CN107483581A - The method of password authentication of shared equipment, shared equipment, cloud server and system - Google Patents
The method of password authentication of shared equipment, shared equipment, cloud server and system Download PDFInfo
- Publication number
- CN107483581A CN107483581A CN201710703147.0A CN201710703147A CN107483581A CN 107483581 A CN107483581 A CN 107483581A CN 201710703147 A CN201710703147 A CN 201710703147A CN 107483581 A CN107483581 A CN 107483581A
- Authority
- CN
- China
- Prior art keywords
- password
- user
- equipment
- clouds
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Abstract
The invention discloses a kind of method of password authentication of shared equipment,Shared equipment,Cloud server and system,By by the password in corresponding high in the clouds cryptographic libraries in shared equipment beyond the clouds server,The password in the equipment end cryptographic libraries of equipment is shared with this,Using identical preset password create-rule,So that user is before using shared equipment,The demand information to equipment to be used can be utilized,First from password corresponding to the extraction of high in the clouds cryptographic libraries,The password is obtained to demand information using preset password create-rule in advance,Then by the Password Input to shared equipment,When shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself,Using the password and default password create-rule found,Determine the demand information of user,So as to realize server beyond the clouds and shared equipment in the case where network need not be connected,The synchronous checking of complete paired secret.
Description
Technical field
The present invention relates to shared equipment technical field, in particular, is related to a kind of method of password authentication of shared equipment
Shared equipment, cloud server and system.
Background technology
In recent years, the various shared equipment with automatic payment function are risen, and such as shared bicycle, shared electric car, are shared
Automobile, shared washing machine etc..These share the very easy to use quick of equipment, and user can be as needed, download corresponding
Client is simultaneously registered, and when needing to use accordingly shared equipment, is logged in corresponding client, is inputted the volume of shared equipment to be used
Code obtains PUK, or realizes unlocking by way of directly scanning the identification code in shared equipment to be used.Using
Bi Hou, by paying on the net.
These shared equipment have one it is common the characteristics of:Require connect to internet or and mobile terminal, such as hand
Machine, synchronizing information between user could be realized by establishing short-range wireless communication, realize password authentification, therefore, shared equipment is led to
All often there is wireless module.
Because the password verification process for sharing equipment need to be based on real-time performance, hence in so that the use of shared equipment is by net
Network limits, and the risk of the dangerous attack in internet be present, therefore, how to provide a kind of method of password authentication of shared equipment, with
Shared equipment and cloud server is set to realize the synchronization of password between user and shared equipment in the case where network need not be connected
Checking becomes the technical problem of those skilled in the art's urgent need to resolve.
The content of the invention
In view of this, the present invention discloses a kind of method of password authentication of shared equipment, shared equipment, cloud server and is
System, to realize shared equipment and cloud server in the case where network need not be connected, can still realize user and shared equipment it
Between crypto-sync verification process.
A kind of method of password authentication of shared equipment, applied to cloud server, the cloud server has multiple clouds
Cryptographic libraries are held, the corresponding shared equipment of each high in the clouds cryptographic libraries, methods described includes:
Obtain the equipment identities of the shared equipment to be used of user's input, the high in the clouds according to corresponding to determining the equipment identities
Cryptographic libraries;
Obtain the user profile of user's input and the demand information to the shared equipment to be used;
A high in the clouds password group is chosen from the high in the clouds cryptographic libraries, and by the high in the clouds password group and the user profile
Recorded in the form of corresponding relation;
Password corresponding with the demand information is extracted from the high in the clouds password group, wherein, the password is advance
The password for using preset password create-rule to obtain to the demand information;
Give the cipher feedback to the user so that the user using the shared equipment to be used when, by institute
Password described in shared equipment utilization to be used is stated, searches whether to be stored with from the equipment end cryptographic libraries of itself identical with the password
Password, if it is, determining the demand of the user using the password and the preset password create-rule that find
Information, complete the synchronization to the password and verify.
Preferably, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user,
Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule
The set of caused all passwords.
Preferably, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponding one
Position user, each shared equipment is in all passwords of equipment end password library storage and to share the corresponding high in the clouds of equipment close with this
Password in code storehouse, it is that the demand information of user is generated using identical preset password create-rule.
Preferably, after the cloud server completes charge in the user, there is provided when password gives the user, from institute
State and password corresponding with the demand information is extracted in the password group of high in the clouds, specifically include:
The expense for needing the user to pay corresponding with the demand information is extracted from the high in the clouds password group;
After detecting that the user has paid the expense, extracted and the demand information from the high in the clouds password group
Corresponding password.
Preferably, after detecting that the user has paid the expense, from the high in the clouds password group extract with it is described
Password corresponding to demand information, is specifically included:
After detecting that the user has paid the expense, extract from the high in the clouds password group and believe with the demand
Password corresponding to breath, and mark user class, wherein, when multiple users need payment expense, the user class according to
The sequencing that family completes to pay determines that the time that user completes to pay is more forward, and corresponding user class is higher;
Give the cipher feedback to the user so that the user using the shared equipment to be used when, by institute
Password described in shared equipment utilization to be used is stated, searches whether to be stored with from the equipment end cryptographic libraries of itself identical with the password
Password, if it is, determining the demand information of the user using the password found, complete to the same of the password
Step is demonstrate,proved, and is specifically included:
Give the cipher feedback to the user so that the user using the shared equipment to be used when, by institute
Password described in shared equipment utilization to be used is stated, searches whether to be stored with from the equipment end cryptographic libraries of itself identical with the password
Password, if it is, determine the user class and demand information of the user, complete the synchronization to the password and verify.
Preferably, equipment all in all high in the clouds password groups and the equipment end cryptographic libraries in the high in the clouds cryptographic libraries
End password is mined massively with identical password classification hierarchy plan.
A kind of method of password authentication of shared equipment, applied to shared equipment to be used, methods described includes:
User's password that cryptographic libraries obtain beyond the clouds is obtained, the password is in advance to demand information using preset password life
The password obtained into rule, the demand information are demand information of the user to the shared equipment to be used;
Search whether to be stored with and the password identical password from the equipment end cryptographic libraries of itself using the password;
If it is, the demand for determining the user using the password and the preset password create-rule that find is believed
Breath, complete the synchronization to the password and verify.
Preferably, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user,
Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule
The set of caused all passwords.
Preferably, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponding one
Position user, each shared equipment is in all passwords of equipment end password library storage and to share the corresponding high in the clouds of equipment close with this
Password in code storehouse, it is that the demand information of user is generated using identical preset password create-rule.
Preferably, it is described to search whether to be stored with and the password phase from the equipment end cryptographic libraries of itself using the password
Same password, is specifically included:
In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself,
Search whether to be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used
Shared equipment has obtained but untapped password.
Preferably, it is described to search whether to be stored with and the password phase from the equipment end cryptographic libraries of itself using the password
Same password, is specifically included:
When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password,
Then from the equipment end cryptographic libraries caused equipment end password group, search whether to be stored with close with the password identical
Code.
Preferably, it is identical with the password when being found from the equipment end cryptographic libraries caused equipment end password group
Password, it is described using searching and when the rank of high in the clouds password group, the rank of equipment end password group are consistent with user class three
To password and the preset password create-rule determine the demand information of the user, complete the same step to the password
Card, is specifically included:
The user class and demand letter of the user is determined using the password and the preset password create-rule that find
Breath, complete the synchronization to the password and verify.
Preferably, after the synchronous checking to the password is completed, in addition to:
The untapped equipment end password group for being superior to the user class is put into the valid password reserved area;
Delete the equipment end password group that all ranks are less than the user class.
Preferably, after it is determined that the demand information of the user, completing to the synchronous checking of the password, in addition to:
The password being proved to be successful is deleted.
Preferably, in addition to:
When not found with the password identical password from the equipment end cryptographic libraries, prompt message is exported, it is described
Prompt message is used to prompt user to re-enter password.
A kind of cloud server, the cloud server have multiple high in the clouds cryptographic libraries, and each high in the clouds cryptographic libraries is corresponding
One shared equipment, the cloud server include:
First acquisition unit, the equipment identities of the shared equipment to be used for obtaining user's input, according to the equipment
High in the clouds cryptographic libraries corresponding to identity determination;
Second acquisition unit, for obtaining the user profile of user's input and to the shared equipment to be used
Demand information;
Unit is chosen, for choosing a high in the clouds password group from the high in the clouds cryptographic libraries, and by the high in the clouds password group
Recorded with the user profile in the form of corresponding relation;
Extraction unit, for extracting password corresponding with the demand information from the high in the clouds password group, wherein, institute
The password for stating password to use preset password create-rule to obtain the demand information in advance;
Feedback unit, for giving the cipher feedback to the user, so that the user is using described to be used common
When enjoying equipment, the password as described in the shared equipment utilization to be used, search whether to be stored with from the equipment end cryptographic libraries of itself
With the password identical password, if it is, described in being determined using the password found and the preset password create-rule
The demand information of user, complete the synchronization to the password and verify.
