CN107483581A - The method of password authentication of shared equipment, shared equipment, cloud server and system - Google Patents

The method of password authentication of shared equipment, shared equipment, cloud server and system Download PDF

Info

Publication number
CN107483581A
CN107483581A CN201710703147.0A CN201710703147A CN107483581A CN 107483581 A CN107483581 A CN 107483581A CN 201710703147 A CN201710703147 A CN 201710703147A CN 107483581 A CN107483581 A CN 107483581A
Authority
CN
China
Prior art keywords
password
user
equipment
clouds
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710703147.0A
Other languages
Chinese (zh)
Other versions
CN107483581B (en
Inventor
杨赛赛
苗岑岑
李喜林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201710703147.0A priority Critical patent/CN107483581B/en
Publication of CN107483581A publication Critical patent/CN107483581A/en
Priority to PCT/CN2018/090666 priority patent/WO2019033840A1/en
Application granted granted Critical
Publication of CN107483581B publication Critical patent/CN107483581B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention discloses a kind of method of password authentication of shared equipment,Shared equipment,Cloud server and system,By by the password in corresponding high in the clouds cryptographic libraries in shared equipment beyond the clouds server,The password in the equipment end cryptographic libraries of equipment is shared with this,Using identical preset password create-rule,So that user is before using shared equipment,The demand information to equipment to be used can be utilized,First from password corresponding to the extraction of high in the clouds cryptographic libraries,The password is obtained to demand information using preset password create-rule in advance,Then by the Password Input to shared equipment,When shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself,Using the password and default password create-rule found,Determine the demand information of user,So as to realize server beyond the clouds and shared equipment in the case where network need not be connected,The synchronous checking of complete paired secret.

Description

The method of password authentication of shared equipment, shared equipment, cloud server and system
Technical field
The present invention relates to shared equipment technical field, in particular, is related to a kind of method of password authentication of shared equipment Shared equipment, cloud server and system.
Background technology
In recent years, the various shared equipment with automatic payment function are risen, and such as shared bicycle, shared electric car, are shared Automobile, shared washing machine etc..These share the very easy to use quick of equipment, and user can be as needed, download corresponding Client is simultaneously registered, and when needing to use accordingly shared equipment, is logged in corresponding client, is inputted the volume of shared equipment to be used Code obtains PUK, or realizes unlocking by way of directly scanning the identification code in shared equipment to be used.Using Bi Hou, by paying on the net.
These shared equipment have one it is common the characteristics of:Require connect to internet or and mobile terminal, such as hand Machine, synchronizing information between user could be realized by establishing short-range wireless communication, realize password authentification, therefore, shared equipment is led to All often there is wireless module.
Because the password verification process for sharing equipment need to be based on real-time performance, hence in so that the use of shared equipment is by net Network limits, and the risk of the dangerous attack in internet be present, therefore, how to provide a kind of method of password authentication of shared equipment, with Shared equipment and cloud server is set to realize the synchronization of password between user and shared equipment in the case where network need not be connected Checking becomes the technical problem of those skilled in the art's urgent need to resolve.
The content of the invention
In view of this, the present invention discloses a kind of method of password authentication of shared equipment, shared equipment, cloud server and is System, to realize shared equipment and cloud server in the case where network need not be connected, can still realize user and shared equipment it Between crypto-sync verification process.
A kind of method of password authentication of shared equipment, applied to cloud server, the cloud server has multiple clouds Cryptographic libraries are held, the corresponding shared equipment of each high in the clouds cryptographic libraries, methods described includes:
Obtain the equipment identities of the shared equipment to be used of user's input, the high in the clouds according to corresponding to determining the equipment identities Cryptographic libraries;
Obtain the user profile of user's input and the demand information to the shared equipment to be used;
A high in the clouds password group is chosen from the high in the clouds cryptographic libraries, and by the high in the clouds password group and the user profile Recorded in the form of corresponding relation;
Password corresponding with the demand information is extracted from the high in the clouds password group, wherein, the password is advance The password for using preset password create-rule to obtain to the demand information;
Give the cipher feedback to the user so that the user using the shared equipment to be used when, by institute Password described in shared equipment utilization to be used is stated, searches whether to be stored with from the equipment end cryptographic libraries of itself identical with the password Password, if it is, determining the demand of the user using the password and the preset password create-rule that find Information, complete the synchronization to the password and verify.
Preferably, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user, Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule The set of caused all passwords.
Preferably, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponding one Position user, each shared equipment is in all passwords of equipment end password library storage and to share the corresponding high in the clouds of equipment close with this Password in code storehouse, it is that the demand information of user is generated using identical preset password create-rule.
Preferably, after the cloud server completes charge in the user, there is provided when password gives the user, from institute State and password corresponding with the demand information is extracted in the password group of high in the clouds, specifically include:
The expense for needing the user to pay corresponding with the demand information is extracted from the high in the clouds password group;
After detecting that the user has paid the expense, extracted and the demand information from the high in the clouds password group Corresponding password.
Preferably, after detecting that the user has paid the expense, from the high in the clouds password group extract with it is described Password corresponding to demand information, is specifically included:
After detecting that the user has paid the expense, extract from the high in the clouds password group and believe with the demand Password corresponding to breath, and mark user class, wherein, when multiple users need payment expense, the user class according to The sequencing that family completes to pay determines that the time that user completes to pay is more forward, and corresponding user class is higher;
Give the cipher feedback to the user so that the user using the shared equipment to be used when, by institute Password described in shared equipment utilization to be used is stated, searches whether to be stored with from the equipment end cryptographic libraries of itself identical with the password Password, if it is, determining the demand information of the user using the password found, complete to the same of the password Step is demonstrate,proved, and is specifically included:
Give the cipher feedback to the user so that the user using the shared equipment to be used when, by institute Password described in shared equipment utilization to be used is stated, searches whether to be stored with from the equipment end cryptographic libraries of itself identical with the password Password, if it is, determine the user class and demand information of the user, complete the synchronization to the password and verify.
Preferably, equipment all in all high in the clouds password groups and the equipment end cryptographic libraries in the high in the clouds cryptographic libraries End password is mined massively with identical password classification hierarchy plan.
A kind of method of password authentication of shared equipment, applied to shared equipment to be used, methods described includes:
User's password that cryptographic libraries obtain beyond the clouds is obtained, the password is in advance to demand information using preset password life The password obtained into rule, the demand information are demand information of the user to the shared equipment to be used;
Search whether to be stored with and the password identical password from the equipment end cryptographic libraries of itself using the password;
If it is, the demand for determining the user using the password and the preset password create-rule that find is believed Breath, complete the synchronization to the password and verify.
Preferably, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user, Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule The set of caused all passwords.
Preferably, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponding one Position user, each shared equipment is in all passwords of equipment end password library storage and to share the corresponding high in the clouds of equipment close with this Password in code storehouse, it is that the demand information of user is generated using identical preset password create-rule.
Preferably, it is described to search whether to be stored with and the password phase from the equipment end cryptographic libraries of itself using the password Same password, is specifically included:
In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself, Search whether to be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used Shared equipment has obtained but untapped password.
Preferably, it is described to search whether to be stored with and the password phase from the equipment end cryptographic libraries of itself using the password Same password, is specifically included:
When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password, Then from the equipment end cryptographic libraries caused equipment end password group, search whether to be stored with close with the password identical Code.
Preferably, it is identical with the password when being found from the equipment end cryptographic libraries caused equipment end password group Password, it is described using searching and when the rank of high in the clouds password group, the rank of equipment end password group are consistent with user class three To password and the preset password create-rule determine the demand information of the user, complete the same step to the password Card, is specifically included:
The user class and demand letter of the user is determined using the password and the preset password create-rule that find Breath, complete the synchronization to the password and verify.
Preferably, after the synchronous checking to the password is completed, in addition to:
The untapped equipment end password group for being superior to the user class is put into the valid password reserved area;
Delete the equipment end password group that all ranks are less than the user class.
Preferably, after it is determined that the demand information of the user, completing to the synchronous checking of the password, in addition to:
The password being proved to be successful is deleted.
Preferably, in addition to:
When not found with the password identical password from the equipment end cryptographic libraries, prompt message is exported, it is described Prompt message is used to prompt user to re-enter password.
A kind of cloud server, the cloud server have multiple high in the clouds cryptographic libraries, and each high in the clouds cryptographic libraries is corresponding One shared equipment, the cloud server include:
First acquisition unit, the equipment identities of the shared equipment to be used for obtaining user's input, according to the equipment High in the clouds cryptographic libraries corresponding to identity determination;
Second acquisition unit, for obtaining the user profile of user's input and to the shared equipment to be used Demand information;
Unit is chosen, for choosing a high in the clouds password group from the high in the clouds cryptographic libraries, and by the high in the clouds password group Recorded with the user profile in the form of corresponding relation;
Extraction unit, for extracting password corresponding with the demand information from the high in the clouds password group, wherein, institute The password for stating password to use preset password create-rule to obtain the demand information in advance;
Feedback unit, for giving the cipher feedback to the user, so that the user is using described to be used common When enjoying equipment, the password as described in the shared equipment utilization to be used, search whether to be stored with from the equipment end cryptographic libraries of itself With the password identical password, if it is, described in being determined using the password found and the preset password create-rule The demand information of user, complete the synchronization to the password and verify.
Preferably, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user, Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule The set of caused all passwords.
Preferably, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponding one Position user, each shared equipment is in all passwords of equipment end password library storage and to share the corresponding high in the clouds of equipment close with this Password in code storehouse, it is that the demand information of user is generated using identical preset password create-rule.
Preferably, after the cloud server completes charge in the user, there is provided described when password gives the user Extraction unit includes:
First extraction subelement, corresponding with the demand information needs institute for being extracted from the high in the clouds password group State the expense of user's payment;
Second extraction subelement, for after detecting that the user has paid the expense, from the high in the clouds password group Extract password corresponding with the demand information.
Preferably, the second extraction subelement is specifically used for:
After detecting that the user has paid the expense, extract from the high in the clouds password group and believe with the demand Password corresponding to breath, and mark user class, wherein, when multiple users need payment expense, the user class according to The sequencing that family completes to pay determines that the time that user completes to pay is more forward, and corresponding user class is higher;
The feedback unit is specifically used for:
Give the cipher feedback to the user so that the user using the shared equipment to be used when, by institute Password described in shared equipment utilization to be used is stated, searches whether to be stored with from the equipment end cryptographic libraries of itself identical with the password Password, if it is, determine the user class and demand information of the user, complete the synchronization to the password and verify.
Preferably, equipment all in all high in the clouds password groups and the equipment end cryptographic libraries in the high in the clouds cryptographic libraries End password is mined massively with identical password classification hierarchy plan.
A kind of shared equipment, including:
3rd acquiring unit, for obtaining user's password that cryptographic libraries obtain beyond the clouds, the password is in advance to demand Information uses the password that preset password create-rule obtains, and the demand information is the user to the shared equipment to be used Demand information;
Searching unit, for searching whether to be stored with and the password from the equipment end cryptographic libraries of itself using the password Identical password;
Authentication unit, for determining the demand of the user using the password and the preset password create-rule that find Information, complete the synchronization to the password and verify.
Preferably, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user, Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule The set of caused all passwords.
Preferably, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponding one Position user, each shared equipment is in all passwords of equipment end password library storage and to share the corresponding high in the clouds of equipment close with this Password in code storehouse, it is that the demand information of user is generated using identical preset password create-rule.
Preferably, the searching unit is specifically used for:
In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself, Search whether to be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used Shared equipment has obtained but untapped password.
Preferably, the searching unit is specifically used for:
When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password, Then from the equipment end cryptographic libraries caused equipment end password group, search whether to be stored with close with the password identical Code.
Preferably, it is identical with the password when being found from the equipment end cryptographic libraries caused equipment end password group Password, and when the rank of high in the clouds password group, the rank of equipment end password group are consistent with user class three, the authentication unit It is specifically used for:
The user class and demand letter of the user is determined using the password and the preset password create-rule that find Breath, complete the synchronization to the password and verify.
Preferably, in addition to:
Placement unit, for after the synchronous checking to the password is completed, the user class will to be superior to Untapped equipment end password group is put into the valid password reserved area;
First deletes unit, and the equipment end password group of the user class is less than for deleting all ranks.
Preferably, in addition to:
Second deletes unit, for it is determined that the demand information of the user, completes the synchronization to the password and verify it Afterwards, the password being proved to be successful is deleted.
Preferably, in addition to:
Output unit, for when not found with the password identical password from the equipment end cryptographic libraries, exporting Prompt message, the prompt message are used to prompt user to re-enter password.
A kind of password validation system of shared equipment, including cloud server described above and at least one described above Shared equipment.
It was found from above-mentioned technical scheme, the invention discloses a kind of method of password authentication of shared equipment, shared equipment, Cloud server and system, by by the password in corresponding high in the clouds cryptographic libraries in shared equipment beyond the clouds server, and this is common The password in the equipment end cryptographic libraries of equipment is enjoyed, using identical preset password create-rule so that user is set using shared Before standby, the demand information to equipment to be used can be utilized, it is pre- from password, the password corresponding to the extraction of high in the clouds cryptographic libraries first First demand information is obtained using preset password create-rule, then by the Password Input to shared equipment, when shared equipment from When the equipment end cryptographic libraries of itself find password corresponding with the password, using the password found and the life of default password Into rule, the demand information of user is determined, is verified so as to the synchronization of complete paired secret.Therefore, the present invention realizes takes beyond the clouds Business device and shared equipment, based on identical password create-rule, realize user and shared in the case where that need not connect network Crypto-sync verification process between equipment, so that the use of shared equipment is no longer influenced by network limitation, and then effectively keep away The risk of the dangerous attack in internet is exempted from.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis Disclosed accompanying drawing obtains other accompanying drawings.
Fig. 1 is a kind of method of password authentication stream of the shared equipment based on cloud server side disclosed in the embodiment of the present invention Cheng Tu;
Fig. 2 is the corresponding relation of a kind of expense disclosed in the embodiment of the present invention, password, high in the clouds password group and high in the clouds cryptographic libraries Schematic diagram;
Fig. 3 is a kind of cloud server disclosed in the embodiment of the present invention and the corresponding relation schematic diagram of a shared equipment;
Fig. 4 is a kind of method of password authentication flow of the shared equipment based on shared equipment side disclosed in the embodiment of the present invention Figure;
Fig. 5 is a kind of structural representation of cloud server disclosed in the embodiment of the present invention;
Fig. 6 is a kind of structural representation of shared equipment disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of method of password authentication of shared equipment, shared equipment, cloud server and it is System, to realize shared equipment and cloud server in the case where network need not be connected, can still realize user and shared equipment it Between crypto-sync verification process.
Referring to Fig. 1, a kind of method of password authentication flow chart of shared equipment disclosed in one embodiment of the invention, this method should For cloud server, the cloud server has multiple with least one shared equipment into corresponding relation, the cloud server High in the clouds cryptographic libraries, the corresponding shared equipment of each high in the clouds cryptographic libraries, methods described include step:
Step S101, the equipment identities of the shared equipment to be used of user's input are obtained, are determined according to the equipment identities Corresponding high in the clouds cryptographic libraries;
In actual applications, user can be obtained altogether by the Quick Response Code of the shared equipment of the terminal scannings such as mobile phone, IPAD The equipment identities of equipment are enjoyed, the equipment identities namely device identification.Certainly, user can also be obtained shared using other modes The equipment identities of equipment, such as by the way that the identity code printed in shared equipment is inputted into computer to obtain the equipment body of shared equipment Part.
Wherein, each shared equipment has unique corresponding equipment identities therewith.
Step S102, the user profile of user's input and the demand information to shared equipment to be used are obtained;
Specifically, user profile refers specifically to the identity information of user, such as ID card No..
Demand information for sharing equipment, is illustrated, it is assumed that shared equipment is shared washing machine, then user is to altogether Enjoying the demand information of washing machine includes:Laundry duration, rinsing times, wash temperature, rotating speed etc..
Step S103, a high in the clouds password group is chosen from the high in the clouds cryptographic libraries, and by the high in the clouds password group and institute User profile is stated to be recorded in the form of corresponding relation;
In the present embodiment, a high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group is corresponding one User, each high in the clouds password group are to be directed to arrangement group of the shared equipment in different operating situation according to preset password create-rule The set of lower caused all passwords is closed, namely the required institute using shared equipment of user is included in the password group of each high in the clouds There is something special.Illustration, it is assumed that shared equipment is shared washing machine, and user washes to sharing the demand information of washing machine namely sharing The working condition of clothing machine is:A length of 30 minutes during laundry, laundry mode is:Rinsing plus primary dewatering, kinds of laundry are twice:Lining Shirt, formula is generated according to these demand informations and preset password create-rule such as password, obtain one with the demand information only A password corresponding to one.
By the way that shared washing machine is produced into institute according to permutation and combination of the preset password create-rule in the case of different operating There is the set of password, namely obtain a high in the clouds password group.
When being arranged in order in high in the clouds password group beyond the clouds cryptographic libraries, can using arrange foremost high in the clouds password group as The high in the clouds password group of selection, it is of course also possible to randomly choose a high in the clouds password group.
Wherein, it is by the purpose that high in the clouds password group and user profile are recorded in the form of corresponding relation:Realize shared The system of real name that equipment uses, to avoid the user to not up to age requirement from providing service, such as shared bicycle is needed using user Over 12 one full year of life, while it is subsequently that user buys the offer conditions such as personal personal accidental death and injury insurance and third party liability insurance to be.
In actual applications, different ranks can be set to each high in the clouds password group included in the cryptographic libraries of high in the clouds, together When, different grades is set to user, the rank of user, user are such as determined according to all previous total degree using shared equipment of user The number used is more, and the rank of user is higher, and the user of same rank and high in the clouds password faciation are corresponding.
Therefore, the implementation procedure of this step is specially:Multiple high in the clouds passwords corresponding to shared equipment to be used are determined first Group, secondly, user class, and the high in the clouds password group according to corresponding to determining user class are determined according to user profile.
Step S104, password corresponding with demand information is extracted from the password group of high in the clouds;
Wherein, the password is to use the password that preset password create-rule obtains to the demand information in advance, namely The password is to be directed to share equipment caused by under the permutation and combination of different working conditions according to preset password create-rule, because This, the working condition of information namely shared equipment, can extract corresponding password from the password group of high in the clouds according to demand.
Step S105, by cipher feedback to user, so that user when using shared equipment to be used, is shared by be used Equipment utilization password and the equipment end cryptographic libraries of itself, determine the demand information of user, the synchronous checking of complete paired secret.
Specifically, high in the clouds cryptographic libraries by the cipher feedback found to user, user when using shared equipment to be used, The password is inputted to shared equipment to be used, shared equipment utilization password to be used searches whether from the equipment end cryptographic libraries of itself The password identical password with user's input is stored with, if it is, being generated using the password found and the preset password Rule determines the demand information of user, the synchronous checking of complete paired secret.
Wherein, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group is corresponding one User, each shared equipment equipment end password library storage all passwords and with the high in the clouds password that to share equipment corresponding Password in storehouse, it is that the demand information of user is generated using identical preset password create-rule, so, shares equipment root The password obtained according to user from high in the clouds cryptographic libraries, you can determine the demand information of user.
To sum up, the method for password authentication of shared equipment disclosed by the invention, by by shared equipment beyond the clouds server Password in password in corresponding high in the clouds cryptographic libraries, and the equipment end cryptographic libraries of the shared equipment, is preset close using identical Code create-rule so that user can utilize the demand information to equipment to be used, first from cloud before using shared equipment Password corresponding to cryptographic libraries extraction is held, the password is obtained using preset password create-rule to demand information, then should in advance Password Input is to shared equipment, when shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself, The available password found and default password create-rule, the demand information of user is determined, so that complete paired secret is same Step is demonstrate,proved.Therefore, the present invention realizes server beyond the clouds and shared equipment in the case where that need not connect network, based on identical Password create-rule, the crypto-sync verification process between user and shared equipment is realized, so that shared equipment Limited using network is no longer influenced by, and then effectively prevent the risk of the dangerous attack in internet.
Further, since method disclosed by the invention establishes network connection without shared between equipment and cloud server, because This, for traditional scheme, the present invention also eliminates the wireless module set on a sharing device, so as to save shared set Standby hardware cost.
It is appreciated that time requirement of the different shared equipment to payment can be different, such as shared washing machine, when user determines After demand information to sharing washing machine, share washing machine can and generate corresponding expense according to these demand informations;Compare again Such as shared bicycle, due to that can not know the usage time of user in advance, therefore can not determine the expense of user in advance, for this kind of Shared equipment, it can be paid again after user is using completion.
For user in the scheme for having used shared equipment to pay again, reference can be made to existing scheme, here is omitted.
The scheme of shared equipment is reused for user's post-pay paystation, reference can be made to following examples.
In above-described embodiment, after cloud server completes charge in user, when just providing password to the user, step S104 is specifically included:
The expense for needing user to pay corresponding with demand information is extracted from the password group of high in the clouds;
After detecting that user has paid expense, password corresponding with demand information is extracted from high in the clouds password group.
Based on the present embodiment as can be seen that expense and password are all to be extracted according to user's request from high in the clouds password group , such as shared washing machine, laundry duration that cloud server selects according to user, rotating speed, wash temperature can be close from high in the clouds Code group finds a corresponding expense for needing user to pay, and after user pays successfully, cloud server can be supplied to One corresponding password of user.
Wherein, the corresponding relation of expense, password, high in the clouds password group and high in the clouds cryptographic libraries can be found in the schematic diagram shown in Fig. 2, In Fig. 2, high in the clouds cryptographic libraries include multiple high in the clouds password groups, as high in the clouds password group 1, high in the clouds password group 2 ... high in the clouds password group X, the corresponding user of each high in the clouds password group, multiple users correspond to multiple high in the clouds password groups, in actual applications, all High in the clouds password group can be according to rank priority permutation and combination into high in the clouds cryptographic libraries, and each high in the clouds password group is according to preset password Create-rule is directed to the set of shared equipment caused all passwords under the permutation and combination of different operating situation, namely each Comprising the required all situations using shared equipment of user in the password group of high in the clouds, such as, the high in the clouds password group X in Fig. 2, share The different working condition of equipment includes factor:(1) that shares equipment uses duration, such as 5 minutes, 10 minutes, 20 minutes;(2) number Amount, by taking shared washing machine as an example, the quantity, which can refer to user, needs washed quantity, such as 1,2,3;(3) variable (change in such as Fig. 2 Amount 3, variable N) refer to influence the variable factors for sharing equipment mode of operation and expense, different durations may be considered some change An element under amount, a kind of variable can include multiple element, such as element a, element b, element c.The arrangement of different factors Combination produces a password and the unique expense corresponding with the password, and in Fig. 2, password a is corresponding with expense a, password b and Expense b is corresponding, and password c is corresponding with expense c, and password d is corresponding with expense d, and password e is corresponding with Gebuehr.
It should be noted that cloud server and at least one shared equipment is into corresponding relation, cloud server and each Individual shared equipment can form a system, and cloud server and multiple shared equipment form multiple systems, in practical application In, same system will ensure preset password create-rule (bag used by equipment end cryptographic libraries and corresponding high in the clouds cryptographic libraries Include the algorithm and encryption principle of password generation) it is consistent, the preset password create-rule between different systems can be different.And And also need to ensure that the password in a number of high in the clouds password group that continuously generates of high in the clouds cryptographic libraries can not repeat.
Preferably, in above-described embodiment, own in the cryptographic libraries of high in the clouds in all high in the clouds password groups and equipment end cryptographic libraries Equipment end password group can use identical password classification hierarchy plan, that is to say, that for same user same demand believe Breath, corresponding high in the clouds password group is identical with the rank of equipment end password group, and password in the password group of high in the clouds and equipment end are close Preset password create-rule is identical used by password in code group, but in the password and equipment end password group in the password group of high in the clouds Time caused by password can be with identical, can also be different.
For convenience of search password, in actual applications, the scheme of shared equipment is reused for post-pay paystation, can according to The sequencing paid is completed at family, determines user class, and when multiple users need payment expense, the time that user pays more leans on Before, corresponding user class is higher, rank, the rank phase of equipment end password group of user class and corresponding high in the clouds password group Together.
Referring to Fig. 3, a kind of cloud server disclosed in one embodiment of the invention and the corresponding relation of a shared equipment show It is intended to, wherein, the corresponding relation of a cloud server and a shared equipment is only shown in Fig. 3, in actual applications, can be with One cloud server corresponds to multiple shared equipment, and corresponding high in the clouds cryptographic libraries separate multiple shared equipment in server beyond the clouds Management, complementation influence.
Understood with reference to Fig. 2 and Fig. 3, when user inputs different demand informations to high in the clouds cryptographic libraries, such as time, Working mould Formula, quantity, variable three, the variable fourth class, different passwords can be obtained from high in the clouds cryptographic libraries, wherein, different users can obtain Different password, as user 1 obtains password 1, the acquisition password 2 of user 2, the acquisition password 3 of user 3, the acquisition password 4 of user 4, user 5 obtain password 5 etc..
In actual applications, high in the clouds password group can be subjected to partition of the level, direction shown in arrow, high in the clouds are close along Fig. 3 The grade of code group gradually rises, and due to the corresponding user of a high in the clouds password group, each user can cloud corresponding to slave phase Password group is held to obtain password, therefore, in embodiment illustrated in fig. 3, the grade of 1~password of password 5 gradually rises.
In shared equipment side, equipment end cryptographic libraries include multiple equipment end password group, each such as equipment end password group 1~5 The corresponding user of individual equipment end password group, as equipment end password group 5 is corresponding with user 5, the password in equipment end password group with Preset password create-rule is identical used by password in the password group of high in the clouds.
If partition of the level is carried out to high in the clouds password group, then, accordingly, can also rank be carried out to equipment end password group and drawn Point, the direction shown in arrow along Fig. 3, the grade of equipment end password group gradually rises.
Wherein, user gradation, equipment end password group grade are identical with the grade of high in the clouds password group grade three.
In actual applications, peer user uses peer device end password group, and each peer device end password group can normal rounds Change, certainly, in some cases, user can also bypass the immediate leadership using equipment end password group, as in Fig. 3 user 2 normally should use set Standby end password group 2, however, in some cases, user 2 can also use equipment end password group 3, now, can be by inferior grade Equipment end password group 1 and equipment end password group 2 are placed into valid password reserved area, are used with next time.
For further optimization above-described embodiment, after detecting that user has paid expense, extract from high in the clouds password group and The process of password corresponding to demand information, it can specifically include:
After detecting that user has paid the expense, extracted from the password group of high in the clouds corresponding with the demand information Password, and user class is marked, wherein, when multiple users need payment expense, the user class completes branch according to user The sequencing paid determines that the time that user completes to pay is more forward, and corresponding user class is higher.
It should be noted that cloud server is supplied to the password of user, it is from high in the clouds corresponding with user class password What the demand information inputted in group according to user extracted, for example, shared washing machine, the demand information of user include:Washing Time is 30 minutes, is rinsed 2 times, is dehydrated 1 time, cloud server is according to these demand informations, from cloud corresponding with user class Hold password corresponding to extraction in password group.
Accordingly, step S105 is specifically included:
By cipher feedback to user, so that user is when using the shared equipment to be used, by described to be used shared Password described in equipment utilization, from the equipment end cryptographic libraries of itself search whether to be stored with the password identical password, if It is, it is determined that the user class and demand information of the user, complete the synchronization to the password and verify.
Wherein, user can input in digital form when inputting password to shared equipment, or by shared equipment according to The caused self-service identification of two-dimension code credential after user's payment expense, or with password voice recognition mode input etc..
It should be noted that password is that nongraded system arranges in equipment end password group, only password is input by a user To shared equipment, and just there are dividing for rank, and the rank of password and the rank phase of corresponding equipment end password group after determining use Together.
Referring to Fig. 4, a kind of method of password authentication flow chart of shared equipment, this method disclosed in another embodiment of the present invention Applied to shared equipment to be used, such as shared bicycle of the shared equipment to be used, shared electric car, shared washing machine, the party Method includes step:
Step S201, user's password that cryptographic libraries obtain beyond the clouds is obtained;
Wherein, the password is to use the password that preset password create-rule obtains, the demand to demand information in advance Information is demand information of the user to the shared equipment to be used.
User beyond the clouds cryptographic libraries obtain password process can be found in embodiment illustrated in fig. 1, here is omitted.
Step S202, search whether to be stored with and password identical password from the equipment end cryptographic libraries of itself using password;
Wherein, equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponds to a user, Each shared equipment is shared in the corresponding high in the clouds cryptographic libraries of equipment in all passwords of equipment end password library storage and with this Password, be that the demand information of user is generated using identical preset password create-rule, so, share equipment according to The password and preset password create-rule that family obtains from high in the clouds cryptographic libraries, you can determine the demand information of user.
In this step, shared equipment to be used determines whether equipment of itself end cryptographic libraries are stored with the password with user's input The purpose of identical password is:Whether the password for judging user's input is valid password.
Step S203, if it is, determining the need of user using the password and the preset password create-rule that find Ask information, the synchronous checking of complete paired secret.
Wherein, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user, and Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule The set of caused all passwords.
To sum up, the method for password authentication of shared equipment disclosed by the invention, by by shared equipment beyond the clouds server Password in password in corresponding high in the clouds cryptographic libraries, and the equipment end cryptographic libraries of the shared equipment, is preset close using identical Code create-rule so that user can utilize the demand information to equipment to be used, first from cloud before using shared equipment Password corresponding to cryptographic libraries extraction is held, the password is obtained using preset password create-rule to demand information, then should in advance Password Input is to shared equipment, when shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself, The available password found and default password create-rule, the demand information of user is determined, so that complete paired secret is same Step is demonstrate,proved.Therefore, the present invention realizes server beyond the clouds and shared equipment in the case where that need not connect network, based on identical Password create-rule, the crypto-sync verification process between user and shared equipment is realized, so that shared equipment Limited using network is no longer influenced by, and then effectively prevent the risk of the dangerous attack in internet.
Further, since method disclosed by the invention establishes network connection without shared between equipment and cloud server, because This, for traditional scheme, the present invention also eliminates the wireless module set on a sharing device, so as to save shared set Standby hardware cost.
Wherein, when not found with the password identical password from the equipment end cryptographic libraries, prompt message is exported, The prompt message is used to prompt user to re-enter password.
As shown in figure 3, in actual applications, valid password reserved area can be set in equipment end cryptographic libraries, when to be used Shared equipment can be searched preferentially, if effective it needs to be determined that when whether the password of user's input stores in valid password reserved area Password reserved area is not found, then the caused equipment end password group for being not located at valid password reserved area of slave unit end cryptographic libraries Middle lookup.
Wherein, valid password reserved area is mainly used in retaining shared equipment to be used and obtained but untapped password.
Therefore, can specifically include for further optimization above-described embodiment, step S202:
In the equipment end password group placed using password from the valid password reserved area of the equipment end cryptographic libraries of itself, search Whether it is stored with and the password identical password.
Step S202 can also specifically include:
When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password, Then from the equipment end cryptographic libraries caused equipment end password group, search whether to be stored with close with the password identical Code.
In actual applications, the scheme of shared equipment is reused for post-pay paystation, the elder generation paid can be completed according to user Order afterwards, determines user class, and when multiple users need payment expense, the time that user pays is more forward, corresponding user Rank is higher, and user class, the rank of high in the clouds password group are consistent with the rank three of equipment end password group.
Therefore, cloud server is extracting password, and after user class is marked, then, it is to be used shared Equipment can be according to the rank of the equipment end password group where the password of the password match provided with user, it may be determined that user class Not.
So when being found and the password identical from the equipment end cryptographic libraries caused equipment end password group Password, the step S203 in above-described embodiment can specifically include:
The user class and demand letter of the user is determined using the password and the preset password create-rule that find Breath, complete the synchronization to the password and verify.
It should be noted that the password of valid password reserved area is by use, the password rotation not to normal level produces Influence, the password in valid password reserved area can just disappear when being used.
After the synchronous checking of complete paired secret, the untapped equipment end password group of user class can will be superior to The valid password reserved area is put into, and deletes the equipment end password group that all ranks are less than the user class.
Wherein, the equipment end password group in the high in the clouds password group and equipment end cryptographic libraries in the cryptographic libraries of high in the clouds is according to default It is regular gradually caused, and with the regular password group for gradually eliminating inferior grade of setting, to ensure the high in the clouds password of high in the clouds cryptographic libraries Equipment end password group in group and equipment end cryptographic libraries does not repeat in the range of certain amount.
High in the clouds password group can be after user cipher or user's payment behavior of completion be supplied to, and increase is one or more High in the clouds password group, the high in the clouds password group of certain data can also be increased by date, certain number of days, or used according to user Frequent degree, quantity caused by password is determined, the removal of invalid high in the clouds password group can be in the following ways:Set high in the clouds password group The term of validity, it is automatically deleted after exceeding the time limit;After user completes Self-Service, and after the completion of feedback, to used high in the clouds password group Deleted;Various ways mixing can also be used to judge.
Whether equipment end password group, which needs, increases, the number that is used with increased quantity with user, the time interval used, One kind or more in existing effectively equipment end password group quantity, the work characteristics of shared equipment, cryptographic levels of user's input etc. Kind hybrid mode is determined, and the elimination of invalid password used to be automatically deleted by user to be defined.
After one section of usage time, when shared equipment has obtained but during unused password increase, valid password reserved area In capacity can be increasing, eliminated in a certain way after certain amount is increased to, with share equipment work characteristics, User uses this, the cryptographic levels comprehensive descision in valid password reserved area.
Above-described embodiment, when it is determined that the demand information of user, after the synchronous checking of complete paired secret, in addition to:
The password being proved to be successful is deleted.
It should be noted that in the present invention, when abnormal conditions occurs in the course of the work in shared equipment, such as powers off, altogether The information before abnormal conditions can be stored by enjoying equipment, it is to be restored it is normal after, the work before continuing, until completing this Service.
Corresponding with above method embodiment, the invention also discloses a kind of cloud server and a kind of shared equipment, tool Body is referring to described below.
Referring to Fig. 5, a kind of structural representation of cloud server disclosed in one embodiment of the invention, the cloud server with For at least one shared equipment into corresponding relation, the cloud server has multiple high in the clouds cryptographic libraries, each high in the clouds cryptographic libraries pair A shared equipment is answered, the cloud server includes:
First acquisition unit 301, the equipment identities of the shared equipment to be used for obtaining user's input, sets according to described High in the clouds cryptographic libraries corresponding to standby identity determination;
In actual applications, user can be obtained altogether by the Quick Response Code of the shared equipment of the terminal scannings such as mobile phone, IPAD The equipment identities of equipment are enjoyed, the equipment identities namely device identification.Certainly, user can also be obtained shared using other modes The equipment identities of equipment, such as by the way that the identity code printed in shared equipment is inputted into computer to obtain the equipment body of shared equipment Part.
Wherein, each shared equipment has unique corresponding equipment identities therewith.
Second acquisition unit 302, for obtaining the user profile of user's input and being set to be used share Standby demand information;
Specifically, user profile refers specifically to the identity information of user, such as ID card No..
Demand information for sharing equipment, is illustrated, it is assumed that shared equipment is shared washing machine, then user is to altogether Enjoying the demand information of washing machine includes:Laundry duration, rinsing times, wash temperature, rotating speed etc..
Unit 303 is chosen, for choosing a high in the clouds password group from the high in the clouds cryptographic libraries, and by the high in the clouds password Group and the user profile are recorded in the form of corresponding relation;
In the present embodiment, a high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group is corresponding one User, each high in the clouds password group are to be directed to arrangement group of the shared equipment in different operating situation according to preset password create-rule The set of lower caused all passwords is closed, namely the required institute using shared equipment of user is included in the password group of each high in the clouds There is something special.Illustration, it is assumed that shared equipment is shared washing machine, and user washes to sharing the demand information of washing machine namely sharing The working condition of clothing machine is:A length of 30 minutes during laundry, laundry mode is:Rinsing plus primary dewatering, kinds of laundry are twice:Lining Shirt, formula is generated according to these demand informations and preset password create-rule such as password, obtain one with the demand information only A password corresponding to one.
By the way that shared washing machine is produced into institute according to permutation and combination of the preset password create-rule in the case of different operating There is the set of password, namely obtain a high in the clouds password group.
When being arranged in order in high in the clouds password group beyond the clouds cryptographic libraries, can using arrange foremost high in the clouds password group as The high in the clouds password group of selection, it is of course also possible to randomly choose a high in the clouds password group.
Wherein, it is by the purpose that high in the clouds password group and user profile are recorded in the form of corresponding relation:Realize shared The system of real name that equipment uses, to avoid the user to not up to age requirement from providing service, such as shared bicycle is needed using user Over 12 one full year of life, while it is subsequently that user buys the offer conditions such as personal personal accidental death and injury insurance and third party liability insurance to be.
In actual applications, different ranks can be set to each high in the clouds password group included in the cryptographic libraries of high in the clouds, together When, different grades is set to user, the rank of user, user are such as determined according to all previous total degree using shared equipment of user The number used is more, and the rank of user is higher, and the user of same rank and high in the clouds password faciation are corresponding.
Therefore, choosing the implementation procedure of unit 303 is specially:Determine that multiple high in the clouds corresponding to shared equipment to be used are close first Code group, secondly, user class, and the high in the clouds password group according to corresponding to determining user class are determined according to user profile.
Extraction unit 304, for extracting password corresponding with the demand information from the high in the clouds password group;
Wherein, the password is to use the password that preset password create-rule obtains to the demand information in advance, namely The password is to be directed to share equipment caused by under the permutation and combination of different working conditions according to preset password create-rule, because This, the working condition of information namely shared equipment, can extract corresponding password from the password group of high in the clouds according to demand.
Feedback unit 305, for giving the cipher feedback to the user, so that the user is using described to be used During shared equipment, the password as described in the shared equipment utilization to be used, search whether to store from the equipment end cryptographic libraries of itself Have with the password identical password, if it is, determining institute using the password and the preset password create-rule found The demand information of user is stated, the synchronization to the password is completed and verifies.
Specifically, high in the clouds cryptographic libraries by the cipher feedback found to user, user when using shared equipment to be used, The password is inputted to shared equipment to be used, shared equipment utilization password to be used searches whether from the equipment end cryptographic libraries of itself The password identical password with user's input is stored with, if it is, being generated using the password found and the preset password Rule determines the demand information of user, the synchronous checking of complete paired secret.
Wherein, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group is corresponding one User, each shared equipment equipment end password library storage all passwords and with the high in the clouds password that to share equipment corresponding Password in storehouse, it is that the demand information of user is generated using identical preset password create-rule, so, shares equipment root The password obtained according to user from high in the clouds cryptographic libraries, you can determine the demand information of user.
To sum up, cloud server disclosed by the invention, by the way that corresponding high in the clouds in shared equipment beyond the clouds server is close Password in password in code storehouse, and the equipment end cryptographic libraries of the shared equipment, using identical preset password create-rule, makes User is obtained before using shared equipment, the demand information to equipment to be used can be utilized, extracted first from high in the clouds cryptographic libraries Corresponding password, the password are obtained to demand information using preset password create-rule in advance, then by the Password Input to altogether Equipment is enjoyed, it is available to find when shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself Password and default password create-rule, the demand information of user is determined, so as to the synchronous checking of complete paired secret.Therefore, The present invention realizes server beyond the clouds and shared equipment in the case where that need not connect network, is generated and advised based on identical password Then, the crypto-sync verification process between user and shared equipment is realized, so that the use of shared equipment is no longer influenced by Network limits, and then effectively prevent the risk of the dangerous attack in internet.
Further, since method disclosed by the invention establishes network connection without shared between equipment and cloud server, because This, for traditional scheme, the present invention also eliminates the wireless module set on a sharing device, so as to save shared set Standby hardware cost.
It is appreciated that time requirement of the different shared equipment to payment can be different, such as shared washing machine, when user determines After demand information to sharing washing machine, share washing machine can and generate corresponding expense according to these demand informations;Compare again Such as shared bicycle, due to that can not know the usage time of user in advance, therefore can not determine the expense of user in advance, for this kind of Shared equipment, it can be paid again after user is using completion.
For user in the scheme for having used shared equipment to pay again, reference can be made to existing scheme, here is omitted.
The scheme of shared equipment is reused for user's post-pay paystation, reference can be made to following examples.
In above-described embodiment, after cloud server completes charge in user, when just providing password to the user,
Extraction unit 304 includes:
First extraction subelement, corresponding with the demand information needs institute for being extracted from the high in the clouds password group State the expense of user's payment;
Second extraction subelement, for after detecting that the user has paid the expense, from the high in the clouds password group Extract password corresponding with the demand information.
Based on the present embodiment as can be seen that expense and password are all to be extracted according to user's request from high in the clouds password group , such as shared washing machine, laundry duration that cloud server selects according to user, rotating speed, wash temperature can be close from high in the clouds Code group finds a corresponding expense for needing user to pay, and after user pays successfully, cloud server can be supplied to One corresponding password of user.
Wherein, the corresponding relation of expense, password, high in the clouds password group and high in the clouds cryptographic libraries can be found in the schematic diagram shown in Fig. 2 And associated description.
It should be noted that cloud server and at least one shared equipment is into corresponding relation, cloud server and each Individual shared equipment can form a system, and cloud server and multiple shared equipment form multiple systems, in practical application In, same system will ensure preset password create-rule (bag used by equipment end cryptographic libraries and corresponding high in the clouds cryptographic libraries Include the algorithm and encryption principle of password generation) it is consistent, the preset password create-rule between different systems can be different.And And also need to ensure that the password in a number of high in the clouds password group that continuously generates of high in the clouds cryptographic libraries can not repeat.
Preferably, in above-described embodiment, own in the cryptographic libraries of high in the clouds in all high in the clouds password groups and equipment end cryptographic libraries Equipment end password group can use identical password classification hierarchy plan, that is to say, that for same user same demand believe Breath, corresponding high in the clouds password group is identical with the rank of equipment end password group, and password in the password group of high in the clouds and equipment end are close Preset password create-rule is identical used by password in code group, but in the password and equipment end password group in the password group of high in the clouds Time caused by password can be with identical, can also be different.
For convenience of search password, in actual applications, the scheme of shared equipment is reused for post-pay paystation, can according to The sequencing paid is completed at family, determines user class, and when multiple users need payment expense, the time that user pays more leans on Before, corresponding user class is higher, rank, the rank phase of equipment end password group of user class and corresponding high in the clouds password group Together.
Cloud server and the corresponding relation of shared equipment can be found in Fig. 3 and associated description, no longer trace herein.
For further optimization above-described embodiment, the second extraction subelement is specifically used for:
After detecting that the user has paid the expense, extract from the high in the clouds password group and believe with the demand Password corresponding to breath, and mark user class, wherein, when multiple users need payment expense, the user class according to The sequencing that family completes to pay determines that the time that user completes to pay is more forward, and corresponding user class is higher;
Feedback unit 305 is specifically used for:
It is described to give the cipher feedback to the user so that the user using the shared equipment to be used when, The password as described in the shared equipment utilization to be used, search whether to be stored with and the password from the equipment end cryptographic libraries of itself Identical password, if it is, determining the user class and demand information of the user, complete the same step to the password Card.
Wherein, user can input in digital form when inputting password to shared equipment, or by shared equipment according to The caused self-service identification of two-dimension code credential after user's payment expense, or with password voice recognition mode input etc..
It should be noted that password is that nongraded system arranges in equipment end password group, only password is input by a user To shared equipment, and just there are dividing for rank, and the rank of password and the rank phase of corresponding equipment end password group after determining use Together.
Referring to Fig. 6, a kind of structural representation of shared equipment disclosed in one embodiment of the invention, this is shared as shared single Car, shared electric car, shared washing machine etc., shared equipment includes:
3rd acquiring unit 401, for obtaining user's password that cryptographic libraries obtain beyond the clouds, the password is in advance to needing The password for asking information to use preset password create-rule to obtain, the demand information are that the user sets to be used share Standby demand information;
Searching unit 402, for using the password from the equipment end cryptographic libraries of itself search whether to be stored with it is described Password identical password;
Wherein, equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponds to a user, Each shared equipment is shared in the corresponding high in the clouds cryptographic libraries of equipment in all passwords of equipment end password library storage and with this Password, be that the demand information of user is generated using identical preset password create-rule, so, share equipment according to The password and preset password create-rule that family obtains from high in the clouds cryptographic libraries, you can determine the demand information of user.
Authentication unit 403, for determining the user's using the password and the preset password create-rule that find Demand information, complete the synchronization to the password and verify.
Wherein, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user, often One high in the clouds password group is to be directed to shared equipment according to preset password create-rule to produce under the permutation and combination of different operating situation The set of raw all passwords;The equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group is right Ying Yiwei user, each shared equipment equipment end password library storage all passwords and with the cloud that to share equipment corresponding The password in cryptographic libraries is held, is that the demand information of user is generated using identical preset password create-rule, so, shares The password that equipment obtains according to user from high in the clouds cryptographic libraries, you can determine the demand information of user.
To sum up, shared equipment disclosed by the invention, by by corresponding high in the clouds password in shared equipment beyond the clouds server Password in password in storehouse, and the equipment end cryptographic libraries of the shared equipment, using identical preset password create-rule so that User can utilize the demand information to equipment to be used before using shared equipment, first from the extraction pair of high in the clouds cryptographic libraries The password answered, the password are obtained to demand information using preset password create-rule in advance, then by the Password Input to shared Equipment, when shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself, using what is found Password and default password create-rule, the demand information of user is determined, so as to the synchronous checking of complete paired secret.Therefore, originally Invention realizes server beyond the clouds and shared equipment in the case where that need not connect network, is generated and advised based on identical password Then, the crypto-sync verification process between user and shared equipment is realized, so that the use of shared equipment is no longer influenced by Network limits, and then effectively prevent the risk of the dangerous attack in internet.
Further, since method disclosed by the invention establishes network connection without shared between equipment and cloud server, because This, for traditional scheme, the present invention also eliminates the wireless module set on a sharing device, so as to save shared set Standby hardware cost.
Further to optimize above-described embodiment, in addition to:Output unit, do not searched for working as from the equipment end cryptographic libraries During to the password identical password, prompt message is exported, the prompt message is used to prompt user to re-enter password.
As shown in figure 3, in actual applications, valid password reserved area can be set in equipment end cryptographic libraries, when to be used Shared equipment can be searched preferentially, if effective it needs to be determined that when whether the password of user's input stores in valid password reserved area Password reserved area is not found, then the caused equipment end password group for being not located at valid password reserved area of slave unit end cryptographic libraries Middle lookup.
Wherein, valid password reserved area is mainly used in retaining shared equipment to be used and obtained but untapped password.
Therefore, specifically can be used for for further optimization above-described embodiment, searching unit 402:
In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself, Search whether to be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used Shared equipment has obtained but untapped password.
Searching unit 402 specifically can be also used for:
When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password, Then from the equipment end cryptographic libraries caused equipment end password group, search whether to be stored with close with the password identical Code.
In actual applications, the scheme of shared equipment is reused for post-pay paystation, the elder generation paid can be completed according to user Order afterwards, determines user class, and when multiple users need payment expense, the time that user pays is more forward, corresponding user Rank is higher, and user class, the rank of high in the clouds password group are consistent with the rank three of equipment end password group.
Therefore, cloud server is extracting password, and after user class is marked, then, it is to be used shared Equipment can be according to the rank of the equipment end password group where the password of the password match provided with user, it may be determined that user class Not.
So when being found and the password identical from the equipment end cryptographic libraries caused equipment end password group Password, authentication unit 403 are specifically used for:
The user class and demand letter of the user is determined using the password and the preset password create-rule that find Breath, complete the synchronization to the password and verify.
It should be noted that the password of valid password reserved area is by use, the password rotation not to normal level produces Influence, the password in valid password reserved area can just disappear when being used.
After the synchronous checking of complete paired secret, the untapped equipment end password group of user class can will be superior to The valid password reserved area is put into, and deletes the equipment end password group that all ranks are less than the user class.
Wherein, the equipment end password group in the high in the clouds password group and equipment end cryptographic libraries in the cryptographic libraries of high in the clouds is according to default It is regular gradually caused, and with the regular password group for gradually eliminating inferior grade of setting, to ensure the high in the clouds password of high in the clouds cryptographic libraries Equipment end password group in group and equipment end cryptographic libraries does not repeat in the range of certain amount.
High in the clouds password group can be after user cipher or user's payment behavior of completion be supplied to, and increase is one or more High in the clouds password group, the high in the clouds password group of certain data can also be increased by date, certain number of days, or used according to user Frequent degree, quantity caused by password is determined, the removal of invalid high in the clouds password group can be in the following ways:Set high in the clouds password group The term of validity, it is automatically deleted after exceeding the time limit;After user completes Self-Service, and after the completion of feedback, to used high in the clouds password group Deleted;Various ways mixing can also be used to judge.
Whether equipment end password group, which needs, increases, the number that is used with increased quantity with user, the time interval used, One kind or more in existing effectively equipment end password group quantity, the work characteristics of shared equipment, cryptographic levels of user's input etc. Kind hybrid mode is determined, and the elimination of invalid password used to be automatically deleted by user to be defined.
After one section of usage time, when shared equipment has obtained but during unused password increase, valid password reserved area In capacity can be increasing, eliminated in a certain way after certain amount is increased to, with share equipment work characteristics, User uses this, the cryptographic levels comprehensive descision in valid password reserved area.
Therefore, sharing equipment also includes:
Placement unit, for after the synchronous checking to the password is completed, the user class will to be superior to Untapped equipment end password group is put into the valid password reserved area;
First deletes unit, and the equipment end password group of the user class is less than for deleting all ranks.
For further optimization above-described embodiment, shared equipment also includes:
Second deletes unit, for it is determined that the demand information of the user, completes the synchronization to the password and verify it Afterwards, the password being proved to be successful is deleted.
Present invention also offers a kind of password validation system of shared equipment, the system includes cloud service described above Device and at least one shared equipment described above, wherein, the operation principle of system refers to cloud server and shared equipment Corresponding part, here is omitted.
It should be noted that share the specific works of each part in equipment, cloud server and password validation system Principle refers to embodiment of the method corresponding part, and here is omitted.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (31)

  1. A kind of 1. method of password authentication of shared equipment, it is characterised in that applied to cloud server, the cloud service utensil There are multiple high in the clouds cryptographic libraries, the corresponding shared equipment of each high in the clouds cryptographic libraries, methods described includes:
    Obtain the equipment identities of the shared equipment to be used of user's input, the high in the clouds password according to corresponding to determining the equipment identities Storehouse;
    Obtain the user profile of user's input and the demand information to the shared equipment to be used;
    A high in the clouds password group is chosen from the high in the clouds cryptographic libraries, and by the high in the clouds password group and the user profile with right The form that should be related to is recorded;
    Password corresponding with the demand information is extracted from the high in the clouds password group, wherein, the password is in advance to institute State the password that demand information uses preset password create-rule to obtain;
    The cipher feedback is given to the user, so that the user is treated when using the shared equipment to be used by described Using password described in shared equipment utilization, search whether to be stored with from the equipment end cryptographic libraries of itself close with the password identical Code, if it is, the demand information of the user is determined using the password and the preset password create-rule that find, The synchronization to the password is completed to verify.
  2. 2. method of password authentication according to claim 1, it is characterised in that it is close that the high in the clouds cryptographic libraries include multiple high in the clouds Code group, the corresponding user of each high in the clouds password group, each high in the clouds password group is to be directed to according to preset password create-rule The set of shared equipment caused all passwords under the permutation and combination of different operating situation.
  3. 3. method of password authentication according to claim 1, it is characterised in that the equipment end cryptographic libraries include multiple equipment Hold password group, the corresponding user of each equipment end password group, institute of each shared equipment in equipment end password library storage There is password and the password in the corresponding high in the clouds cryptographic libraries of equipment is shared with this, be that identical is used to the demand information of user Preset password create-rule generates.
  4. 4. method of password authentication according to claim 1, it is characterised in that when the cloud server is complete in the user Into after payment, there is provided when password gives the user, extracted from the high in the clouds password group corresponding with the demand information close Code, is specifically included:
    The expense for needing the user to pay corresponding with the demand information is extracted from the high in the clouds password group;
    After detecting that the user has paid the expense, extracted from the high in the clouds password group corresponding with the demand information Password.
  5. 5. method of password authentication according to claim 4, it is characterised in that when detecting that the user paid the expense With rear, password corresponding with the demand information is extracted from the high in the clouds password group, is specifically included:
    After detecting that the user has paid the expense, extracted from the high in the clouds password group and the demand information pair The password answered, and user class is marked, wherein, when multiple users need payment expense, the user class is complete according to user Sequencing into payment determines that the time that user completes to pay is more forward, and corresponding user class is higher;
    The cipher feedback is given to the user, so that the user is treated when using the shared equipment to be used by described Using password described in shared equipment utilization, search whether to be stored with from the equipment end cryptographic libraries of itself close with the password identical Code, if it is, determining the demand information of the user using the password found, completes the same step to the password Card, is specifically included:
    The cipher feedback is given to the user, so that the user is treated when using the shared equipment to be used by described Using password described in shared equipment utilization, search whether to be stored with from the equipment end cryptographic libraries of itself close with the password identical Code, if it is, determining the user class and demand information of the user, complete the synchronization to the password and verify.
  6. 6. method of password authentication according to claim 1, it is characterised in that all high in the clouds is close in the high in the clouds cryptographic libraries All equipment end passwords are mined massively with identical password classification hierarchy plan in code group and the equipment end cryptographic libraries.
  7. 7. a kind of method of password authentication of shared equipment, it is characterised in that applied to shared equipment to be used, methods described bag Include:
    User's password that cryptographic libraries obtain beyond the clouds is obtained, the password is in advance to demand information using preset password generation rule The password then obtained, the demand information are demand information of the user to the shared equipment to be used;
    Search whether to be stored with and the password identical password from the equipment end cryptographic libraries of itself using the password;
    If it is, the demand information of the user is determined using the password and the preset password create-rule that find, it is complete The synchronous checking of the paired password.
  8. 8. method of password authentication according to claim 7, it is characterised in that it is close that the high in the clouds cryptographic libraries include multiple high in the clouds Code group, the corresponding user of each high in the clouds password group, each high in the clouds password group is to be directed to according to preset password create-rule The set of shared equipment caused all passwords under the permutation and combination of different operating situation.
  9. 9. method of password authentication according to claim 7, it is characterised in that the equipment end cryptographic libraries include multiple equipment Hold password group, the corresponding user of each equipment end password group, institute of each shared equipment in equipment end password library storage There is password and the password in the corresponding high in the clouds cryptographic libraries of equipment is shared with this, be that identical is used to the demand information of user Preset password create-rule generates.
  10. 10. method of password authentication according to claim 7, it is characterised in that the setting from itself using the password Standby end cryptographic libraries search whether to be stored with the password identical password, specifically include:
    In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself, search Whether be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used shared Equipment has obtained but untapped password.
  11. 11. method of password authentication according to claim 7, it is characterised in that the setting from itself using the password Standby end cryptographic libraries search whether to be stored with the password identical password, specifically include:
    When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password, then from The equipment end cryptographic libraries in caused equipment end password group, search whether to be stored with and the password identical password.
  12. 12. method of password authentication according to claim 7, it is characterised in that produced when from the equipment end cryptographic libraries Equipment end password group in find and the password identical password, and the rank of high in the clouds password group, equipment end password group It is described to determine the use using the password found and the preset password create-rule when rank is consistent with user class three The demand information at family, complete the synchronization to the password and verify, specifically include:
    The user class and demand information of the user is determined using the password and the preset password create-rule that find, it is complete The synchronous checking of the paired password.
  13. 13. method of password authentication according to claim 12, it is characterised in that verified when completing the synchronization to the password Afterwards, in addition to:
    The untapped equipment end password group for being superior to the user class is put into the valid password reserved area;
    Delete the equipment end password group that all ranks are less than the user class.
  14. 14. method of password authentication according to claim 7, it is characterised in that it is determined that the demand information of the user, complete After the synchronous checking of the paired password, in addition to:
    The password being proved to be successful is deleted.
  15. 15. method of password authentication according to claim 7, it is characterised in that also include:
    When not found with the password identical password from the equipment end cryptographic libraries, prompt message, the prompting are exported Information is used to prompt user to re-enter password.
  16. 16. a kind of cloud server, it is characterised in that the cloud server has multiple high in the clouds cryptographic libraries, each high in the clouds The corresponding shared equipment of cryptographic libraries, the cloud server include:
    First acquisition unit, the equipment identities of the shared equipment to be used for obtaining user's input, according to the equipment identities It is determined that corresponding high in the clouds cryptographic libraries;
    Second acquisition unit, for obtaining the user profile of user's input and the demand to the shared equipment to be used Information;
    Unit is chosen, for choosing a high in the clouds password group from the high in the clouds cryptographic libraries, and by the high in the clouds password group and institute User profile is stated to be recorded in the form of corresponding relation;
    Extraction unit, for extracting password corresponding with the demand information from the high in the clouds password group, wherein, it is described close Code is to use the password that preset password create-rule obtains to the demand information in advance;
    Feedback unit, for giving the cipher feedback to the user, so that the user is set using to be used share When standby, the password as described in the shared equipment utilization to be used searches whether to be stored with and institute from the equipment end cryptographic libraries of itself Password identical password is stated, if it is, determining the user using the password and the preset password create-rule found The demand information, complete to the password synchronization verify.
  17. 17. cloud server according to claim 16, it is characterised in that it is close that the high in the clouds cryptographic libraries include multiple high in the clouds Code group, the corresponding user of each high in the clouds password group, each high in the clouds password group is to be directed to according to preset password create-rule The set of shared equipment caused all passwords under the permutation and combination of different operating situation.
  18. 18. cloud server according to claim 16, it is characterised in that the equipment end cryptographic libraries include multiple equipment Hold password group, the corresponding user of each equipment end password group, institute of each shared equipment in equipment end password library storage There is password and the password in the corresponding high in the clouds cryptographic libraries of equipment is shared with this, be that identical is used to the demand information of user Preset password create-rule generates.
  19. 19. cloud server according to claim 16, it is characterised in that when the cloud server is complete in the user Into after payment, there is provided when password gives the user, the extraction unit includes:
    First extraction subelement, corresponding with the demand information needs the use for being extracted from the high in the clouds password group The expense that family is paid;
    Second extraction subelement, for after detecting that the user has paid the expense, being extracted from the high in the clouds password group Go out password corresponding with the demand information.
  20. 20. cloud server according to claim 19, it is characterised in that the second extraction subelement is specifically used for:
    After detecting that the user has paid the expense, extracted from the high in the clouds password group and the demand information pair The password answered, and user class is marked, wherein, when multiple users need payment expense, the user class is complete according to user Sequencing into payment determines that the time that user completes to pay is more forward, and corresponding user class is higher;
    The feedback unit is specifically used for:
    The cipher feedback is given to the user, so that the user is treated when using the shared equipment to be used by described Using password described in shared equipment utilization, search whether to be stored with from the equipment end cryptographic libraries of itself close with the password identical Code, if it is, determining the user class and demand information of the user, complete the synchronization to the password and verify.
  21. 21. cloud server according to claim 16, it is characterised in that all high in the clouds is close in the high in the clouds cryptographic libraries All equipment end passwords are mined massively with identical password classification hierarchy plan in code group and the equipment end cryptographic libraries.
  22. A kind of 22. shared equipment, it is characterised in that including:
    3rd acquiring unit, for obtaining user's password that cryptographic libraries obtain beyond the clouds, the password is in advance to demand information The password obtained using preset password create-rule, the demand information are need of the user to the shared equipment to be used Seek information;
    Searching unit is identical with the password for searching whether to be stored with from the equipment end cryptographic libraries of itself using the password Password;
    Authentication unit, for determining the demand letter of the user using the password and the preset password create-rule that find Breath, complete the synchronization to the password and verify.
  23. 23. shared equipment according to claim 22, it is characterised in that the high in the clouds cryptographic libraries include multiple high in the clouds passwords Group, the corresponding user of each high in the clouds password group, each high in the clouds password group is for altogether according to preset password create-rule Enjoy the set of equipment caused all passwords under the permutation and combination of different operating situation.
  24. 24. shared equipment according to claim 22, it is characterised in that the equipment end cryptographic libraries include multiple equipment end Password group, the corresponding user of each equipment end password group, each shared equipment is in all of equipment end password library storage Password and the password in the corresponding high in the clouds cryptographic libraries of equipment is shared with this, be pre- using identical to the demand information of user If password create-rule generates.
  25. 25. shared equipment according to claim 22, it is characterised in that the searching unit is specifically used for:
    In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself, search Whether be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used shared Equipment has obtained but untapped password.
  26. 26. shared equipment according to claim 22, it is characterised in that the searching unit is specifically used for:
    When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password, then from The equipment end cryptographic libraries in caused equipment end password group, search whether to be stored with and the password identical password.
  27. 27. shared equipment according to claim 22, it is characterised in that set when from the equipment end cryptographic libraries are caused Found in standby end password group and the password identical password, and the rank of high in the clouds password group, the rank of equipment end password group When consistent with user class three, the authentication unit is specifically used for:
    The user class and demand information of the user is determined using the password and the preset password create-rule that find, it is complete The synchronous checking of the paired password.
  28. 28. shared equipment according to claim 27, it is characterised in that also include:
    Placement unit, for after the synchronous checking to the password is completed, not making for the user class will to be superior to Equipment end password group is put into the valid password reserved area;
    First deletes unit, and the equipment end password group of the user class is less than for deleting all ranks.
  29. 29. shared equipment according to claim 22, it is characterised in that also include:
    Second deletes unit, for it is determined that the demand information of the user, after completing the synchronous checking to the password, is incited somebody to action The password being proved to be successful is deleted.
  30. 30. shared equipment according to claim 22, it is characterised in that also include:
    Output unit, for when not found with the password identical password from the equipment end cryptographic libraries, output to be prompted Information, the prompt message are used to prompt user to re-enter password.
  31. 31. a kind of password validation system of shared equipment, it is characterised in that including described in claim 16~21 any one Shared equipment described in cloud server and at least one claim 22~30.
CN201710703147.0A 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system Active CN107483581B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710703147.0A CN107483581B (en) 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system
PCT/CN2018/090666 WO2019033840A1 (en) 2017-08-16 2018-06-11 Password authentication method for shared device, shared device, cloud server, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710703147.0A CN107483581B (en) 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system

Publications (2)

Publication Number Publication Date
CN107483581A true CN107483581A (en) 2017-12-15
CN107483581B CN107483581B (en) 2020-02-14

Family

ID=60600611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710703147.0A Active CN107483581B (en) 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system

Country Status (2)

Country Link
CN (1) CN107483581B (en)
WO (1) WO2019033840A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019033840A1 (en) * 2017-08-16 2019-02-21 格力电器(武汉)有限公司 Password authentication method for shared device, shared device, cloud server, and system
CN109448209A (en) * 2019-01-07 2019-03-08 上海早米网络科技有限公司 A kind of dynamic password massage control system and control method based on off-line mode
CN109887179A (en) * 2019-01-23 2019-06-14 上海早米网络科技有限公司 Charge sharing massage control system and control method based on offline dynamic password
CN109978529A (en) * 2017-12-27 2019-07-05 青岛胶南海尔洗衣机有限公司 Offline electronic payment method
WO2019153534A1 (en) * 2018-02-12 2019-08-15 平安科技(深圳)有限公司 Insurance premium calculation method and device, computer apparatus, and storage medium
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN110335394A (en) * 2019-07-05 2019-10-15 深圳市智臻环保能源科技有限公司 A kind of smart lock control method and system based on cipher code set
CN114973518A (en) * 2022-04-21 2022-08-30 杭州小电科技股份有限公司 Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653701B (en) * 2020-12-24 2023-03-14 北京安信天行科技有限公司 Application password safe use monitoring method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106652232A (en) * 2016-12-28 2017-05-10 北京拜克洛克科技有限公司 Bike sharing method and system
CN106780917A (en) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 The control method and system of lock

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7898439B2 (en) * 2008-03-20 2011-03-01 Isabelle Bettez Bicycle rental system and station
CN107483581B (en) * 2017-08-16 2020-02-14 珠海格力电器股份有限公司 Password verification method of sharing device, cloud server and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106652232A (en) * 2016-12-28 2017-05-10 北京拜克洛克科技有限公司 Bike sharing method and system
CN106780917A (en) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 The control method and system of lock

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019033840A1 (en) * 2017-08-16 2019-02-21 格力电器(武汉)有限公司 Password authentication method for shared device, shared device, cloud server, and system
CN109978529A (en) * 2017-12-27 2019-07-05 青岛胶南海尔洗衣机有限公司 Offline electronic payment method
CN109978529B (en) * 2017-12-27 2024-01-23 海尔衣联生态科技(上海)有限公司 Offline payment method
WO2019153534A1 (en) * 2018-02-12 2019-08-15 平安科技(深圳)有限公司 Insurance premium calculation method and device, computer apparatus, and storage medium
CN109448209A (en) * 2019-01-07 2019-03-08 上海早米网络科技有限公司 A kind of dynamic password massage control system and control method based on off-line mode
CN109887179A (en) * 2019-01-23 2019-06-14 上海早米网络科技有限公司 Charge sharing massage control system and control method based on offline dynamic password
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN110322599B (en) * 2019-05-23 2021-10-26 深圳绿米联创科技有限公司 Door lock management method and device, electronic equipment and storage medium
CN110335394A (en) * 2019-07-05 2019-10-15 深圳市智臻环保能源科技有限公司 A kind of smart lock control method and system based on cipher code set
CN114973518A (en) * 2022-04-21 2022-08-30 杭州小电科技股份有限公司 Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system

Also Published As

Publication number Publication date
WO2019033840A1 (en) 2019-02-21
CN107483581B (en) 2020-02-14

Similar Documents

Publication Publication Date Title
CN107483581A (en) The method of password authentication of shared equipment, shared equipment, cloud server and system
CN102497635B (en) Server, terminal and account password acquisition method
CN107862526B (en) Resource numerical value transferring method and device, storage medium and server
CN101815291A (en) Method and system for logging on client automatically
CN101378582A (en) User recognizing module, authentication center, authentication method and system
CN102867157B (en) Mobile terminal and data guard method
CN104581727A (en) Equipment connecting method and device and AP (access point) end electronic equipment
CN107124426B (en) Authentication method and device for user rights and interests
CN108460262B (en) Cipher management method, device, terminal device and storage medium
CN108093392A (en) A kind of method, mobile terminal and storage medium for unlocking SIM card
CN113141340B (en) Multi-node authentication method and device
CN105631276A (en) Fingerprint password verification method and system, and terminal
CN103634328A (en) Authentication method, device and system for network platform authentication server
CN106792699A (en) A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
CN106572074A (en) Method and device for verifying identifying code
CN105553667A (en) Dynamic password generating method
CN102752754B (en) Subscriber Identity Module lock data are carried out method and the mobile terminal of safety certification
CN107623907A (en) ESIM clamping locks network method, terminal and lock network certificate server
CN103370713A (en) Method for programming a mobile terminal chip
CN107172194A (en) Management method, device and the communication terminal of virtual SIM card
CN112468497B (en) Block chain terminal equipment authorization authentication method, device, equipment and storage medium
CN104780211B (en) Method of data synchronization and device
CN104270754B (en) A kind of Subscriber Identity Module method for authenticating and device
CN103678983A (en) Smartphone usage permission verification system and method
CN109302286A (en) A kind of generation method of Fido device keys index

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant