-12-04 | 王力安防科技股份有限公司 | A kind of long-range temporary Authorization, method for unlocking and system |
CN109285252A (en) * | 2018-09-29 | 2019-01-29 | 百度在线网络技术(北京)有限公司 | Lock control method and device |
CN109285252B (en) * | 2018-09-29 | 2021-08-10 | 百度在线网络技术(北京)有限公司 | Vehicle lock control method and device |
CN109584425A (en) * | 2018-12-20 | 2019-04-05 | 合肥凌极西雅电子科技有限公司 | A kind of gate inhibition's method for managing security based on interim identity |
CN110443925A (en) * | 2019-08-06 | 2019-11-12 | 深圳市沃特沃德股份有限公司 | Generation method, device, storage medium and the computer equipment of temporary password |
CN112819999A (en) * | 2020-12-31 | 2021-05-18 | 重庆房慧科技有限公司 | Intelligent security system |
CN114495329A (en) * | 2022-01-21 | 2022-05-13 | 珠海格力电器股份有限公司 | Intelligent door lock unlocking method and device, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105844744A (en) | Password authentication method and password lock | |
CN104657643B (en) | Method for protecting privacy, wearable device and mobile terminal | |
US8594563B2 (en) | Security for wireless communication | |
CN109844823A (en) | The positioning of PEPS portable device | |
JP4524306B2 (en) | Authorization method | |
KR101296863B1 (en) | Entry authentication system using nfc door lock | |
CN105610842B (en) | A kind of WIFI hot spot cut-in method and mobile device | |
CN104537291A (en) | Screen interface unlocking method and screen interface unlocking device | |
CN206522020U (en) | A kind of intelligent door lock and system | |
CN106027250B (en) | A kind of ID card information safe transmission method and system | |
CN108257266A (en) | A kind of multi-functional smart lock | |
CN104574616B (en) | Intelligent electronic door lock control method and control device | |
CN102945526A (en) | Device and method for improving online payment security of mobile equipment | |
CN105848151A (en) | WiFi access point equipment, WiFi access authentication control method and WiFi access authentication control device | |
CN105898750A (en) | WiFi access point equipment and WiFi access authentication method and device | |
CN105488871A (en) | Entrance guard control method, apparatus, terminal and control server | |
JP2006319649A (en) | Portable terminal, and its use restriction method | |
CN204375038U (en) | A kind of intelligent electronic lock control device | |
CN102413146A (en) | Client authorized logon method based on dynamic codes | |
CN105516974A (en) | Router connection method, terminal and router | |
CN105898749A (en) | Portable access end equipment and WiFi access authentication method and device | |
KR101831381B1 (en) | Method of smart login using messenger service and device thereof | |
CN105072084B (en) | The method for building up of mobile terminal and external equipment data connection | |
CN105022950A (en) | Information processing method and electronic device | |
CN105022951A (en) | Information processing method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170303 Address after: Room 501, building, Tianfu Software Park, hi tech Zone, Sichuan, Chengdu, China, D5 Applicant after: Hu Jiaan Address before: 610000 Tianfu Software Park, Tianfu Avenue, Sichuan, Chengdu D7-303 Applicant before: CHENGDU IDW SENSING TECHNOLOGY CO., LTD. |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160810 |
|
RJ01 | Rejection of invention patent application after publication |