Preferably, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user,
Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule
The set of caused all passwords.
Preferably, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponding one
Position user, each shared equipment is in all passwords of equipment end password library storage and to share the corresponding high in the clouds of equipment close with this
Password in code storehouse, it is that the demand information of user is generated using identical preset password create-rule.
Preferably, after the cloud server completes charge in the user, there is provided described when password gives the user
Extraction unit includes:
First extraction subelement, corresponding with the demand information needs institute for being extracted from the high in the clouds password group
State the expense of user's payment;
Second extraction subelement, for after detecting that the user has paid the expense, from the high in the clouds password group
Extract password corresponding with the demand information.
Preferably, the second extraction subelement is specifically used for:
After detecting that the user has paid the expense, extract from the high in the clouds password group and believe with the demand
Password corresponding to breath, and mark user class, wherein, when multiple users need payment expense, the user class according to
The sequencing that family completes to pay determines that the time that user completes to pay is more forward, and corresponding user class is higher;
The feedback unit is specifically used for:
Give the cipher feedback to the user so that the user using the shared equipment to be used when, by institute
Password described in shared equipment utilization to be used is stated, searches whether to be stored with from the equipment end cryptographic libraries of itself identical with the password
Password, if it is, determine the user class and demand information of the user, complete the synchronization to the password and verify.
Preferably, equipment all in all high in the clouds password groups and the equipment end cryptographic libraries in the high in the clouds cryptographic libraries
End password is mined massively with identical password classification hierarchy plan.
A kind of shared equipment, including:
3rd acquiring unit, for obtaining user's password that cryptographic libraries obtain beyond the clouds, the password is in advance to demand
Information uses the password that preset password create-rule obtains, and the demand information is the user to the shared equipment to be used
Demand information;
Searching unit, for searching whether to be stored with and the password from the equipment end cryptographic libraries of itself using the password
Identical password;
Authentication unit, for determining the demand of the user using the password and the preset password create-rule that find
Information, complete the synchronization to the password and verify.
Preferably, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user,
Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule
The set of caused all passwords.
Preferably, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponding one
Position user, each shared equipment is in all passwords of equipment end password library storage and to share the corresponding high in the clouds of equipment close with this
Password in code storehouse, it is that the demand information of user is generated using identical preset password create-rule.
Preferably, the searching unit is specifically used for:
In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself,
Search whether to be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used
Shared equipment has obtained but untapped password.
Preferably, the searching unit is specifically used for:
When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password,
Then from the equipment end cryptographic libraries caused equipment end password group, search whether to be stored with close with the password identical
Code.
Preferably, it is identical with the password when being found from the equipment end cryptographic libraries caused equipment end password group
Password, and when the rank of high in the clouds password group, the rank of equipment end password group are consistent with user class three, the authentication unit
It is specifically used for:
The user class and demand letter of the user is determined using the password and the preset password create-rule that find
Breath, complete the synchronization to the password and verify.
Preferably, in addition to:
Placement unit, for after the synchronous checking to the password is completed, the user class will to be superior to
Untapped equipment end password group is put into the valid password reserved area;
First deletes unit, and the equipment end password group of the user class is less than for deleting all ranks.
Preferably, in addition to:
Second deletes unit, for it is determined that the demand information of the user, completes the synchronization to the password and verify it
Afterwards, the password being proved to be successful is deleted.
Preferably, in addition to:
Output unit, for when not found with the password identical password from the equipment end cryptographic libraries, exporting
Prompt message, the prompt message are used to prompt user to re-enter password.
A kind of password validation system of shared equipment, including cloud server described above and at least one described above
Shared equipment.
It was found from above-mentioned technical scheme, the invention discloses a kind of method of password authentication of shared equipment, shared equipment,
Cloud server and system, by by the password in corresponding high in the clouds cryptographic libraries in shared equipment beyond the clouds server, and this is common
The password in the equipment end cryptographic libraries of equipment is enjoyed, using identical preset password create-rule so that user is set using shared
Before standby, the demand information to equipment to be used can be utilized, it is pre- from password, the password corresponding to the extraction of high in the clouds cryptographic libraries first
First demand information is obtained using preset password create-rule, then by the Password Input to shared equipment, when shared equipment from
When the equipment end cryptographic libraries of itself find password corresponding with the password, using the password found and the life of default password
Into rule, the demand information of user is determined, is verified so as to the synchronization of complete paired secret.Therefore, the present invention realizes takes beyond the clouds
Business device and shared equipment, based on identical password create-rule, realize user and shared in the case where that need not connect network
Crypto-sync verification process between equipment, so that the use of shared equipment is no longer influenced by network limitation, and then effectively keep away
The risk of the dangerous attack in internet is exempted from.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
Disclosed accompanying drawing obtains other accompanying drawings.
Fig. 1 is a kind of method of password authentication stream of the shared equipment based on cloud server side disclosed in the embodiment of the present invention
Cheng Tu;
Fig. 2 is the corresponding relation of a kind of expense disclosed in the embodiment of the present invention, password, high in the clouds password group and high in the clouds cryptographic libraries
Schematic diagram;
Fig. 3 is a kind of cloud server disclosed in the embodiment of the present invention and the corresponding relation schematic diagram of a shared equipment;
Fig. 4 is a kind of method of password authentication flow of the shared equipment based on shared equipment side disclosed in the embodiment of the present invention
Figure;
Fig. 5 is a kind of structural representation of cloud server disclosed in the embodiment of the present invention;
Fig. 6 is a kind of structural representation of shared equipment disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of method of password authentication of shared equipment, shared equipment, cloud server and it is
System, to realize shared equipment and cloud server in the case where network need not be connected, can still realize user and shared equipment it
Between crypto-sync verification process.
Referring to Fig. 1, a kind of method of password authentication flow chart of shared equipment disclosed in one embodiment of the invention, this method should
For cloud server, the cloud server has multiple with least one shared equipment into corresponding relation, the cloud server
High in the clouds cryptographic libraries, the corresponding shared equipment of each high in the clouds cryptographic libraries, methods described include step:
Step S101, the equipment identities of the shared equipment to be used of user's input are obtained, are determined according to the equipment identities
Corresponding high in the clouds cryptographic libraries;
In actual applications, user can be obtained altogether by the Quick Response Code of the shared equipment of the terminal scannings such as mobile phone, IPAD
The equipment identities of equipment are enjoyed, the equipment identities namely device identification.Certainly, user can also be obtained shared using other modes
The equipment identities of equipment, such as by the way that the identity code printed in shared equipment is inputted into computer to obtain the equipment body of shared equipment
Part.
Wherein, each shared equipment has unique corresponding equipment identities therewith.
Step S102, the user profile of user's input and the demand information to shared equipment to be used are obtained;
Specifically, user profile refers specifically to the identity information of user, such as ID card No..
Demand information for sharing equipment, is illustrated, it is assumed that shared equipment is shared washing machine, then user is to altogether
Enjoying the demand information of washing machine includes:Laundry duration, rinsing times, wash temperature, rotating speed etc..
Step S103, a high in the clouds password group is chosen from the high in the clouds cryptographic libraries, and by the high in the clouds password group and institute
User profile is stated to be recorded in the form of corresponding relation;
In the present embodiment, a high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group is corresponding one
User, each high in the clouds password group are to be directed to arrangement group of the shared equipment in different operating situation according to preset password create-rule
The set of lower caused all passwords is closed, namely the required institute using shared equipment of user is included in the password group of each high in the clouds
There is something special.Illustration, it is assumed that shared equipment is shared washing machine, and user washes to sharing the demand information of washing machine namely sharing
The working condition of clothing machine is:A length of 30 minutes during laundry, laundry mode is:Rinsing plus primary dewatering, kinds of laundry are twice:Lining
Shirt, formula is generated according to these demand informations and preset password create-rule such as password, obtain one with the demand information only
A password corresponding to one.
By the way that shared washing machine is produced into institute according to permutation and combination of the preset password create-rule in the case of different operating
There is the set of password, namely obtain a high in the clouds password group.
When being arranged in order in high in the clouds password group beyond the clouds cryptographic libraries, can using arrange foremost high in the clouds password group as
The high in the clouds password group of selection, it is of course also possible to randomly choose a high in the clouds password group.
Wherein, it is by the purpose that high in the clouds password group and user profile are recorded in the form of corresponding relation:Realize shared
The system of real name that equipment uses, to avoid the user to not up to age requirement from providing service, such as shared bicycle is needed using user
Over 12 one full year of life, while it is subsequently that user buys the offer conditions such as personal personal accidental death and injury insurance and third party liability insurance to be.
In actual applications, different ranks can be set to each high in the clouds password group included in the cryptographic libraries of high in the clouds, together
When, different grades is set to user, the rank of user, user are such as determined according to all previous total degree using shared equipment of user
The number used is more, and the rank of user is higher, and the user of same rank and high in the clouds password faciation are corresponding.
Therefore, the implementation procedure of this step is specially:Multiple high in the clouds passwords corresponding to shared equipment to be used are determined first
Group, secondly, user class, and the high in the clouds password group according to corresponding to determining user class are determined according to user profile.
Step S104, password corresponding with demand information is extracted from the password group of high in the clouds;
Wherein, the password is to use the password that preset password create-rule obtains to the demand information in advance, namely
The password is to be directed to share equipment caused by under the permutation and combination of different working conditions according to preset password create-rule, because
This, the working condition of information namely shared equipment, can extract corresponding password from the password group of high in the clouds according to demand.
Step S105, by cipher feedback to user, so that user when using shared equipment to be used, is shared by be used
Equipment utilization password and the equipment end cryptographic libraries of itself, determine the demand information of user, the synchronous checking of complete paired secret.
Specifically, high in the clouds cryptographic libraries by the cipher feedback found to user, user when using shared equipment to be used,
The password is inputted to shared equipment to be used, shared equipment utilization password to be used searches whether from the equipment end cryptographic libraries of itself
The password identical password with user's input is stored with, if it is, being generated using the password found and the preset password
Rule determines the demand information of user, the synchronous checking of complete paired secret.
Wherein, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group is corresponding one
User, each shared equipment equipment end password library storage all passwords and with the high in the clouds password that to share equipment corresponding
Password in storehouse, it is that the demand information of user is generated using identical preset password create-rule, so, shares equipment root
The password obtained according to user from high in the clouds cryptographic libraries, you can determine the demand information of user.
To sum up, the method for password authentication of shared equipment disclosed by the invention, by by shared equipment beyond the clouds server
Password in password in corresponding high in the clouds cryptographic libraries, and the equipment end cryptographic libraries of the shared equipment, is preset close using identical
Code create-rule so that user can utilize the demand information to equipment to be used, first from cloud before using shared equipment
Password corresponding to cryptographic libraries extraction is held, the password is obtained using preset password create-rule to demand information, then should in advance
Password Input is to shared equipment, when shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself,
The available password found and default password create-rule, the demand information of user is determined, so that complete paired secret is same
Step is demonstrate,proved.Therefore, the present invention realizes server beyond the clouds and shared equipment in the case where that need not connect network, based on identical
Password create-rule, the crypto-sync verification process between user and shared equipment is realized, so that shared equipment
Limited using network is no longer influenced by, and then effectively prevent the risk of the dangerous attack in internet.
Further, since method disclosed by the invention establishes network connection without shared between equipment and cloud server, because
This, for traditional scheme, the present invention also eliminates the wireless module set on a sharing device, so as to save shared set
Standby hardware cost.
It is appreciated that time requirement of the different shared equipment to payment can be different, such as shared washing machine, when user determines
After demand information to sharing washing machine, share washing machine can and generate corresponding expense according to these demand informations;Compare again
Such as shared bicycle, due to that can not know the usage time of user in advance, therefore can not determine the expense of user in advance, for this kind of
Shared equipment, it can be paid again after user is using completion.
For user in the scheme for having used shared equipment to pay again, reference can be made to existing scheme, here is omitted.
The scheme of shared equipment is reused for user's post-pay paystation, reference can be made to following examples.
In above-described embodiment, after cloud server completes charge in user, when just providing password to the user, step
S104 is specifically included:
The expense for needing user to pay corresponding with demand information is extracted from the password group of high in the clouds;
After detecting that user has paid expense, password corresponding with demand information is extracted from high in the clouds password group.
Based on the present embodiment as can be seen that expense and password are all to be extracted according to user's request from high in the clouds password group
, such as shared washing machine, laundry duration that cloud server selects according to user, rotating speed, wash temperature can be close from high in the clouds
Code group finds a corresponding expense for needing user to pay, and after user pays successfully, cloud server can be supplied to
One corresponding password of user.
Wherein, the corresponding relation of expense, password, high in the clouds password group and high in the clouds cryptographic libraries can be found in the schematic diagram shown in Fig. 2,
In Fig. 2, high in the clouds cryptographic libraries include multiple high in the clouds password groups, as high in the clouds password group 1, high in the clouds password group 2 ... high in the clouds password group
X, the corresponding user of each high in the clouds password group, multiple users correspond to multiple high in the clouds password groups, in actual applications, all
High in the clouds password group can be according to rank priority permutation and combination into high in the clouds cryptographic libraries, and each high in the clouds password group is according to preset password
Create-rule is directed to the set of shared equipment caused all passwords under the permutation and combination of different operating situation, namely each
Comprising the required all situations using shared equipment of user in the password group of high in the clouds, such as, the high in the clouds password group X in Fig. 2, share
The different working condition of equipment includes factor:(1) that shares equipment uses duration, such as 5 minutes, 10 minutes, 20 minutes;(2) number
Amount, by taking shared washing machine as an example, the quantity, which can refer to user, needs washed quantity, such as 1,2,3;(3) variable (change in such as Fig. 2
Amount 3, variable N) refer to influence the variable factors for sharing equipment mode of operation and expense, different durations may be considered some change
An element under amount, a kind of variable can include multiple element, such as element a, element b, element c.The arrangement of different factors
Combination produces a password and the unique expense corresponding with the password, and in Fig. 2, password a is corresponding with expense a, password b and
Expense b is corresponding, and password c is corresponding with expense c, and password d is corresponding with expense d, and password e is corresponding with Gebuehr.
It should be noted that cloud server and at least one shared equipment is into corresponding relation, cloud server and each
Individual shared equipment can form a system, and cloud server and multiple shared equipment form multiple systems, in practical application
In, same system will ensure preset password create-rule (bag used by equipment end cryptographic libraries and corresponding high in the clouds cryptographic libraries
Include the algorithm and encryption principle of password generation) it is consistent, the preset password create-rule between different systems can be different.And
And also need to ensure that the password in a number of high in the clouds password group that continuously generates of high in the clouds cryptographic libraries can not repeat.
Preferably, in above-described embodiment, own in the cryptographic libraries of high in the clouds in all high in the clouds password groups and equipment end cryptographic libraries
Equipment end password group can use identical password classification hierarchy plan, that is to say, that for same user same demand believe
Breath, corresponding high in the clouds password group is identical with the rank of equipment end password group, and password in the password group of high in the clouds and equipment end are close
Preset password create-rule is identical used by password in code group, but in the password and equipment end password group in the password group of high in the clouds
Time caused by password can be with identical, can also be different.
For convenience of search password, in actual applications, the scheme of shared equipment is reused for post-pay paystation, can according to
The sequencing paid is completed at family, determines user class, and when multiple users need payment expense, the time that user pays more leans on
Before, corresponding user class is higher, rank, the rank phase of equipment end password group of user class and corresponding high in the clouds password group
Together.
Referring to Fig. 3, a kind of cloud server disclosed in one embodiment of the invention and the corresponding relation of a shared equipment show
It is intended to, wherein, the corresponding relation of a cloud server and a shared equipment is only shown in Fig. 3, in actual applications, can be with
One cloud server corresponds to multiple shared equipment, and corresponding high in the clouds cryptographic libraries separate multiple shared equipment in server beyond the clouds
Management, complementation influence.
Understood with reference to Fig. 2 and Fig. 3, when user inputs different demand informations to high in the clouds cryptographic libraries, such as time, Working mould
Formula, quantity, variable three, the variable fourth class, different passwords can be obtained from high in the clouds cryptographic libraries, wherein, different users can obtain
Different password, as user 1 obtains password 1, the acquisition password 2 of user 2, the acquisition password 3 of user 3, the acquisition password 4 of user 4, user
5 obtain password 5 etc..
In actual applications, high in the clouds password group can be subjected to partition of the level, direction shown in arrow, high in the clouds are close along Fig. 3
The grade of code group gradually rises, and due to the corresponding user of a high in the clouds password group, each user can cloud corresponding to slave phase
Password group is held to obtain password, therefore, in embodiment illustrated in fig. 3, the grade of 1~password of password 5 gradually rises.
In shared equipment side, equipment end cryptographic libraries include multiple equipment end password group, each such as equipment end password group 1~5
The corresponding user of individual equipment end password group, as equipment end password group 5 is corresponding with user 5, the password in equipment end password group with
Preset password create-rule is identical used by password in the password group of high in the clouds.
If partition of the level is carried out to high in the clouds password group, then, accordingly, can also rank be carried out to equipment end password group and drawn
Point, the direction shown in arrow along Fig. 3, the grade of equipment end password group gradually rises.
Wherein, user gradation, equipment end password group grade are identical with the grade of high in the clouds password group grade three.
In actual applications, peer user uses peer device end password group, and each peer device end password group can normal rounds
Change, certainly, in some cases, user can also bypass the immediate leadership using equipment end password group, as in Fig. 3 user 2 normally should use set
Standby end password group 2, however, in some cases, user 2 can also use equipment end password group 3, now, can be by inferior grade
Equipment end password group 1 and equipment end password group 2 are placed into valid password reserved area, are used with next time.
For further optimization above-described embodiment, after detecting that user has paid expense, extract from high in the clouds password group and
The process of password corresponding to demand information, it can specifically include:
After detecting that user has paid the expense, extracted from the password group of high in the clouds corresponding with the demand information
Password, and user class is marked, wherein, when multiple users need payment expense, the user class completes branch according to user
The sequencing paid determines that the time that user completes to pay is more forward, and corresponding user class is higher.
It should be noted that cloud server is supplied to the password of user, it is from high in the clouds corresponding with user class password
What the demand information inputted in group according to user extracted, for example, shared washing machine, the demand information of user include:Washing
Time is 30 minutes, is rinsed 2 times, is dehydrated 1 time, cloud server is according to these demand informations, from cloud corresponding with user class
Hold password corresponding to extraction in password group.
Accordingly, step S105 is specifically included:
By cipher feedback to user, so that user is when using the shared equipment to be used, by described to be used shared
Password described in equipment utilization, from the equipment end cryptographic libraries of itself search whether to be stored with the password identical password, if
It is, it is determined that the user class and demand information of the user, complete the synchronization to the password and verify.
Wherein, user can input in digital form when inputting password to shared equipment, or by shared equipment according to
The caused self-service identification of two-dimension code credential after user's payment expense, or with password voice recognition mode input etc..
It should be noted that password is that nongraded system arranges in equipment end password group, only password is input by a user
To shared equipment, and just there are dividing for rank, and the rank of password and the rank phase of corresponding equipment end password group after determining use
Together.
Referring to Fig. 4, a kind of method of password authentication flow chart of shared equipment, this method disclosed in another embodiment of the present invention
Applied to shared equipment to be used, such as shared bicycle of the shared equipment to be used, shared electric car, shared washing machine, the party
Method includes step:
Step S201, user's password that cryptographic libraries obtain beyond the clouds is obtained;
Wherein, the password is to use the password that preset password create-rule obtains, the demand to demand information in advance
Information is demand information of the user to the shared equipment to be used.
User beyond the clouds cryptographic libraries obtain password process can be found in embodiment illustrated in fig. 1, here is omitted.
Step S202, search whether to be stored with and password identical password from the equipment end cryptographic libraries of itself using password;
Wherein, equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponds to a user,
Each shared equipment is shared in the corresponding high in the clouds cryptographic libraries of equipment in all passwords of equipment end password library storage and with this
Password, be that the demand information of user is generated using identical preset password create-rule, so, share equipment according to
The password and preset password create-rule that family obtains from high in the clouds cryptographic libraries, you can determine the demand information of user.
In this step, shared equipment to be used determines whether equipment of itself end cryptographic libraries are stored with the password with user's input
The purpose of identical password is:Whether the password for judging user's input is valid password.
Step S203, if it is, determining the need of user using the password and the preset password create-rule that find
Ask information, the synchronous checking of complete paired secret.
Wherein, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user, and
Each high in the clouds password group is to be directed to shared equipment under the permutation and combination of different operating situation according to preset password create-rule
The set of caused all passwords.
To sum up, the method for password authentication of shared equipment disclosed by the invention, by by shared equipment beyond the clouds server
Password in password in corresponding high in the clouds cryptographic libraries, and the equipment end cryptographic libraries of the shared equipment, is preset close using identical
Code create-rule so that user can utilize the demand information to equipment to be used, first from cloud before using shared equipment
Password corresponding to cryptographic libraries extraction is held, the password is obtained using preset password create-rule to demand information, then should in advance
Password Input is to shared equipment, when shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself,
The available password found and default password create-rule, the demand information of user is determined, so that complete paired secret is same
Step is demonstrate,proved.Therefore, the present invention realizes server beyond the clouds and shared equipment in the case where that need not connect network, based on identical
Password create-rule, the crypto-sync verification process between user and shared equipment is realized, so that shared equipment
Limited using network is no longer influenced by, and then effectively prevent the risk of the dangerous attack in internet.
Further, since method disclosed by the invention establishes network connection without shared between equipment and cloud server, because
This, for traditional scheme, the present invention also eliminates the wireless module set on a sharing device, so as to save shared set
Standby hardware cost.
Wherein, when not found with the password identical password from the equipment end cryptographic libraries, prompt message is exported,
The prompt message is used to prompt user to re-enter password.
As shown in figure 3, in actual applications, valid password reserved area can be set in equipment end cryptographic libraries, when to be used
Shared equipment can be searched preferentially, if effective it needs to be determined that when whether the password of user's input stores in valid password reserved area
Password reserved area is not found, then the caused equipment end password group for being not located at valid password reserved area of slave unit end cryptographic libraries
Middle lookup.
Wherein, valid password reserved area is mainly used in retaining shared equipment to be used and obtained but untapped password.
Therefore, can specifically include for further optimization above-described embodiment, step S202:
In the equipment end password group placed using password from the valid password reserved area of the equipment end cryptographic libraries of itself, search
Whether it is stored with and the password identical password.
Step S202 can also specifically include:
When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password,
Then from the equipment end cryptographic libraries caused equipment end password group, search whether to be stored with close with the password identical
Code.
In actual applications, the scheme of shared equipment is reused for post-pay paystation, the elder generation paid can be completed according to user
Order afterwards, determines user class, and when multiple users need payment expense, the time that user pays is more forward, corresponding user
Rank is higher, and user class, the rank of high in the clouds password group are consistent with the rank three of equipment end password group.
Therefore, cloud server is extracting password, and after user class is marked, then, it is to be used shared
Equipment can be according to the rank of the equipment end password group where the password of the password match provided with user, it may be determined that user class
Not.
So when being found and the password identical from the equipment end cryptographic libraries caused equipment end password group
Password, the step S203 in above-described embodiment can specifically include:
The user class and demand letter of the user is determined using the password and the preset password create-rule that find
Breath, complete the synchronization to the password and verify.
It should be noted that the password of valid password reserved area is by use, the password rotation not to normal level produces
Influence, the password in valid password reserved area can just disappear when being used.
After the synchronous checking of complete paired secret, the untapped equipment end password group of user class can will be superior to
The valid password reserved area is put into, and deletes the equipment end password group that all ranks are less than the user class.
Wherein, the equipment end password group in the high in the clouds password group and equipment end cryptographic libraries in the cryptographic libraries of high in the clouds is according to default
It is regular gradually caused, and with the regular password group for gradually eliminating inferior grade of setting, to ensure the high in the clouds password of high in the clouds cryptographic libraries
Equipment end password group in group and equipment end cryptographic libraries does not repeat in the range of certain amount.
High in the clouds password group can be after user cipher or user's payment behavior of completion be supplied to, and increase is one or more
High in the clouds password group, the high in the clouds password group of certain data can also be increased by date, certain number of days, or used according to user
Frequent degree, quantity caused by password is determined, the removal of invalid high in the clouds password group can be in the following ways:Set high in the clouds password group
The term of validity, it is automatically deleted after exceeding the time limit;After user completes Self-Service, and after the completion of feedback, to used high in the clouds password group
Deleted;Various ways mixing can also be used to judge.
Whether equipment end password group, which needs, increases, the number that is used with increased quantity with user, the time interval used,
One kind or more in existing effectively equipment end password group quantity, the work characteristics of shared equipment, cryptographic levels of user's input etc.
Kind hybrid mode is determined, and the elimination of invalid password used to be automatically deleted by user to be defined.
After one section of usage time, when shared equipment has obtained but during unused password increase, valid password reserved area
In capacity can be increasing, eliminated in a certain way after certain amount is increased to, with share equipment work characteristics,
User uses this, the cryptographic levels comprehensive descision in valid password reserved area.
Above-described embodiment, when it is determined that the demand information of user, after the synchronous checking of complete paired secret, in addition to:
The password being proved to be successful is deleted.
It should be noted that in the present invention, when abnormal conditions occurs in the course of the work in shared equipment, such as powers off, altogether
The information before abnormal conditions can be stored by enjoying equipment, it is to be restored it is normal after, the work before continuing, until completing this
Service.
Corresponding with above method embodiment, the invention also discloses a kind of cloud server and a kind of shared equipment, tool
Body is referring to described below.
Referring to Fig. 5, a kind of structural representation of cloud server disclosed in one embodiment of the invention, the cloud server with
For at least one shared equipment into corresponding relation, the cloud server has multiple high in the clouds cryptographic libraries, each high in the clouds cryptographic libraries pair
A shared equipment is answered, the cloud server includes:
First acquisition unit 301, the equipment identities of the shared equipment to be used for obtaining user's input, sets according to described
High in the clouds cryptographic libraries corresponding to standby identity determination;
In actual applications, user can be obtained altogether by the Quick Response Code of the shared equipment of the terminal scannings such as mobile phone, IPAD
The equipment identities of equipment are enjoyed, the equipment identities namely device identification.Certainly, user can also be obtained shared using other modes
The equipment identities of equipment, such as by the way that the identity code printed in shared equipment is inputted into computer to obtain the equipment body of shared equipment
Part.
Wherein, each shared equipment has unique corresponding equipment identities therewith.
Second acquisition unit 302, for obtaining the user profile of user's input and being set to be used share
Standby demand information;
Specifically, user profile refers specifically to the identity information of user, such as ID card No..
Demand information for sharing equipment, is illustrated, it is assumed that shared equipment is shared washing machine, then user is to altogether
Enjoying the demand information of washing machine includes:Laundry duration, rinsing times, wash temperature, rotating speed etc..
Unit 303 is chosen, for choosing a high in the clouds password group from the high in the clouds cryptographic libraries, and by the high in the clouds password
Group and the user profile are recorded in the form of corresponding relation;
In the present embodiment, a high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group is corresponding one
User, each high in the clouds password group are to be directed to arrangement group of the shared equipment in different operating situation according to preset password create-rule
The set of lower caused all passwords is closed, namely the required institute using shared equipment of user is included in the password group of each high in the clouds
There is something special.Illustration, it is assumed that shared equipment is shared washing machine, and user washes to sharing the demand information of washing machine namely sharing
The working condition of clothing machine is:A length of 30 minutes during laundry, laundry mode is:Rinsing plus primary dewatering, kinds of laundry are twice:Lining
Shirt, formula is generated according to these demand informations and preset password create-rule such as password, obtain one with the demand information only
A password corresponding to one.
By the way that shared washing machine is produced into institute according to permutation and combination of the preset password create-rule in the case of different operating
There is the set of password, namely obtain a high in the clouds password group.
When being arranged in order in high in the clouds password group beyond the clouds cryptographic libraries, can using arrange foremost high in the clouds password group as
The high in the clouds password group of selection, it is of course also possible to randomly choose a high in the clouds password group.
Wherein, it is by the purpose that high in the clouds password group and user profile are recorded in the form of corresponding relation:Realize shared
The system of real name that equipment uses, to avoid the user to not up to age requirement from providing service, such as shared bicycle is needed using user
Over 12 one full year of life, while it is subsequently that user buys the offer conditions such as personal personal accidental death and injury insurance and third party liability insurance to be.
In actual applications, different ranks can be set to each high in the clouds password group included in the cryptographic libraries of high in the clouds, together
When, different grades is set to user, the rank of user, user are such as determined according to all previous total degree using shared equipment of user
The number used is more, and the rank of user is higher, and the user of same rank and high in the clouds password faciation are corresponding.
Therefore, choosing the implementation procedure of unit 303 is specially:Determine that multiple high in the clouds corresponding to shared equipment to be used are close first
Code group, secondly, user class, and the high in the clouds password group according to corresponding to determining user class are determined according to user profile.
Extraction unit 304, for extracting password corresponding with the demand information from the high in the clouds password group;
Wherein, the password is to use the password that preset password create-rule obtains to the demand information in advance, namely
The password is to be directed to share equipment caused by under the permutation and combination of different working conditions according to preset password create-rule, because
This, the working condition of information namely shared equipment, can extract corresponding password from the password group of high in the clouds according to demand.
Feedback unit 305, for giving the cipher feedback to the user, so that the user is using described to be used
During shared equipment, the password as described in the shared equipment utilization to be used, search whether to store from the equipment end cryptographic libraries of itself
Have with the password identical password, if it is, determining institute using the password and the preset password create-rule found
The demand information of user is stated, the synchronization to the password is completed and verifies.
Specifically, high in the clouds cryptographic libraries by the cipher feedback found to user, user when using shared equipment to be used,
The password is inputted to shared equipment to be used, shared equipment utilization password to be used searches whether from the equipment end cryptographic libraries of itself
The password identical password with user's input is stored with, if it is, being generated using the password found and the preset password
Rule determines the demand information of user, the synchronous checking of complete paired secret.
Wherein, the equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group is corresponding one
User, each shared equipment equipment end password library storage all passwords and with the high in the clouds password that to share equipment corresponding
Password in storehouse, it is that the demand information of user is generated using identical preset password create-rule, so, shares equipment root
The password obtained according to user from high in the clouds cryptographic libraries, you can determine the demand information of user.
To sum up, cloud server disclosed by the invention, by the way that corresponding high in the clouds in shared equipment beyond the clouds server is close
Password in password in code storehouse, and the equipment end cryptographic libraries of the shared equipment, using identical preset password create-rule, makes
User is obtained before using shared equipment, the demand information to equipment to be used can be utilized, extracted first from high in the clouds cryptographic libraries
Corresponding password, the password are obtained to demand information using preset password create-rule in advance, then by the Password Input to altogether
Equipment is enjoyed, it is available to find when shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself
Password and default password create-rule, the demand information of user is determined, so as to the synchronous checking of complete paired secret.Therefore,
The present invention realizes server beyond the clouds and shared equipment in the case where that need not connect network, is generated and advised based on identical password
Then, the crypto-sync verification process between user and shared equipment is realized, so that the use of shared equipment is no longer influenced by
Network limits, and then effectively prevent the risk of the dangerous attack in internet.
Further, since method disclosed by the invention establishes network connection without shared between equipment and cloud server, because
This, for traditional scheme, the present invention also eliminates the wireless module set on a sharing device, so as to save shared set
Standby hardware cost.
It is appreciated that time requirement of the different shared equipment to payment can be different, such as shared washing machine, when user determines
After demand information to sharing washing machine, share washing machine can and generate corresponding expense according to these demand informations;Compare again
Such as shared bicycle, due to that can not know the usage time of user in advance, therefore can not determine the expense of user in advance, for this kind of
Shared equipment, it can be paid again after user is using completion.
For user in the scheme for having used shared equipment to pay again, reference can be made to existing scheme, here is omitted.
The scheme of shared equipment is reused for user's post-pay paystation, reference can be made to following examples.
In above-described embodiment, after cloud server completes charge in user, when just providing password to the user,
Extraction unit 304 includes:
First extraction subelement, corresponding with the demand information needs institute for being extracted from the high in the clouds password group
State the expense of user's payment;
Second extraction subelement, for after detecting that the user has paid the expense, from the high in the clouds password group
Extract password corresponding with the demand information.
Based on the present embodiment as can be seen that expense and password are all to be extracted according to user's request from high in the clouds password group
, such as shared washing machine, laundry duration that cloud server selects according to user, rotating speed, wash temperature can be close from high in the clouds
Code group finds a corresponding expense for needing user to pay, and after user pays successfully, cloud server can be supplied to
One corresponding password of user.
Wherein, the corresponding relation of expense, password, high in the clouds password group and high in the clouds cryptographic libraries can be found in the schematic diagram shown in Fig. 2
And associated description.
It should be noted that cloud server and at least one shared equipment is into corresponding relation, cloud server and each
Individual shared equipment can form a system, and cloud server and multiple shared equipment form multiple systems, in practical application
In, same system will ensure preset password create-rule (bag used by equipment end cryptographic libraries and corresponding high in the clouds cryptographic libraries
Include the algorithm and encryption principle of password generation) it is consistent, the preset password create-rule between different systems can be different.And
And also need to ensure that the password in a number of high in the clouds password group that continuously generates of high in the clouds cryptographic libraries can not repeat.
Preferably, in above-described embodiment, own in the cryptographic libraries of high in the clouds in all high in the clouds password groups and equipment end cryptographic libraries
Equipment end password group can use identical password classification hierarchy plan, that is to say, that for same user same demand believe
Breath, corresponding high in the clouds password group is identical with the rank of equipment end password group, and password in the password group of high in the clouds and equipment end are close
Preset password create-rule is identical used by password in code group, but in the password and equipment end password group in the password group of high in the clouds
Time caused by password can be with identical, can also be different.
For convenience of search password, in actual applications, the scheme of shared equipment is reused for post-pay paystation, can according to
The sequencing paid is completed at family, determines user class, and when multiple users need payment expense, the time that user pays more leans on
Before, corresponding user class is higher, rank, the rank phase of equipment end password group of user class and corresponding high in the clouds password group
Together.
Cloud server and the corresponding relation of shared equipment can be found in Fig. 3 and associated description, no longer trace herein.
For further optimization above-described embodiment, the second extraction subelement is specifically used for:
After detecting that the user has paid the expense, extract from the high in the clouds password group and believe with the demand
Password corresponding to breath, and mark user class, wherein, when multiple users need payment expense, the user class according to
The sequencing that family completes to pay determines that the time that user completes to pay is more forward, and corresponding user class is higher;
Feedback unit 305 is specifically used for:
It is described to give the cipher feedback to the user so that the user using the shared equipment to be used when,
The password as described in the shared equipment utilization to be used, search whether to be stored with and the password from the equipment end cryptographic libraries of itself
Identical password, if it is, determining the user class and demand information of the user, complete the same step to the password
Card.
Wherein, user can input in digital form when inputting password to shared equipment, or by shared equipment according to
The caused self-service identification of two-dimension code credential after user's payment expense, or with password voice recognition mode input etc..
It should be noted that password is that nongraded system arranges in equipment end password group, only password is input by a user
To shared equipment, and just there are dividing for rank, and the rank of password and the rank phase of corresponding equipment end password group after determining use
Together.
Referring to Fig. 6, a kind of structural representation of shared equipment disclosed in one embodiment of the invention, this is shared as shared single
Car, shared electric car, shared washing machine etc., shared equipment includes:
3rd acquiring unit 401, for obtaining user's password that cryptographic libraries obtain beyond the clouds, the password is in advance to needing
The password for asking information to use preset password create-rule to obtain, the demand information are that the user sets to be used share
Standby demand information;
Searching unit 402, for using the password from the equipment end cryptographic libraries of itself search whether to be stored with it is described
Password identical password;
Wherein, equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group corresponds to a user,
Each shared equipment is shared in the corresponding high in the clouds cryptographic libraries of equipment in all passwords of equipment end password library storage and with this
Password, be that the demand information of user is generated using identical preset password create-rule, so, share equipment according to
The password and preset password create-rule that family obtains from high in the clouds cryptographic libraries, you can determine the demand information of user.
Authentication unit 403, for determining the user's using the password and the preset password create-rule that find
Demand information, complete the synchronization to the password and verify.
Wherein, the high in the clouds cryptographic libraries include multiple high in the clouds password groups, and each high in the clouds password group corresponds to a user, often
One high in the clouds password group is to be directed to shared equipment according to preset password create-rule to produce under the permutation and combination of different operating situation
The set of raw all passwords;The equipment end cryptographic libraries include multiple equipment end password group, and each equipment end password group is right
Ying Yiwei user, each shared equipment equipment end password library storage all passwords and with the cloud that to share equipment corresponding
The password in cryptographic libraries is held, is that the demand information of user is generated using identical preset password create-rule, so, shares
The password that equipment obtains according to user from high in the clouds cryptographic libraries, you can determine the demand information of user.
To sum up, shared equipment disclosed by the invention, by by corresponding high in the clouds password in shared equipment beyond the clouds server
Password in password in storehouse, and the equipment end cryptographic libraries of the shared equipment, using identical preset password create-rule so that
User can utilize the demand information to equipment to be used before using shared equipment, first from the extraction pair of high in the clouds cryptographic libraries
The password answered, the password are obtained to demand information using preset password create-rule in advance, then by the Password Input to shared
Equipment, when shared equipment finds password corresponding with the password from the equipment end cryptographic libraries of itself, using what is found
Password and default password create-rule, the demand information of user is determined, so as to the synchronous checking of complete paired secret.Therefore, originally
Invention realizes server beyond the clouds and shared equipment in the case where that need not connect network, is generated and advised based on identical password
Then, the crypto-sync verification process between user and shared equipment is realized, so that the use of shared equipment is no longer influenced by
Network limits, and then effectively prevent the risk of the dangerous attack in internet.
Further, since method disclosed by the invention establishes network connection without shared between equipment and cloud server, because
This, for traditional scheme, the present invention also eliminates the wireless module set on a sharing device, so as to save shared set
Standby hardware cost.
Further to optimize above-described embodiment, in addition to:Output unit, do not searched for working as from the equipment end cryptographic libraries
During to the password identical password, prompt message is exported, the prompt message is used to prompt user to re-enter password.
As shown in figure 3, in actual applications, valid password reserved area can be set in equipment end cryptographic libraries, when to be used
Shared equipment can be searched preferentially, if effective it needs to be determined that when whether the password of user's input stores in valid password reserved area
Password reserved area is not found, then the caused equipment end password group for being not located at valid password reserved area of slave unit end cryptographic libraries
Middle lookup.
Wherein, valid password reserved area is mainly used in retaining shared equipment to be used and obtained but untapped password.
Therefore, specifically can be used for for further optimization above-described embodiment, searching unit 402:
In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself,
Search whether to be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used
Shared equipment has obtained but untapped password.
Searching unit 402 specifically can be also used for:
When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password,
Then from the equipment end cryptographic libraries caused equipment end password group, search whether to be stored with close with the password identical
Code.
In actual applications, the scheme of shared equipment is reused for post-pay paystation, the elder generation paid can be completed according to user
Order afterwards, determines user class, and when multiple users need payment expense, the time that user pays is more forward, corresponding user
Rank is higher, and user class, the rank of high in the clouds password group are consistent with the rank three of equipment end password group.
Therefore, cloud server is extracting password, and after user class is marked, then, it is to be used shared
Equipment can be according to the rank of the equipment end password group where the password of the password match provided with user, it may be determined that user class
Not.
So when being found and the password identical from the equipment end cryptographic libraries caused equipment end password group
Password, authentication unit 403 are specifically used for:
The user class and demand letter of the user is determined using the password and the preset password create-rule that find
Breath, complete the synchronization to the password and verify.
It should be noted that the password of valid password reserved area is by use, the password rotation not to normal level produces
Influence, the password in valid password reserved area can just disappear when being used.
After the synchronous checking of complete paired secret, the untapped equipment end password group of user class can will be superior to
The valid password reserved area is put into, and deletes the equipment end password group that all ranks are less than the user class.
Wherein, the equipment end password group in the high in the clouds password group and equipment end cryptographic libraries in the cryptographic libraries of high in the clouds is according to default
It is regular gradually caused, and with the regular password group for gradually eliminating inferior grade of setting, to ensure the high in the clouds password of high in the clouds cryptographic libraries
Equipment end password group in group and equipment end cryptographic libraries does not repeat in the range of certain amount.
High in the clouds password group can be after user cipher or user's payment behavior of completion be supplied to, and increase is one or more
High in the clouds password group, the high in the clouds password group of certain data can also be increased by date, certain number of days, or used according to user
Frequent degree, quantity caused by password is determined, the removal of invalid high in the clouds password group can be in the following ways:Set high in the clouds password group
The term of validity, it is automatically deleted after exceeding the time limit;After user completes Self-Service, and after the completion of feedback, to used high in the clouds password group
Deleted;Various ways mixing can also be used to judge.
Whether equipment end password group, which needs, increases, the number that is used with increased quantity with user, the time interval used,
One kind or more in existing effectively equipment end password group quantity, the work characteristics of shared equipment, cryptographic levels of user's input etc.
Kind hybrid mode is determined, and the elimination of invalid password used to be automatically deleted by user to be defined.
After one section of usage time, when shared equipment has obtained but during unused password increase, valid password reserved area
In capacity can be increasing, eliminated in a certain way after certain amount is increased to, with share equipment work characteristics,
User uses this, the cryptographic levels comprehensive descision in valid password reserved area.
Therefore, sharing equipment also includes:
Placement unit, for after the synchronous checking to the password is completed, the user class will to be superior to
Untapped equipment end password group is put into the valid password reserved area;
First deletes unit, and the equipment end password group of the user class is less than for deleting all ranks.
For further optimization above-described embodiment, shared equipment also includes:
Second deletes unit, for it is determined that the demand information of the user, completes the synchronization to the password and verify it
Afterwards, the password being proved to be successful is deleted.
Present invention also offers a kind of password validation system of shared equipment, the system includes cloud service described above
Device and at least one shared equipment described above, wherein, the operation principle of system refers to cloud server and shared equipment
Corresponding part, here is omitted.
It should be noted that share the specific works of each part in equipment, cloud server and password validation system
Principle refers to embodiment of the method corresponding part, and here is omitted.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by
One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation
Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that
A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or
The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged
Except other identical element in the process including the key element, method, article or equipment being also present.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other
The difference of embodiment, between each embodiment identical similar portion mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (31)
- A kind of 1. method of password authentication of shared equipment, it is characterised in that applied to cloud server, the cloud service utensil There are multiple high in the clouds cryptographic libraries, the corresponding shared equipment of each high in the clouds cryptographic libraries, methods described includes:Obtain the equipment identities of the shared equipment to be used of user's input, the high in the clouds password according to corresponding to determining the equipment identities Storehouse;Obtain the user profile of user's input and the demand information to the shared equipment to be used;A high in the clouds password group is chosen from the high in the clouds cryptographic libraries, and by the high in the clouds password group and the user profile with right The form that should be related to is recorded;Password corresponding with the demand information is extracted from the high in the clouds password group, wherein, the password is in advance to institute State the password that demand information uses preset password create-rule to obtain;The cipher feedback is given to the user, so that the user is treated when using the shared equipment to be used by described Using password described in shared equipment utilization, search whether to be stored with from the equipment end cryptographic libraries of itself close with the password identical Code, if it is, the demand information of the user is determined using the password and the preset password create-rule that find, The synchronization to the password is completed to verify.
- 2. method of password authentication according to claim 1, it is characterised in that it is close that the high in the clouds cryptographic libraries include multiple high in the clouds Code group, the corresponding user of each high in the clouds password group, each high in the clouds password group is to be directed to according to preset password create-rule The set of shared equipment caused all passwords under the permutation and combination of different operating situation.
- 3. method of password authentication according to claim 1, it is characterised in that the equipment end cryptographic libraries include multiple equipment Hold password group, the corresponding user of each equipment end password group, institute of each shared equipment in equipment end password library storage There is password and the password in the corresponding high in the clouds cryptographic libraries of equipment is shared with this, be that identical is used to the demand information of user Preset password create-rule generates.
- 4. method of password authentication according to claim 1, it is characterised in that when the cloud server is complete in the user Into after payment, there is provided when password gives the user, extracted from the high in the clouds password group corresponding with the demand information close Code, is specifically included:The expense for needing the user to pay corresponding with the demand information is extracted from the high in the clouds password group;After detecting that the user has paid the expense, extracted from the high in the clouds password group corresponding with the demand information Password.
- 5. method of password authentication according to claim 4, it is characterised in that when detecting that the user paid the expense With rear, password corresponding with the demand information is extracted from the high in the clouds password group, is specifically included:After detecting that the user has paid the expense, extracted from the high in the clouds password group and the demand information pair The password answered, and user class is marked, wherein, when multiple users need payment expense, the user class is complete according to user Sequencing into payment determines that the time that user completes to pay is more forward, and corresponding user class is higher;The cipher feedback is given to the user, so that the user is treated when using the shared equipment to be used by described Using password described in shared equipment utilization, search whether to be stored with from the equipment end cryptographic libraries of itself close with the password identical Code, if it is, determining the demand information of the user using the password found, completes the same step to the password Card, is specifically included:The cipher feedback is given to the user, so that the user is treated when using the shared equipment to be used by described Using password described in shared equipment utilization, search whether to be stored with from the equipment end cryptographic libraries of itself close with the password identical Code, if it is, determining the user class and demand information of the user, complete the synchronization to the password and verify.
- 6. method of password authentication according to claim 1, it is characterised in that all high in the clouds is close in the high in the clouds cryptographic libraries All equipment end passwords are mined massively with identical password classification hierarchy plan in code group and the equipment end cryptographic libraries.
- 7. a kind of method of password authentication of shared equipment, it is characterised in that applied to shared equipment to be used, methods described bag Include:User's password that cryptographic libraries obtain beyond the clouds is obtained, the password is in advance to demand information using preset password generation rule The password then obtained, the demand information are demand information of the user to the shared equipment to be used;Search whether to be stored with and the password identical password from the equipment end cryptographic libraries of itself using the password;If it is, the demand information of the user is determined using the password and the preset password create-rule that find, it is complete The synchronous checking of the paired password.
- 8. method of password authentication according to claim 7, it is characterised in that it is close that the high in the clouds cryptographic libraries include multiple high in the clouds Code group, the corresponding user of each high in the clouds password group, each high in the clouds password group is to be directed to according to preset password create-rule The set of shared equipment caused all passwords under the permutation and combination of different operating situation.
- 9. method of password authentication according to claim 7, it is characterised in that the equipment end cryptographic libraries include multiple equipment Hold password group, the corresponding user of each equipment end password group, institute of each shared equipment in equipment end password library storage There is password and the password in the corresponding high in the clouds cryptographic libraries of equipment is shared with this, be that identical is used to the demand information of user Preset password create-rule generates.
- 10. method of password authentication according to claim 7, it is characterised in that the setting from itself using the password Standby end cryptographic libraries search whether to be stored with the password identical password, specifically include:In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself, search Whether be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used shared Equipment has obtained but untapped password.
- 11. method of password authentication according to claim 7, it is characterised in that the setting from itself using the password Standby end cryptographic libraries search whether to be stored with the password identical password, specifically include:When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password, then from The equipment end cryptographic libraries in caused equipment end password group, search whether to be stored with and the password identical password.
- 12. method of password authentication according to claim 7, it is characterised in that produced when from the equipment end cryptographic libraries Equipment end password group in find and the password identical password, and the rank of high in the clouds password group, equipment end password group It is described to determine the use using the password found and the preset password create-rule when rank is consistent with user class three The demand information at family, complete the synchronization to the password and verify, specifically include:The user class and demand information of the user is determined using the password and the preset password create-rule that find, it is complete The synchronous checking of the paired password.
- 13. method of password authentication according to claim 12, it is characterised in that verified when completing the synchronization to the password Afterwards, in addition to:The untapped equipment end password group for being superior to the user class is put into the valid password reserved area;Delete the equipment end password group that all ranks are less than the user class.
- 14. method of password authentication according to claim 7, it is characterised in that it is determined that the demand information of the user, complete After the synchronous checking of the paired password, in addition to:The password being proved to be successful is deleted.
- 15. method of password authentication according to claim 7, it is characterised in that also include:When not found with the password identical password from the equipment end cryptographic libraries, prompt message, the prompting are exported Information is used to prompt user to re-enter password.
- 16. a kind of cloud server, it is characterised in that the cloud server has multiple high in the clouds cryptographic libraries, each high in the clouds The corresponding shared equipment of cryptographic libraries, the cloud server include:First acquisition unit, the equipment identities of the shared equipment to be used for obtaining user's input, according to the equipment identities It is determined that corresponding high in the clouds cryptographic libraries;Second acquisition unit, for obtaining the user profile of user's input and the demand to the shared equipment to be used Information;Unit is chosen, for choosing a high in the clouds password group from the high in the clouds cryptographic libraries, and by the high in the clouds password group and institute User profile is stated to be recorded in the form of corresponding relation;Extraction unit, for extracting password corresponding with the demand information from the high in the clouds password group, wherein, it is described close Code is to use the password that preset password create-rule obtains to the demand information in advance;Feedback unit, for giving the cipher feedback to the user, so that the user is set using to be used share When standby, the password as described in the shared equipment utilization to be used searches whether to be stored with and institute from the equipment end cryptographic libraries of itself Password identical password is stated, if it is, determining the user using the password and the preset password create-rule found The demand information, complete to the password synchronization verify.
- 17. cloud server according to claim 16, it is characterised in that it is close that the high in the clouds cryptographic libraries include multiple high in the clouds Code group, the corresponding user of each high in the clouds password group, each high in the clouds password group is to be directed to according to preset password create-rule The set of shared equipment caused all passwords under the permutation and combination of different operating situation.
- 18. cloud server according to claim 16, it is characterised in that the equipment end cryptographic libraries include multiple equipment Hold password group, the corresponding user of each equipment end password group, institute of each shared equipment in equipment end password library storage There is password and the password in the corresponding high in the clouds cryptographic libraries of equipment is shared with this, be that identical is used to the demand information of user Preset password create-rule generates.
- 19. cloud server according to claim 16, it is characterised in that when the cloud server is complete in the user Into after payment, there is provided when password gives the user, the extraction unit includes:First extraction subelement, corresponding with the demand information needs the use for being extracted from the high in the clouds password group The expense that family is paid;Second extraction subelement, for after detecting that the user has paid the expense, being extracted from the high in the clouds password group Go out password corresponding with the demand information.
- 20. cloud server according to claim 19, it is characterised in that the second extraction subelement is specifically used for:After detecting that the user has paid the expense, extracted from the high in the clouds password group and the demand information pair The password answered, and user class is marked, wherein, when multiple users need payment expense, the user class is complete according to user Sequencing into payment determines that the time that user completes to pay is more forward, and corresponding user class is higher;The feedback unit is specifically used for:The cipher feedback is given to the user, so that the user is treated when using the shared equipment to be used by described Using password described in shared equipment utilization, search whether to be stored with from the equipment end cryptographic libraries of itself close with the password identical Code, if it is, determining the user class and demand information of the user, complete the synchronization to the password and verify.
- 21. cloud server according to claim 16, it is characterised in that all high in the clouds is close in the high in the clouds cryptographic libraries All equipment end passwords are mined massively with identical password classification hierarchy plan in code group and the equipment end cryptographic libraries.
- A kind of 22. shared equipment, it is characterised in that including:3rd acquiring unit, for obtaining user's password that cryptographic libraries obtain beyond the clouds, the password is in advance to demand information The password obtained using preset password create-rule, the demand information are need of the user to the shared equipment to be used Seek information;Searching unit is identical with the password for searching whether to be stored with from the equipment end cryptographic libraries of itself using the password Password;Authentication unit, for determining the demand letter of the user using the password and the preset password create-rule that find Breath, complete the synchronization to the password and verify.
- 23. shared equipment according to claim 22, it is characterised in that the high in the clouds cryptographic libraries include multiple high in the clouds passwords Group, the corresponding user of each high in the clouds password group, each high in the clouds password group is for altogether according to preset password create-rule Enjoy the set of equipment caused all passwords under the permutation and combination of different operating situation.
- 24. shared equipment according to claim 22, it is characterised in that the equipment end cryptographic libraries include multiple equipment end Password group, the corresponding user of each equipment end password group, each shared equipment is in all of equipment end password library storage Password and the password in the corresponding high in the clouds cryptographic libraries of equipment is shared with this, be pre- using identical to the demand information of user If password create-rule generates.
- 25. shared equipment according to claim 22, it is characterised in that the searching unit is specifically used for:In the equipment end password group placed using the password from the valid password reserved area of the equipment end cryptographic libraries of itself, search Whether be stored with the password identical password, wherein, the valid password reserved area is used to retaining described to be used shared Equipment has obtained but untapped password.
- 26. shared equipment according to claim 22, it is characterised in that the searching unit is specifically used for:When the valid password reserved area of the equipment end cryptographic libraries from itself is not found with the password identical password, then from The equipment end cryptographic libraries in caused equipment end password group, search whether to be stored with and the password identical password.
- 27. shared equipment according to claim 22, it is characterised in that set when from the equipment end cryptographic libraries are caused Found in standby end password group and the password identical password, and the rank of high in the clouds password group, the rank of equipment end password group When consistent with user class three, the authentication unit is specifically used for:The user class and demand information of the user is determined using the password and the preset password create-rule that find, it is complete The synchronous checking of the paired password.
- 28. shared equipment according to claim 27, it is characterised in that also include:Placement unit, for after the synchronous checking to the password is completed, not making for the user class will to be superior to Equipment end password group is put into the valid password reserved area;First deletes unit, and the equipment end password group of the user class is less than for deleting all ranks.
- 29. shared equipment according to claim 22, it is characterised in that also include:Second deletes unit, for it is determined that the demand information of the user, after completing the synchronous checking to the password, is incited somebody to action The password being proved to be successful is deleted.
- 30. shared equipment according to claim 22, it is characterised in that also include:Output unit, for when not found with the password identical password from the equipment end cryptographic libraries, output to be prompted Information, the prompt message are used to prompt user to re-enter password.
- 31. a kind of password validation system of shared equipment, it is characterised in that including described in claim 16~21 any one Shared equipment described in cloud server and at least one claim 22~30.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710703147.0A CN107483581B (en) | 2017-08-16 | 2017-08-16 | Password verification method of sharing device, cloud server and system |
PCT/CN2018/090666 WO2019033840A1 (en) | 2017-08-16 | 2018-06-11 | Password authentication method for shared device, shared device, cloud server, and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710703147.0A CN107483581B (en) | 2017-08-16 | 2017-08-16 | Password verification method of sharing device, cloud server and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107483581A true CN107483581A (en) | 2017-12-15 |
CN107483581B CN107483581B (en) | 2020-02-14 |
Family
ID=60600611
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710703147.0A Active CN107483581B (en) | 2017-08-16 | 2017-08-16 | Password verification method of sharing device, cloud server and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107483581B (en) |
WO (1) | WO2019033840A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019033840A1 (en) * | 2017-08-16 | 2019-02-21 | 格力电器(武汉)有限公司 | Password authentication method for shared device, shared device, cloud server, and system |
CN109448209A (en) * | 2019-01-07 | 2019-03-08 | 上海早米网络科技有限公司 | A kind of dynamic password massage control system and control method based on off-line mode |
CN109887179A (en) * | 2019-01-23 | 2019-06-14 | 上海早米网络科技有限公司 | Charge sharing massage control system and control method based on offline dynamic password |
CN109978529A (en) * | 2017-12-27 | 2019-07-05 | 青岛胶南海尔洗衣机有限公司 | Offline electronic payment method |
WO2019153534A1 (en) * | 2018-02-12 | 2019-08-15 | 平安科技(深圳)有限公司 | Insurance premium calculation method and device, computer apparatus, and storage medium |
CN110322599A (en) * | 2019-05-23 | 2019-10-11 | 深圳绿米联创科技有限公司 | Door lock management method, device, electronic equipment and storage medium |
CN110335394A (en) * | 2019-07-05 | 2019-10-15 | 深圳市智臻环保能源科技有限公司 | A kind of smart lock control method and system based on cipher code set |
CN114973518A (en) * | 2022-04-21 | 2022-08-30 | 杭州小电科技股份有限公司 | Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112653701B (en) * | 2020-12-24 | 2023-03-14 | 北京安信天行科技有限公司 | Application password safe use monitoring method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600792A (en) * | 2016-12-28 | 2017-04-26 | 北京拜克洛克科技有限公司 | Unlocking method, system and device of bicycle |
CN106652232A (en) * | 2016-12-28 | 2017-05-10 | 北京拜克洛克科技有限公司 | Bike sharing method and system |
CN106780917A (en) * | 2017-01-11 | 2017-05-31 | 上海共佰克智能科技有限公司 | The control method and system of lock |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7898439B2 (en) * | 2008-03-20 | 2011-03-01 | Isabelle Bettez | Bicycle rental system and station |
CN107483581B (en) * | 2017-08-16 | 2020-02-14 | 珠海格力电器股份有限公司 | Password verification method of sharing device, cloud server and system |
-
2017
- 2017-08-16 CN CN201710703147.0A patent/CN107483581B/en active Active
-
2018
- 2018-06-11 WO PCT/CN2018/090666 patent/WO2019033840A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600792A (en) * | 2016-12-28 | 2017-04-26 | 北京拜克洛克科技有限公司 | Unlocking method, system and device of bicycle |
CN106652232A (en) * | 2016-12-28 | 2017-05-10 | 北京拜克洛克科技有限公司 | Bike sharing method and system |
CN106780917A (en) * | 2017-01-11 | 2017-05-31 | 上海共佰克智能科技有限公司 | The control method and system of lock |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019033840A1 (en) * | 2017-08-16 | 2019-02-21 | 格力电器(武汉)有限公司 | Password authentication method for shared device, shared device, cloud server, and system |
CN109978529A (en) * | 2017-12-27 | 2019-07-05 | 青岛胶南海尔洗衣机有限公司 | Offline electronic payment method |
CN109978529B (en) * | 2017-12-27 | 2024-01-23 | 海尔衣联生态科技(上海)有限公司 | Offline payment method |
WO2019153534A1 (en) * | 2018-02-12 | 2019-08-15 | 平安科技(深圳)有限公司 | Insurance premium calculation method and device, computer apparatus, and storage medium |
CN109448209A (en) * | 2019-01-07 | 2019-03-08 | 上海早米网络科技有限公司 | A kind of dynamic password massage control system and control method based on off-line mode |
CN109887179A (en) * | 2019-01-23 | 2019-06-14 | 上海早米网络科技有限公司 | Charge sharing massage control system and control method based on offline dynamic password |
CN110322599A (en) * | 2019-05-23 | 2019-10-11 | 深圳绿米联创科技有限公司 | Door lock management method, device, electronic equipment and storage medium |
CN110322599B (en) * | 2019-05-23 | 2021-10-26 | 深圳绿米联创科技有限公司 | Door lock management method and device, electronic equipment and storage medium |
CN110335394A (en) * | 2019-07-05 | 2019-10-15 | 深圳市智臻环保能源科技有限公司 | A kind of smart lock control method and system based on cipher code set |
CN114973518A (en) * | 2022-04-21 | 2022-08-30 | 杭州小电科技股份有限公司 | Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system |
Also Published As
Publication number | Publication date |
---|---|
WO2019033840A1 (en) | 2019-02-21 |
CN107483581B (en) | 2020-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107483581A (en) | The method of password authentication of shared equipment, shared equipment, cloud server and system | |
CN102497635B (en) | Server, terminal and account password acquisition method | |
CN107862526B (en) | Resource numerical value transferring method and device, storage medium and server | |
CN101815291A (en) | Method and system for logging on client automatically | |
CN101378582A (en) | User recognizing module, authentication center, authentication method and system | |
CN102867157B (en) | Mobile terminal and data guard method | |
CN104581727A (en) | Equipment connecting method and device and AP (access point) end electronic equipment | |
CN107124426B (en) | Authentication method and device for user rights and interests | |
CN108460262B (en) | Cipher management method, device, terminal device and storage medium | |
CN108093392A (en) | A kind of method, mobile terminal and storage medium for unlocking SIM card | |
CN113141340B (en) | Multi-node authentication method and device | |
CN105631276A (en) | Fingerprint password verification method and system, and terminal | |
CN103634328A (en) | Authentication method, device and system for network platform authentication server | |
CN106792699A (en) | A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal | |
CN106572074A (en) | Method and device for verifying identifying code | |
CN105553667A (en) | Dynamic password generating method | |
CN102752754B (en) | Subscriber Identity Module lock data are carried out method and the mobile terminal of safety certification | |
CN107623907A (en) | ESIM clamping locks network method, terminal and lock network certificate server | |
CN103370713A (en) | Method for programming a mobile terminal chip | |
CN107172194A (en) | Management method, device and the communication terminal of virtual SIM card | |
CN112468497B (en) | Block chain terminal equipment authorization authentication method, device, equipment and storage medium | |
CN104780211B (en) | Method of data synchronization and device | |
CN104270754B (en) | A kind of Subscriber Identity Module method for authenticating and device | |
CN103678983A (en) | Smartphone usage permission verification system and method | |
CN109302286A (en) | A kind of generation method of Fido device keys index |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |