CN107483581B - Password verification method of sharing device, cloud server and system - Google Patents

Password verification method of sharing device, cloud server and system Download PDF

Info

Publication number
CN107483581B
CN107483581B CN201710703147.0A CN201710703147A CN107483581B CN 107483581 B CN107483581 B CN 107483581B CN 201710703147 A CN201710703147 A CN 201710703147A CN 107483581 B CN107483581 B CN 107483581B
Authority
CN
China
Prior art keywords
password
user
cloud
library
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710703147.0A
Other languages
Chinese (zh)
Other versions
CN107483581A (en
Inventor
杨赛赛
苗岑岑
李喜林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201710703147.0A priority Critical patent/CN107483581B/en
Publication of CN107483581A publication Critical patent/CN107483581A/en
Priority to PCT/CN2018/090666 priority patent/WO2019033840A1/en
Application granted granted Critical
Publication of CN107483581B publication Critical patent/CN107483581B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a password verification method of sharing equipment, a cloud server and a system, wherein the password of the sharing equipment in a corresponding cloud password library in the cloud server and the password in an equipment end password library of the sharing equipment adopt the same preset password generation rule, so that a user can firstly extract the corresponding password from the cloud password library by using the demand information of the equipment to be used before using the sharing equipment, the password is obtained by adopting the preset password generation rule on the demand information in advance, then the password is input into the sharing equipment, when the sharing equipment finds the password corresponding to the password from the equipment end password library of the sharing equipment, the found password and the preset password generation rule can be used for determining the demand information of the user, thereby realizing that under the condition that the cloud server and the sharing equipment are not connected with a network, and completing synchronous verification of the password.

Description

Password verification method of sharing device, cloud server and system
Technical Field
The invention relates to the technical field of shared devices, in particular to a password verification method of a shared device, a cloud server and a system.
Background
In recent years, various shared devices having a self-service payment function, such as a shared bicycle, a shared electric vehicle, a shared automobile, a shared washing machine, and the like, have been activated. The sharing equipment is very convenient and quick to use, a user can download and register corresponding clients according to needs, when the corresponding sharing equipment needs to be used, the corresponding clients are logged in, codes of the sharing equipment to be used are input to obtain unlocking codes, or unlocking is achieved through a mode of directly scanning identification codes on the sharing equipment to be used. After the use is finished, the payment is made through the internet.
These sharing devices share a common feature: the sharing device usually has a wireless module because it needs to connect to the internet or establish short-range wireless communication with a mobile terminal, such as a mobile phone, to synchronize information with a user and verify a password.
Since the password authentication process of the sharing device needs to be implemented based on a network, the use of the sharing device is limited by the network, and there is a risk of internet insecure attack, so how to provide a password authentication method of the sharing device, so that the synchronous authentication of the password between the user and the sharing device is implemented by the sharing device and the cloud server without connecting to the network becomes a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
In view of this, the present invention discloses a password verification method for a sharing device, a cloud server and a system, so as to achieve a password synchronization verification process between a user and the sharing device even when the sharing device and the cloud server are not connected to a network.
A password verification method of shared equipment is applied to a cloud server, the cloud server is provided with a plurality of cloud password libraries, each cloud password library corresponds to one shared equipment, and the method comprises the following steps:
acquiring an equipment identity of shared equipment to be used, which is input by a user, and determining a corresponding cloud password library according to the equipment identity;
acquiring user information input by the user and demand information of the shared equipment to be used;
selecting a cloud password group from the cloud password library, and recording the cloud password group and the user information in a corresponding relationship form;
extracting a password corresponding to the demand information from the cloud password group, wherein the password is obtained by adopting a preset password generation rule on the demand information in advance;
and feeding the password back to the user, so that when the user uses the to-be-used sharing device, the to-be-used sharing device searches whether a password identical to the password is stored or not from a device side password library of the user by using the password, and if so, the searched password and the preset password generation rule are used for determining the requirement information of the user, and the synchronous verification of the password is completed.
Preferably, the cloud password library comprises a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is a set of all passwords generated by the sharing device under different working conditions according to preset password generation rules.
Preferably, the device side password library includes a plurality of device side password groups, each device side password group corresponds to one user, and all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by adopting the same preset password generation rule for the requirement information of the user.
Preferably, when the cloud server provides a password to the user after the user finishes paying, the cloud server extracts a password corresponding to the demand information from the cloud password group, and the method specifically includes:
extracting the cost which needs to be paid by the user and corresponds to the demand information from the cloud password group;
and when the user is detected to pay the cost, extracting a password corresponding to the demand information from the cloud password group.
Preferably, after the user is detected to pay the fee, extracting a password corresponding to the demand information from the cloud password group, specifically including:
when the user is detected to finish paying the fee, extracting a password corresponding to the demand information from the cloud password group, and marking a user level, wherein when a plurality of users need to pay the fee, the user level is determined according to the payment finishing sequence of the users, and the closer the payment finishing time of the users is, the higher the corresponding user level is;
feeding back the password to the user, so that when the user uses the to-be-used sharing device, the to-be-used sharing device searches whether a password identical to the password is stored in a device side password library of the user or not by using the password, and if so, determining the requirement information of the user by using the searched password, and completing synchronous verification of the password, specifically comprising:
and feeding the password back to the user, so that when the user uses the to-be-used sharing equipment, the to-be-used sharing equipment searches whether the password which is the same as the password is stored or not from an equipment side password library of the user by using the password, and if so, the user level and the requirement information of the user are determined, and the synchronous verification of the password is completed.
Preferably, all the cloud password groups in the cloud password library and all the equipment-side password groups in the equipment-side password library adopt the same password classification and classification scheme.
A password verification method of a sharing device is applied to the sharing device to be used, and comprises the following steps:
acquiring a password acquired by a user in a cloud password library, wherein the password is obtained by adopting a preset password generation rule on demand information in advance, and the demand information is the demand information of the user on the shared equipment to be used;
searching whether a password identical to the password is stored or not from a device side password library of the user by using the password;
if so, determining the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
Preferably, the cloud password library comprises a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is a set of all passwords generated by the sharing device under different working conditions according to preset password generation rules.
Preferably, the device side password library includes a plurality of device side password groups, each device side password group corresponds to one user, and all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by adopting the same preset password generation rule for the requirement information of the user.
Preferably, the searching whether a password identical to the password is stored in a device side password library of the user or not by using the password specifically includes:
and searching whether the password identical to the password is stored or not from an equipment-side password group placed in an effective password reserved area of an equipment-side password library of the equipment side by using the password, wherein the effective password reserved area is used for reserving the password which is acquired but not used by the sharing equipment to be used.
Preferably, the searching whether a password identical to the password is stored in a device side password library of the user or not by using the password specifically includes:
and when the password identical to the password is not found from the valid password reserved area of the equipment side password library, finding whether the password identical to the password is stored or not from the equipment side password group generated by the equipment side password library.
Preferably, when a password identical to the password is found from the device-side password group generated by the device-side password library and the level of the cloud-side password group, the level of the device-side password group and the level of the user are consistent, the required information of the user is determined by using the found password and the preset password generation rule, so as to complete the synchronous verification of the password, and specifically includes:
and determining the user level and the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
Preferably, after the synchronous verification of the password is completed, the method further includes:
placing the unused equipment-side password group with the level higher than the user level into the effective password reserved area;
and deleting all the equipment-side password groups with the levels lower than the user level.
Preferably, after determining the requirement information of the user and completing the synchronous verification of the password, the method further includes:
and deleting the password which is successfully verified.
Preferably, the method further comprises the following steps:
and when the password identical to the password is not found from the equipment side password library, outputting prompt information, wherein the prompt information is used for prompting the user to input the password again.
The utility model provides a high in the clouds server, high in the clouds server has a plurality of high in the clouds password storehouse, and each high in the clouds password storehouse corresponds a shared device, high in the clouds server includes:
the device comprises a first acquisition unit, a second acquisition unit and a control unit, wherein the first acquisition unit is used for acquiring the equipment identity of the shared equipment to be used, which is input by a user, and determining a corresponding cloud password library according to the equipment identity;
the second acquisition unit is used for acquiring the user information input by the user and the requirement information of the shared equipment to be used;
the selecting unit is used for selecting a cloud password group from the cloud password library and recording the cloud password group and the user information in a corresponding relation mode;
the extraction unit is used for extracting a password corresponding to the demand information from the cloud password group, wherein the password is obtained by adopting a preset password generation rule on the demand information in advance;
and the feedback unit is used for feeding the password back to the user, so that when the user uses the to-be-used sharing device, the to-be-used sharing device searches whether a password identical to the password is stored or not from a device side password library of the user by using the password, and if so, the searched password and the preset password generation rule are used for determining the requirement information of the user, and the synchronous verification of the password is completed.
Preferably, the cloud password library comprises a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is a set of all passwords generated by the sharing device under different working conditions according to preset password generation rules.
Preferably, the device side password library includes a plurality of device side password groups, each device side password group corresponds to one user, and all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by adopting the same preset password generation rule for the requirement information of the user.
Preferably, when the cloud server provides a password to the user after the user finishes paying, the extracting unit includes:
the first extraction subunit is used for extracting the cost which needs to be paid by the user and corresponds to the demand information from the cloud password group;
and the second extraction subunit is used for extracting the password corresponding to the demand information from the cloud password group after the user is detected to pay the fee.
Preferably, the second extraction subunit is specifically configured to:
when the user is detected to finish paying the fee, extracting a password corresponding to the demand information from the cloud password group, and marking a user level, wherein when a plurality of users need to pay the fee, the user level is determined according to the payment finishing sequence of the users, and the closer the payment finishing time of the users is, the higher the corresponding user level is;
the feedback unit is specifically configured to:
and feeding the password back to the user, so that when the user uses the to-be-used sharing equipment, the to-be-used sharing equipment searches whether the password which is the same as the password is stored or not from an equipment side password library of the user by using the password, and if so, the user level and the requirement information of the user are determined, and the synchronous verification of the password is completed.
Preferably, all the cloud password groups in the cloud password library and all the equipment-side password groups in the equipment-side password library adopt the same password classification and classification scheme.
A sharing device, comprising:
the third acquisition unit is used for acquiring a password acquired by a user in a cloud password library, wherein the password is obtained by adopting a preset password generation rule on demand information in advance, and the demand information is the demand information of the user on the shared device to be used;
the searching unit is used for searching whether the password identical to the password is stored in a device side password library of the searching unit by using the password;
and the verification unit is used for determining the requirement information of the user by utilizing the searched password and the preset password generation rule to complete the synchronous verification of the password.
Preferably, the cloud password library comprises a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is a set of all passwords generated by the sharing device under different working conditions according to preset password generation rules.
Preferably, the device side password library includes a plurality of device side password groups, each device side password group corresponds to one user, and all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by adopting the same preset password generation rule for the requirement information of the user.
Preferably, the search unit is specifically configured to:
and searching whether the password identical to the password is stored or not from an equipment-side password group placed in an effective password reserved area of an equipment-side password library of the equipment side by using the password, wherein the effective password reserved area is used for reserving the password which is acquired but not used by the sharing equipment to be used.
Preferably, the search unit is specifically configured to:
and when the password identical to the password is not found from the valid password reserved area of the equipment side password library, finding whether the password identical to the password is stored or not from the equipment side password group generated by the equipment side password library.
Preferably, when a password identical to the password is found from the device-side password group generated by the device-side password library, and the level of the cloud-side password group, the level of the device-side password group, and the user level are consistent, the authentication unit is specifically configured to:
and determining the user level and the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
Preferably, the method further comprises the following steps:
the placing unit is used for placing the unused equipment-side password group with the level higher than the user level into the effective password reserved area after the synchronous verification of the password is completed;
and the first deleting unit is used for deleting all the equipment end password groups with the levels lower than the user level.
Preferably, the method further comprises the following steps:
and the second deleting unit is used for deleting the password which is successfully verified after the requirement information of the user is determined and the synchronous verification of the password is completed.
Preferably, the method further comprises the following steps:
and the output unit is used for outputting prompt information when the password identical to the password is not found from the equipment side password library, wherein the prompt information is used for prompting a user to input the password again.
A password verification system of shared equipment comprises the cloud server and at least one shared equipment.
From the above technical solutions, the present invention discloses a password verification method for a sharing device, a cloud server and a system, the password of the sharing equipment in the corresponding cloud password library in the cloud server and the password in the equipment side password library of the sharing equipment adopt the same preset password generation rule, so that before the user uses the sharing equipment, the requirement information of the equipment to be used can be utilized, firstly, the corresponding password is extracted from the cloud password library, the password is obtained by adopting a preset password generation rule on the required information in advance, then the password is input into the sharing equipment, when the sharing equipment searches the password corresponding to the password from the equipment end password library of the sharing equipment, and determining the requirement information of the user by utilizing the searched password and a preset password generation rule, thereby completing the synchronous verification of the password. Therefore, the invention realizes the synchronous password verification process between the user and the sharing equipment based on the same password generation rule under the condition that the cloud server and the sharing equipment are not connected with the network, thereby ensuring that the use of the sharing equipment is not limited by the network any more and further effectively avoiding the risk of unsafe attack of the internet.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the disclosed drawings without creative efforts.
Fig. 1 is a flowchart of a password verification method for a shared device based on a cloud server according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a correspondence relationship between a fee, a password, a cloud password group, and a cloud password library according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a correspondence relationship between a cloud server and a sharing device according to an embodiment of the present invention;
fig. 4 is a flowchart of a password authentication method based on a shared device on the shared device side according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a cloud server according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a sharing device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a password verification method of shared equipment, the shared equipment, a cloud server and a system, so that the password synchronization verification process between a user and the shared equipment can be realized under the condition that the shared equipment and the cloud server are not required to be connected with a network.
Referring to fig. 1, an embodiment of the present invention discloses a flowchart of a password verification method for a sharing device, where the method is applied to a cloud server, the cloud server corresponds to at least one sharing device, the cloud server has a plurality of cloud password libraries, and each cloud password library corresponds to one sharing device, and the method includes:
s101, acquiring an equipment identity of shared equipment to be used, which is input by a user, and determining a corresponding cloud password library according to the equipment identity;
in practical application, a user may scan the two-dimensional code of the shared device through a mobile phone, an IPAD, and other terminals to obtain the device identity of the shared device, where the device identity is also a device identifier. Of course, the user may also obtain the device identity of the sharing device in other manners, such as by inputting the identity code printed on the sharing device into a computer to obtain the device identity of the sharing device.
Wherein each sharing device has a device identity uniquely corresponding thereto.
Step S102, user information input by a user and requirement information of shared equipment to be used are obtained;
specifically, the user information specifically refers to identity information of the user, such as an identification number.
For the requirement information of the shared device, for example, assuming that the shared device is a shared washing machine, the requirement information of the user on the shared washing machine includes: duration of washing, number of rinses, washing temperature, speed of rotation, etc.
Step S103, selecting a cloud password group from the cloud password library, and recording the cloud password group and the user information in a corresponding relationship form;
in this embodiment, one cloud password library includes a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is a set of all passwords generated by the sharing device under different working conditions according to a preset password generation rule, that is, each cloud password group includes all conditions of the sharing device required by the user. For example, assuming that the shared device is a shared washing machine, the information of the user's requirement for the shared washing machine, i.e. the working condition of the shared washing machine, is as follows: the washing time is 30 minutes, and the washing mode is as follows: and (4) rinsing twice and dehydrating once, wherein the clothes type is shirt, and a password uniquely corresponding to the demand information is obtained according to the demand information and a preset password generation rule such as a password generation formula.
The shared washing machine generates a set of all passwords according to the permutation and combination of the preset password generation rules under different working conditions, and a cloud password group is obtained.
When the cloud password groups are sequentially arranged in the cloud password library, the cloud password group arranged at the forefront can be used as the selected cloud password group, and certainly, one cloud password group can be randomly selected.
The purpose of recording the cloud password group and the user information in the form of the corresponding relationship is as follows: the real-name system used by the sharing equipment is realized, so that services are prevented from being provided for users who do not meet the age requirement, for example, users who use the sharing bicycle need to be aged up to 12 years old, and conditions are provided for the follow-up purchase of personal accident injury risks and third party liability risks for the users.
In practical application, different levels can be set for each cloud password group contained in the cloud password library, and meanwhile, different levels are set for users, for example, the level of a user is determined according to the total times of using the sharing device by the user all the time, the more times the user uses, the higher the level of the user is, and the user at the same level corresponds to the cloud password group.
Therefore, the execution process of this step is specifically: the method comprises the steps of firstly determining a plurality of cloud password groups corresponding to shared equipment to be used, secondly determining a user level according to user information, and determining the corresponding cloud password groups according to the user level.
Step S104, extracting a password corresponding to the demand information from the cloud password group;
the password is obtained by adopting a preset password generation rule on the demand information in advance, namely the password is generated under different arrangement combinations of working conditions of the sharing equipment according to the preset password generation rule, so that the corresponding password can be extracted from the cloud password group according to the demand information, namely the working conditions of the sharing equipment.
And step S105, feeding the password back to the user so that the user can determine the requirement information of the user by using the password and the own device side password library by the to-be-used sharing device when using the to-be-used sharing device, and completing the synchronous verification of the password.
Specifically, the cloud password library feeds the searched password back to the user, when the user uses the to-be-used sharing device, the user inputs the password into the to-be-used sharing device, the to-be-used sharing device searches whether the password identical to the password input by the user is stored in the device side password library of the to-be-used sharing device or not by using the password, if yes, the searched password and the preset password generation rule are used for determining the requirement information of the user, and synchronous verification of the password is completed.
The device side password library comprises a plurality of device side password groups, each device side password group corresponds to one user, all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by the same preset password generation rule for the requirement information of the users, and therefore the sharing device can determine the requirement information of the users according to the passwords acquired by the users from the cloud password library.
To sum up, the password verification method for the sharing device disclosed by the invention adopts the same preset password generation rule for the password in the cloud password library corresponding to the sharing device in the cloud server and the password in the device side password library of the sharing device, so that a user can firstly extract the corresponding password from the cloud password library by using the demand information of the device to be used before using the sharing device, the password is obtained by adopting the preset password generation rule for the demand information in advance, then the password is input into the sharing device, and when the sharing device finds the password corresponding to the password from the device side password library of the sharing device, the found password and the preset password generation rule can be used for determining the demand information of the user, thereby completing the synchronous verification of the password. Therefore, the invention realizes the synchronous password verification process between the user and the sharing equipment based on the same password generation rule under the condition that the cloud server and the sharing equipment are not connected with the network, thereby ensuring that the use of the sharing equipment is not limited by the network any more and further effectively avoiding the risk of unsafe attack of the internet.
In addition, because the method disclosed by the invention does not need to establish network connection between the sharing equipment and the cloud server, compared with the traditional scheme, the method disclosed by the invention also saves a wireless module arranged on the sharing equipment, thereby saving the hardware cost of the sharing equipment.
It can be understood that different sharing devices may have different requirements for the payment time, such as a shared washing machine, and when the user determines the demand information for the shared washing machine, the shared washing machine may generate corresponding fees according to the demand information; for another example, a sharing bicycle cannot know the use time of the user in advance, so that the cost of the user cannot be determined in advance.
For the scheme of the user who pays again after using the shared device, reference may be made to the existing scheme, and details are not described here.
For a scheme where the user pays first to reuse the shared device, see the following example.
In the above embodiment, when the cloud server provides the password to the user after the user completes payment, step S104 specifically includes:
extracting the cost which needs to be paid by the user and corresponds to the demand information from the cloud password group;
and when the fact that the user pays the fee is detected, extracting the password corresponding to the demand information from the cloud password group.
Based on the embodiment, the cost and the password are extracted from the cloud password group according to the user requirements, for example, the washing machine is shared, the cloud server can search a corresponding cost which needs to be paid by the user from the cloud password group according to the washing time, the rotating speed and the washing temperature selected by the user, and the cloud server can provide the user with the corresponding password after the user pays successfully.
Wherein, expense, the password, the corresponding relation in high in the clouds password crowd and high in the clouds password storehouse can refer to the schematic diagram that fig. 2 shows, in fig. 2, high in the clouds password storehouse includes a plurality of high in the clouds password crowd, if cloud password crowd 1, high in the clouds password crowd 2, … … high in the clouds password crowd X, each high in the clouds password crowd corresponds a user, a plurality of users correspond a plurality of high in the clouds password crowd, in practical application, all high in the clouds password crowd can arrange successively according to the rank and make up into high in the clouds password storehouse, each high in the clouds password crowd is for the set of all passwords that produces according to predetermineeing the password generation rule to sharing device under the permutation and combination of different behavior, also contain all the circumstances that the sharing device was used to the demand of user in each high in the clouds password crowd, for example, high in fig. 2 cloud password crowd X, the different behavior of sharing device includes the factor: (1) the duration of use of the shared device, such as 5 minutes, 10 minutes, 20 minutes; (2) the number, for example, the number of the laundry machines shared, may refer to the number of the laundry items, such as 1, 2, and 3; (3) variables (such as variable 3 and variable N in fig. 2) refer to factor variables that affect the operating mode and cost of the shared device, different durations may be considered as one element under a certain variable, and a variable may include multiple elements, such as element a, element b, element c, and the like. The permutation and combination of the different factors generates a password and a unique fee corresponding to the password, as shown in fig. 2, a password a corresponds to a fee a, a password b corresponds to a fee b, a password c corresponds to a fee c, a password d corresponds to a fee d, and a password e corresponds to a fee e.
It should be noted that, the cloud server corresponds to at least one sharing device, the cloud server and each sharing device may form a system, the cloud server and the sharing devices form multiple systems, in practical applications, the same system ensures that the preset password generation rules (including the algorithm for password generation and the encryption principle) adopted by the device side password library and the corresponding cloud side password library are consistent, and the preset password generation rules may be different between different systems. In addition, it is also necessary to ensure that the passwords in a certain number of cloud password groups continuously generated by the cloud password library cannot be repeated.
Preferably, in the above embodiment, all the cloud password groups in the cloud password library and all the device-side password groups in the device-side password library may adopt the same password classification and classification scheme, that is, for the same requirement information of the same user, the corresponding cloud password groups and device-side password groups have the same level, and the passwords in the cloud password groups and the passwords in the device-side password groups have the same preset password generation rule, but the time for generating the passwords in the cloud password groups and the passwords in the device-side password groups may be the same or different.
In order to conveniently search the password, in practical application, for the scheme of paying first and then using the shared device, the user level can be determined according to the sequence of payment completed by the user, when a plurality of users need to pay, the payment time of the users is earlier, the corresponding user level is higher, and the user level is the same as the level of the corresponding cloud password group and the level of the device-side password group.
Referring to fig. 3, a schematic diagram of a correspondence relationship between a cloud server and a sharing device is disclosed in an embodiment of the present invention, where fig. 3 only shows a correspondence relationship between one cloud server and one sharing device, in practical applications, one cloud server may correspond to a plurality of sharing devices, and the plurality of sharing devices are separately managed in a cloud code library corresponding to the cloud server, so as to complement each other.
As can be seen from fig. 2 and fig. 3, when the user inputs different required information to the cloud password library, such as time, working mode, quantity, variable three, variable four, and the like, different passwords may be obtained from the cloud password library, where different users may obtain different passwords, such as user 1 obtaining password 1, user 2 obtaining password 2, user 3 obtaining password 3, user 4 obtaining password 4, user 5 obtaining password 5, and the like.
In practical applications, the cloud password groups may be classified into levels, and the levels of the cloud password groups gradually increase along the direction indicated by the arrow in fig. 3, and since one cloud password group corresponds to one user and each user acquires a password from the corresponding cloud password group, the levels of the passwords 1 to 5 gradually increase in the embodiment shown in fig. 3.
On the shared device side, the device-side password library includes a plurality of device-side password groups, such as device-side password groups 1-5, each device-side password group corresponds to one user, such as device-side password group 5 corresponds to user 5, and the preset password generation rules adopted by the passwords in the device-side password group and the passwords in the cloud-side password group are the same.
If the cloud-side password group is classified, the device-side password group may be classified accordingly, and the class of the device-side password group is gradually increased along the direction indicated by the arrow in fig. 3.
The user level, the equipment-side password group level and the cloud-side password group level are the same.
In practical application, the peer user uses the peer device-side password group, and the peer device-side password groups may be rotated normally, and of course, in some cases, the user may use the device-side password group more than the peer device-side password group, for example, the user 2 in fig. 3 should use the device-side password group 2 normally, however, in some cases, the user 2 may also use the device-side password group 3, and at this time, the device-side password group 1 and the device-side password group 2 of lower level may be placed in the valid password reserved area for the next use.
In order to further optimize the above embodiment, when it is detected that the user has paid the fee, a process of extracting a password corresponding to the demand information from the cloud password group may specifically include:
when the user is detected to pay the fee, extracting the password corresponding to the demand information from the cloud password group, and marking the user level, wherein when a plurality of users need to pay, the user level is determined according to the payment completion sequence of the users, and the closer the payment completion time of the users is, the higher the corresponding user level is.
It should be noted that the password provided by the cloud server to the user is extracted from the cloud password group corresponding to the user level according to the requirement information input by the user, for example, the shared washing machine, and the requirement information of the user includes: the washing time is 30 minutes, the rinsing is performed for 2 times, the dehydration is performed for 1 time, and the cloud server extracts the corresponding password from the cloud password group corresponding to the user level according to the demand information.
Correspondingly, step S105 specifically includes:
and feeding back the password to the user so that when the user uses the sharing equipment to be used, the sharing equipment to be used searches whether the password identical to the password is stored or not from an equipment side password library of the user by using the password, and if so, determining the user level and the requirement information of the user to finish the synchronous verification of the password.
When the user inputs the password to the sharing device, the password can be input in a digital form, or the sharing device can perform self-service identification according to a two-dimensional code certificate generated after the user pays the fee, or the password can be input in a voice identification mode.
It should be noted that the passwords are not arranged in a hierarchical manner in the device-side password group, and only after the passwords are input to the sharing device by the user and determined to be used, the passwords have a hierarchical degree, and the levels of the passwords are the same as the levels of the corresponding device-side password group.
Referring to fig. 4, a flowchart of a password authentication method for a shared device according to another embodiment of the present invention is disclosed, where the method is applied to a shared device to be used, such as a shared bicycle, a shared electric vehicle, a shared washing machine, and the like, and the method includes the steps of:
step S201, acquiring a password acquired by a user in a cloud password library;
the password is obtained by adopting a preset password generation rule on demand information in advance, and the demand information is the demand information of the user on the sharing equipment to be used.
The process of the user obtaining the password in the cloud password library can refer to the embodiment shown in fig. 1, and details are not repeated here.
Step S202, searching whether a password identical to the password is stored or not from a device side password library of the user by using the password;
the device side password library comprises a plurality of device side password groups, each device side password group corresponds to one user, all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by the same preset password generation rule for the requirement information of the users, and therefore the sharing device can determine the requirement information of the users according to the passwords acquired from the cloud password library by the users and the preset password generation rule.
In this step, the purpose of determining whether the password library of the device side of the sharing device stores the password identical to the password input by the user is to: and judging whether the password input by the user is a valid password.
And step S203, if so, determining the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
The cloud password library comprises a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is a set of all passwords generated by the sharing equipment under different working conditions according to preset password generation rules.
To sum up, the password verification method for the sharing device disclosed by the invention adopts the same preset password generation rule for the password in the cloud password library corresponding to the sharing device in the cloud server and the password in the device side password library of the sharing device, so that a user can firstly extract the corresponding password from the cloud password library by using the demand information of the device to be used before using the sharing device, the password is obtained by adopting the preset password generation rule for the demand information in advance, then the password is input into the sharing device, and when the sharing device finds the password corresponding to the password from the device side password library of the sharing device, the found password and the preset password generation rule can be used for determining the demand information of the user, thereby completing the synchronous verification of the password. Therefore, the invention realizes the synchronous password verification process between the user and the sharing equipment based on the same password generation rule under the condition that the cloud server and the sharing equipment are not connected with the network, thereby ensuring that the use of the sharing equipment is not limited by the network any more and further effectively avoiding the risk of unsafe attack of the internet.
In addition, because the method disclosed by the invention does not need to establish network connection between the sharing equipment and the cloud server, compared with the traditional scheme, the method disclosed by the invention also saves a wireless module arranged on the sharing equipment, thereby saving the hardware cost of the sharing equipment.
When the password identical to the password is not found from the equipment side password library, prompt information is output, and the prompt information is used for prompting a user to input the password again.
As shown in fig. 3, in practical applications, a valid password reserved area may be set in the device-side password library, when it is necessary to determine whether a password input by a user is stored in the shared device to be used, the user may preferentially search in the valid password reserved area, and if the user does not search in the valid password reserved area, the user may search in a device-side password group that is generated by the device-side password library and is not located in the valid password reserved area.
Wherein, the valid password reservation area is mainly used for reserving the password which is acquired but not used by the shared device to be used.
Therefore, to further optimize the above embodiment, step S202 may specifically include:
and searching whether the password identical to the password is stored or not from the equipment side password group placed in the effective password reserved area of the equipment side password library by using the password.
Step S202 may further include:
and when the password identical to the password is not found from the valid password reserved area of the equipment side password library, finding whether the password identical to the password is stored or not from the equipment side password group generated by the equipment side password library.
In practical application, for the scheme of paying first and then using the shared device, the user level can be determined according to the sequence of payment completed by the user, when a plurality of users need to pay, the payment time of the users is earlier, the corresponding user level is higher, and the user level, the cloud password group level and the device end password group level are consistent.
Therefore, after the password is extracted and the user level is marked by the cloud server, the user level can be determined according to the level of the device-side password group where the password matched with the password provided by the user is located by the to-be-used sharing device.
Therefore, when finding the password identical to the password from the device-side password group generated by the device-side password library, step S203 in the above embodiment may specifically include:
and determining the user level and the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
It should be noted that when the password in the valid password reserved area is used, the normal level of password rotation is not affected, and the password in the valid password reserved area does not disappear until being used.
After the synchronous verification of the passwords is completed, the unused equipment-side password groups with the levels higher than the user level can be placed in the valid password reserved area, and all the equipment-side password groups with the levels lower than the user level are deleted.
The cloud password groups in the cloud password library and the equipment-side password groups in the equipment-side password library are gradually generated according to preset rules, and the low-level password groups are gradually eliminated according to the set rules, so that the cloud password groups in the cloud password library and the equipment-side password groups in the equipment-side password library are ensured to be within a certain quantity range and are not repeated.
The cloud password group can be provided for a user password or after the user finishes a payment action, one or more cloud password groups are added, the cloud password group with certain data can be added by date and certain days, or the number of generated passwords can be determined according to the frequency degree of use of the user, and the removal of the invalid cloud password group can adopt the following mode: setting the validity period of the cloud password group, and automatically deleting the cloud password group after the validity period is exceeded; after the user completes self-service and feedback, deleting the used cloud password group; the judgment can also be mixed in various ways.
Whether the equipment side password group needs to be increased or not is determined by one or a plurality of mixed modes of the number of the increased password group, the number of times of use of a user, the time interval of use, the number of the existing effective equipment side password group, the working characteristics of shared equipment, the password grade input by the user and the like, and the elimination of the invalid password is subject to automatic deletion after the user uses the password.
After a period of use, when the acquired unused passwords of the sharing equipment are increased, the capacity in the effective password reserved area is increased, and when the acquired unused passwords are increased to a certain number, the acquired unused passwords are eliminated in a certain mode, so that the user uses the working characteristics of the sharing equipment, and the password grade in the effective password reserved area is comprehensively judged.
In the above embodiment, when the requirement information of the user is determined and the synchronous verification of the password is completed, the method further includes:
and deleting the password which is successfully verified.
It should be noted that, in the present invention, when the shared device has an abnormal condition in the working process, such as a power failure, the shared device stores the information before the abnormal condition, and after the shared device is recovered to be normal, continues the previous work until the service is completed.
Corresponding to the above method embodiment, the present invention also discloses a cloud server and a sharing device, which refer to the following descriptions.
Referring to fig. 5, an embodiment of the present invention discloses a schematic structural diagram of a cloud server, where the cloud server corresponds to at least one sharing device, the cloud server has a plurality of cloud code libraries, each cloud code library corresponds to one sharing device, and the cloud server includes:
the first obtaining unit 301 is configured to obtain an equipment identity of a to-be-used shared device input by a user, and determine a corresponding cloud password library according to the equipment identity;
in practical application, a user may scan the two-dimensional code of the shared device through a mobile phone, an IPAD, and other terminals to obtain the device identity of the shared device, where the device identity is also a device identifier. Of course, the user may also obtain the device identity of the sharing device in other manners, such as by inputting the identity code printed on the sharing device into a computer to obtain the device identity of the sharing device.
Wherein each sharing device has a device identity uniquely corresponding thereto.
A second obtaining unit 302, configured to obtain user information input by the user and requirement information of the to-be-used sharing device;
specifically, the user information specifically refers to identity information of the user, such as an identification number.
For the requirement information of the shared device, for example, assuming that the shared device is a shared washing machine, the requirement information of the user on the shared washing machine includes: duration of washing, number of rinses, washing temperature, speed of rotation, etc.
A selecting unit 303, configured to select a cloud password group from the cloud password library, and record the cloud password group and the user information in a form of a corresponding relationship;
in this embodiment, one cloud password library includes a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is a set of all passwords generated by the sharing device under different working conditions according to a preset password generation rule, that is, each cloud password group includes all conditions of the sharing device required by the user. For example, assuming that the shared device is a shared washing machine, the information of the user's requirement for the shared washing machine, i.e. the working condition of the shared washing machine, is as follows: the washing time is 30 minutes, and the washing mode is as follows: and (4) rinsing twice and dehydrating once, wherein the clothes type is shirt, and a password uniquely corresponding to the demand information is obtained according to the demand information and a preset password generation rule such as a password generation formula.
The shared washing machine generates a set of all passwords according to the permutation and combination of the preset password generation rules under different working conditions, and a cloud password group is obtained.
When the cloud password groups are sequentially arranged in the cloud password library, the cloud password group arranged at the forefront can be used as the selected cloud password group, and certainly, one cloud password group can be randomly selected.
The purpose of recording the cloud password group and the user information in the form of the corresponding relationship is as follows: the real-name system used by the sharing equipment is realized, so that services are prevented from being provided for users who do not meet the age requirement, for example, users who use the sharing bicycle need to be aged up to 12 years old, and conditions are provided for the follow-up purchase of personal accident injury risks and third party liability risks for the users.
In practical application, different levels can be set for each cloud password group contained in the cloud password library, and meanwhile, different levels are set for users, for example, the level of a user is determined according to the total times of using the sharing device by the user all the time, the more times the user uses, the higher the level of the user is, and the user at the same level corresponds to the cloud password group.
Therefore, the selecting unit 303 performs the following specific steps: the method comprises the steps of firstly determining a plurality of cloud password groups corresponding to shared equipment to be used, secondly determining a user level according to user information, and determining the corresponding cloud password groups according to the user level.
An extracting unit 304, configured to extract a password corresponding to the requirement information from the cloud password group;
the password is obtained by adopting a preset password generation rule on the demand information in advance, namely the password is generated under different arrangement combinations of working conditions of the sharing equipment according to the preset password generation rule, so that the corresponding password can be extracted from the cloud password group according to the demand information, namely the working conditions of the sharing equipment.
A feedback unit 305, configured to feed the password back to the user, so that when the user uses the to-be-used sharing device, the to-be-used sharing device searches whether a password identical to the password is stored in a device-side password library of the user or not by using the password, and if so, determines the requirement information of the user by using the searched password and the preset password generation rule, and completes synchronous verification of the password.
Specifically, the cloud password library feeds the searched password back to the user, when the user uses the to-be-used sharing device, the user inputs the password into the to-be-used sharing device, the to-be-used sharing device searches whether the password identical to the password input by the user is stored in the device side password library of the to-be-used sharing device or not by using the password, if yes, the searched password and the preset password generation rule are used for determining the requirement information of the user, and synchronous verification of the password is completed.
The device side password library comprises a plurality of device side password groups, each device side password group corresponds to one user, all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by the same preset password generation rule for the requirement information of the users, and therefore the sharing device can determine the requirement information of the users according to the passwords acquired by the users from the cloud password library.
To sum up, the cloud server disclosed by the invention adopts the same preset password generation rule for the password of the sharing device in the corresponding cloud password library in the cloud server and the password in the device side password library of the sharing device, so that a user can utilize the demand information of the device to be used before using the sharing device, firstly, the corresponding password is extracted from the cloud password library, the password is obtained by adopting the preset password generation rule for the demand information in advance, then, the password is input into the sharing device, and when the sharing device finds the password corresponding to the password from the device side password library of the sharing device, the found password and the preset password generation rule can be utilized to determine the demand information of the user, thereby completing the synchronous verification of the password. Therefore, the invention realizes the synchronous password verification process between the user and the sharing equipment based on the same password generation rule under the condition that the cloud server and the sharing equipment are not connected with the network, thereby ensuring that the use of the sharing equipment is not limited by the network any more and further effectively avoiding the risk of unsafe attack of the internet.
In addition, because the method disclosed by the invention does not need to establish network connection between the sharing equipment and the cloud server, compared with the traditional scheme, the method disclosed by the invention also saves a wireless module arranged on the sharing equipment, thereby saving the hardware cost of the sharing equipment.
It can be understood that different sharing devices may have different requirements for the payment time, such as a shared washing machine, and when the user determines the demand information for the shared washing machine, the shared washing machine may generate corresponding fees according to the demand information; for another example, a sharing bicycle cannot know the use time of the user in advance, so that the cost of the user cannot be determined in advance.
For the scheme of the user who pays again after using the shared device, reference may be made to the existing scheme, and details are not described here.
For a scheme where the user pays first to reuse the shared device, see the following example.
In the above embodiment, when the cloud server provides the password to the user after the user completes payment,
the extraction unit 304 includes:
the first extraction subunit is used for extracting the cost which needs to be paid by the user and corresponds to the demand information from the cloud password group;
and the second extraction subunit is used for extracting the password corresponding to the demand information from the cloud password group after the user is detected to pay the fee.
Based on the embodiment, the cost and the password are extracted from the cloud password group according to the user requirements, for example, the washing machine is shared, the cloud server can search a corresponding cost which needs to be paid by the user from the cloud password group according to the washing time, the rotating speed and the washing temperature selected by the user, and the cloud server can provide the user with the corresponding password after the user pays successfully.
The corresponding relationship between the fee, the password, the cloud password group and the cloud password library can be seen in the schematic diagram and the related description shown in fig. 2.
It should be noted that, the cloud server corresponds to at least one sharing device, the cloud server and each sharing device may form a system, the cloud server and the sharing devices form multiple systems, in practical applications, the same system ensures that the preset password generation rules (including the algorithm for password generation and the encryption principle) adopted by the device side password library and the corresponding cloud side password library are consistent, and the preset password generation rules may be different between different systems. In addition, it is also necessary to ensure that the passwords in a certain number of cloud password groups continuously generated by the cloud password library cannot be repeated.
Preferably, in the above embodiment, all the cloud password groups in the cloud password library and all the device-side password groups in the device-side password library may adopt the same password classification and classification scheme, that is, for the same requirement information of the same user, the corresponding cloud password groups and device-side password groups have the same level, and the passwords in the cloud password groups and the passwords in the device-side password groups have the same preset password generation rule, but the time for generating the passwords in the cloud password groups and the passwords in the device-side password groups may be the same or different.
In order to conveniently search the password, in practical application, for the scheme of paying first and then using the shared device, the user level can be determined according to the sequence of payment completed by the user, when a plurality of users need to pay, the payment time of the users is earlier, the corresponding user level is higher, and the user level is the same as the level of the corresponding cloud password group and the level of the device-side password group.
The correspondence between the cloud server and the sharing device can be seen in fig. 3 and the related description, and will not be traced here.
To further optimize the above embodiment, the second extraction subunit is specifically configured to:
when the user is detected to finish paying the fee, extracting a password corresponding to the demand information from the cloud password group, and marking a user level, wherein when a plurality of users need to pay the fee, the user level is determined according to the payment finishing sequence of the users, and the closer the payment finishing time of the users is, the higher the corresponding user level is;
the feedback unit 305 is specifically configured to:
and feeding back the password to the user so that when the user uses the sharing equipment to be used, the sharing equipment to be used searches whether the password which is the same as the password is stored or not from an equipment side password library of the user by using the password, and if so, determining the user level and the requirement information of the user to finish the synchronous verification of the password.
When the user inputs the password to the sharing device, the password can be input in a digital form, or the sharing device can perform self-service identification according to a two-dimensional code certificate generated after the user pays the fee, or the password can be input in a voice identification mode.
It should be noted that the passwords are not arranged in a hierarchical manner in the device-side password group, and only after the passwords are input to the sharing device by the user and determined to be used, the passwords have a hierarchical degree, and the levels of the passwords are the same as the levels of the corresponding device-side password group.
Referring to fig. 6, a schematic structural diagram of a sharing device disclosed in an embodiment of the present invention, the sharing device includes a sharing bicycle, a sharing electric vehicle, a sharing washing machine, and the like, and the sharing device includes:
a third obtaining unit 401, configured to obtain a password obtained by a user in a cloud password library, where the password is obtained by using a preset password generation rule on demand information in advance, and the demand information is demand information of the user on the shared device to be used;
a searching unit 402, configured to search, by using the password, whether a password identical to the password is stored in a device side password library of the device side;
the device side password library comprises a plurality of device side password groups, each device side password group corresponds to one user, all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by the same preset password generation rule for the requirement information of the users, and therefore the sharing device can determine the requirement information of the users according to the passwords acquired from the cloud password library by the users and the preset password generation rule.
An authentication unit 403, configured to determine the requirement information of the user by using the searched password and the preset password generation rule, and complete synchronous authentication on the password.
The cloud password library comprises a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is a set of all passwords generated by the sharing equipment under different working conditions according to preset password generation rules; the device side password library comprises a plurality of device side password groups, each device side password group corresponds to one user, all passwords stored in the device side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by the same preset password generation rule for the requirement information of the users, and therefore the sharing device can determine the requirement information of the users according to the passwords acquired by the users from the cloud password library.
To sum up, the sharing device disclosed in the present invention adopts the same preset password generation rule for the password in the cloud password library corresponding to the sharing device in the cloud server and the password in the device side password library of the sharing device, so that the user can use the demand information of the device to be used before using the sharing device, firstly, extract the corresponding password from the cloud password library, the password is obtained by using the preset password generation rule for the demand information in advance, then, input the password to the sharing device, and when the sharing device finds the password corresponding to the password from the device side password library of the sharing device, the found password and the preset password generation rule can be used to determine the demand information of the user, thereby completing the synchronous verification of the password. Therefore, the invention realizes the synchronous password verification process between the user and the sharing equipment based on the same password generation rule under the condition that the cloud server and the sharing equipment are not connected with the network, thereby ensuring that the use of the sharing equipment is not limited by the network any more and further effectively avoiding the risk of unsafe attack of the internet.
In addition, because the method disclosed by the invention does not need to establish network connection between the sharing equipment and the cloud server, compared with the traditional scheme, the method disclosed by the invention also saves a wireless module arranged on the sharing equipment, thereby saving the hardware cost of the sharing equipment.
In order to further optimize the above embodiment, the method further includes: and the output unit is used for outputting prompt information when the password identical to the password is not found from the equipment side password library, wherein the prompt information is used for prompting a user to input the password again.
As shown in fig. 3, in practical applications, a valid password reserved area may be set in the device-side password library, when it is necessary to determine whether a password input by a user is stored in the shared device to be used, the user may preferentially search in the valid password reserved area, and if the user does not search in the valid password reserved area, the user may search in a device-side password group that is generated by the device-side password library and is not located in the valid password reserved area.
Wherein, the valid password reservation area is mainly used for reserving the password which is acquired but not used by the shared device to be used.
Therefore, to further optimize the above embodiment, the search unit 402 may specifically be configured to:
and searching whether the password identical to the password is stored or not from an equipment-side password group placed in an effective password reserved area of an equipment-side password library of the equipment side by using the password, wherein the effective password reserved area is used for reserving the password which is acquired but not used by the sharing equipment to be used.
The search unit 402 may further be specifically configured to:
and when the password identical to the password is not found from the valid password reserved area of the equipment side password library, finding whether the password identical to the password is stored or not from the equipment side password group generated by the equipment side password library.
In practical application, for the scheme of paying first and then using the shared device, the user level can be determined according to the sequence of payment completed by the user, when a plurality of users need to pay, the payment time of the users is earlier, the corresponding user level is higher, and the user level, the cloud password group level and the device end password group level are consistent.
Therefore, after the password is extracted and the user level is marked by the cloud server, the user level can be determined according to the level of the device-side password group where the password matched with the password provided by the user is located by the to-be-used sharing device.
Therefore, when finding the same password as the password from the device-side password group generated by the device-side password library, the verification unit 403 is specifically configured to:
and determining the user level and the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
It should be noted that when the password in the valid password reserved area is used, the normal level of password rotation is not affected, and the password in the valid password reserved area does not disappear until being used.
After the synchronous verification of the passwords is completed, the unused equipment-side password groups with the levels higher than the user level can be placed in the valid password reserved area, and all the equipment-side password groups with the levels lower than the user level are deleted.
The cloud password groups in the cloud password library and the equipment-side password groups in the equipment-side password library are gradually generated according to preset rules, and the low-level password groups are gradually eliminated according to the set rules, so that the cloud password groups in the cloud password library and the equipment-side password groups in the equipment-side password library are ensured to be within a certain quantity range and are not repeated.
The cloud password group can be provided for a user password or after the user finishes a payment action, one or more cloud password groups are added, the cloud password group with certain data can be added by date and certain days, or the number of generated passwords can be determined according to the frequency degree of use of the user, and the removal of the invalid cloud password group can adopt the following mode: setting the validity period of the cloud password group, and automatically deleting the cloud password group after the validity period is exceeded; after the user completes self-service and feedback, deleting the used cloud password group; the judgment can also be mixed in various ways.
Whether the equipment side password group needs to be increased or not is determined by one or a plurality of mixed modes of the number of the increased password group, the number of times of use of a user, the time interval of use, the number of the existing effective equipment side password group, the working characteristics of shared equipment, the password grade input by the user and the like, and the elimination of the invalid password is subject to automatic deletion after the user uses the password.
After a period of use, when the acquired unused passwords of the sharing equipment are increased, the capacity in the effective password reserved area is increased, and when the acquired unused passwords are increased to a certain number, the acquired unused passwords are eliminated in a certain mode, so that the user uses the working characteristics of the sharing equipment, and the password grade in the effective password reserved area is comprehensively judged.
Therefore, the sharing device further includes:
the placing unit is used for placing the unused equipment-side password group with the level higher than the user level into the effective password reserved area after the synchronous verification of the password is completed;
and the first deleting unit is used for deleting all the equipment end password groups with the levels lower than the user level.
To further optimize the above embodiment, the sharing device further includes:
and the second deleting unit is used for deleting the password which is successfully verified after the requirement information of the user is determined and the synchronous verification of the password is completed.
The invention further provides a password verification system of the shared device, which comprises the cloud server and at least one shared device, wherein the working principle of the system refers to the corresponding parts of the cloud server and the shared device, and details are not repeated here.
It should be noted that, for the specific working principle of each component in the sharing device, the cloud server and the password verification system, reference is made to the corresponding part of the method embodiment, and details are not described here.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (31)

1. The password verification method of the sharing device is applied to a cloud server, the cloud server is provided with a plurality of cloud password libraries, each cloud password library corresponds to one sharing device, and the method comprises the following steps:
acquiring an equipment identity of shared equipment to be used, which is input by a user, and determining a corresponding cloud password library according to the equipment identity;
acquiring user information input by the user and demand information of the shared equipment to be used;
selecting a cloud password group from the cloud password library, and recording the cloud password group and the user information in a corresponding relationship form;
extracting a password corresponding to the demand information from the cloud password group, wherein the password is obtained by adopting a preset password generation rule on the demand information in advance;
and feeding the password back to the user, so that when the user uses the to-be-used sharing device, the to-be-used sharing device searches whether a password identical to the password is stored or not from a device side password library of the user by using the password, and if so, the searched password and the preset password generation rule are used for determining the requirement information of the user, and the synchronous verification of the password is completed.
2. The password authentication method of claim 1, wherein the cloud password library comprises a plurality of cloud password groups, each cloud password group corresponds to a user, and each cloud password group is a set of all passwords generated by the sharing device under different working conditions according to a preset password generation rule.
3. The password authentication method according to claim 1, wherein the device-side password library includes a plurality of device-side password groups, each device-side password group corresponds to a user, and all passwords stored in the device-side password library by each sharing device and passwords in the cloud-side password library corresponding to the sharing device are generated by using the same preset password generation rule for the information required by the user.
4. The password authentication method according to claim 1, wherein when the cloud server provides a password to the user after the user finishes paying, extracting a password corresponding to the required information from the cloud password group, specifically comprising:
extracting the cost which needs to be paid by the user and corresponds to the demand information from the cloud password group;
and when the user is detected to pay the cost, extracting a password corresponding to the demand information from the cloud password group.
5. The password authentication method according to claim 4, wherein after the user is detected to pay the fee, extracting the password corresponding to the demand information from the cloud password group specifically includes:
when the user is detected to finish paying the fee, extracting a password corresponding to the demand information from the cloud password group, and marking a user level, wherein when a plurality of users need to pay the fee, the user level is determined according to the payment finishing sequence of the users, and the closer the payment finishing time of the users is, the higher the corresponding user level is;
feeding back the password to the user, so that when the user uses the to-be-used sharing device, the to-be-used sharing device searches whether a password identical to the password is stored in a device side password library of the user or not by using the password, and if so, determining the requirement information of the user by using the searched password, and completing synchronous verification of the password, specifically comprising:
and feeding the password back to the user, so that when the user uses the to-be-used sharing equipment, the to-be-used sharing equipment searches whether the password which is the same as the password is stored or not from an equipment side password library of the user by using the password, and if so, the user level and the requirement information of the user are determined, and the synchronous verification of the password is completed.
6. The password authentication method of claim 1, wherein all cloud password groups in the cloud password library and all device password groups in the device password library use the same password classification scheme.
7. A password authentication method of a sharing device is applied to the sharing device to be used, and the method comprises the following steps:
acquiring a password acquired by a user in a cloud password library, wherein the password is obtained by adopting a preset password generation rule on demand information in advance, and the demand information is the demand information of the user on the shared equipment to be used;
searching whether a password identical to the password is stored or not from a device side password library of the user by using the password;
if so, determining the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
8. The password authentication method of claim 7, wherein the cloud password library comprises a plurality of cloud password groups, each cloud password group corresponds to a user, and each cloud password group is a set of all passwords generated by the sharing device under different working conditions according to a preset password generation rule.
9. The password authentication method according to claim 7, wherein the device-side password library includes a plurality of device-side password groups, each device-side password group corresponds to a user, and all passwords stored in the device-side password library by each sharing device and passwords in the cloud-side password library corresponding to the sharing device are generated by using the same preset password generation rule for the information required by the user.
10. The password authentication method according to claim 7, wherein the searching for whether the password identical to the password is stored from the device side password library of the user by using the password specifically comprises:
and searching whether the password identical to the password is stored or not from an equipment-side password group placed in an effective password reserved area of an equipment-side password library of the equipment side by using the password, wherein the effective password reserved area is used for reserving the password which is acquired but not used by the sharing equipment to be used.
11. The password authentication method according to claim 7, wherein the searching for whether the password identical to the password is stored from the device side password library of the user by using the password specifically comprises:
and when the password identical to the password is not found from the valid password reserved area of the equipment side password library, finding whether the password identical to the password is stored or not from the equipment side password group generated by the equipment side password library.
12. The password authentication method according to claim 7, wherein when a password identical to the password is found from a device-side password group generated by the device-side password library and a cloud password group level, a device-side password group level, and a user level are consistent, the synchronous authentication of the password is completed by determining the user requirement information using the found password and the preset password generation rule, specifically comprising:
and determining the user level and the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
13. The password authentication method of claim 12, further comprising, after completing the synchronous authentication of the password:
putting the unused equipment-side password group with the level higher than the user level into a valid password reserved area;
and deleting all the equipment-side password groups with the levels lower than the user level.
14. The password authentication method of claim 7, wherein after determining the requirement information of the user and completing the synchronous authentication of the password, the method further comprises:
and deleting the password which is successfully verified.
15. The password authentication method according to claim 7, further comprising:
and when the password identical to the password is not found from the equipment side password library, outputting prompt information, wherein the prompt information is used for prompting the user to input the password again.
16. The utility model provides a high in the clouds server, its characterized in that, high in the clouds server has a plurality of high in the clouds password storehouse, and each high in the clouds password storehouse corresponds a shared device, high in the clouds server includes:
the device comprises a first acquisition unit, a second acquisition unit and a control unit, wherein the first acquisition unit is used for acquiring the equipment identity of the shared equipment to be used, which is input by a user, and determining a corresponding cloud password library according to the equipment identity;
the second acquisition unit is used for acquiring the user information input by the user and the requirement information of the shared equipment to be used;
the selecting unit is used for selecting a cloud password group from the cloud password library and recording the cloud password group and the user information in a corresponding relation mode;
the extraction unit is used for extracting a password corresponding to the demand information from the cloud password group, wherein the password is obtained by adopting a preset password generation rule on the demand information in advance;
and the feedback unit is used for feeding the password back to the user, so that when the user uses the to-be-used sharing device, the to-be-used sharing device searches whether a password identical to the password is stored or not from a device side password library of the user by using the password, and if so, the searched password and the preset password generation rule are used for determining the requirement information of the user, and the synchronous verification of the password is completed.
17. The cloud server of claim 16, wherein the cloud code library comprises a plurality of cloud code groups, each cloud code group corresponds to a user, and each cloud code group is a set of all codes generated by the sharing device under different working conditions according to a preset code generation rule.
18. The cloud server of claim 16, wherein the device-side password library includes a plurality of device-side password groups, each device-side password group corresponds to a user, and all passwords stored in the device-side password library by each sharing device and passwords in the cloud password library corresponding to the sharing device are generated by using the same preset password generation rule for the user's demand information.
19. The cloud server of claim 16, wherein when the cloud server provides a password to the user after the user completes payment, the extracting unit comprises:
the first extraction subunit is used for extracting the cost which needs to be paid by the user and corresponds to the demand information from the cloud password group;
and the second extraction subunit is used for extracting the password corresponding to the demand information from the cloud password group after the user is detected to pay the fee.
20. The cloud server of claim 19, wherein the second extraction subunit is specifically configured to:
when the user is detected to finish paying the fee, extracting a password corresponding to the demand information from the cloud password group, and marking a user level, wherein when a plurality of users need to pay the fee, the user level is determined according to the payment finishing sequence of the users, and the closer the payment finishing time of the users is, the higher the corresponding user level is;
the feedback unit is specifically configured to:
and feeding the password back to the user, so that when the user uses the to-be-used sharing equipment, the to-be-used sharing equipment searches whether the password which is the same as the password is stored or not from an equipment side password library of the user by using the password, and if so, the user level and the requirement information of the user are determined, and the synchronous verification of the password is completed.
21. The cloud server of claim 16, wherein all cloud crypto groups in the cloud crypto library and all device crypto groups in the device crypto library use the same crypto classification scheme.
22. A sharing device, comprising:
the third acquisition unit is used for acquiring a password acquired by a user in a cloud password library, wherein the password is obtained by adopting a preset password generation rule on demand information in advance, and the demand information is the demand information of the user on a shared device to be used;
the searching unit is used for searching whether the password identical to the password is stored in a device side password library of the searching unit by using the password;
and the verification unit is used for determining the requirement information of the user by utilizing the searched password and the preset password generation rule to complete the synchronous verification of the password.
23. The sharing device of claim 22, wherein the cloud code library comprises a plurality of cloud code groups, each cloud code group corresponds to a user, and each cloud code group is a set of all codes generated by the sharing device under different working conditions according to a preset code generation rule.
24. The sharing device according to claim 22, wherein the device-side password library includes a plurality of device-side password groups, each device-side password group corresponds to a user, and all the passwords stored in the device-side password library by each sharing device and the passwords in the cloud-side password library corresponding to the sharing device are generated by using the same preset password generation rule for the information required by the user.
25. The sharing device according to claim 22, wherein the searching unit is specifically configured to:
and searching whether the password identical to the password is stored or not from an equipment-side password group placed in an effective password reserved area of an equipment-side password library of the equipment side by using the password, wherein the effective password reserved area is used for reserving the password which is acquired but not used by the sharing equipment to be used.
26. The sharing device according to claim 22, wherein the searching unit is specifically configured to:
and when the password identical to the password is not found from the valid password reserved area of the equipment side password library, finding whether the password identical to the password is stored or not from the equipment side password group generated by the equipment side password library.
27. The sharing device according to claim 22, wherein when the same password as the password is found from the device-side password group generated by the device-side password library, and the cloud-side password group level, the device-side password group level, and the user level are consistent, the verifying unit is specifically configured to:
and determining the user level and the requirement information of the user by using the searched password and the preset password generation rule, and completing the synchronous verification of the password.
28. The sharing device of claim 27, further comprising:
the placing unit is used for placing the unused equipment-side password group with the level higher than the user level into the valid password reserved area after the synchronous verification of the password is completed;
and the first deleting unit is used for deleting all the equipment end password groups with the levels lower than the user level.
29. The sharing device according to claim 22, further comprising:
and the second deleting unit is used for deleting the password which is successfully verified after the requirement information of the user is determined and the synchronous verification of the password is completed.
30. The sharing device according to claim 22, further comprising:
and the output unit is used for outputting prompt information when the password identical to the password is not found from the equipment side password library, wherein the prompt information is used for prompting a user to input the password again.
31. A password verification system for a shared device, comprising the cloud server of any one of claims 16 to 21 and at least one shared device of claims 22 to 30.
CN201710703147.0A 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system Active CN107483581B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710703147.0A CN107483581B (en) 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system
PCT/CN2018/090666 WO2019033840A1 (en) 2017-08-16 2018-06-11 Password authentication method for shared device, shared device, cloud server, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710703147.0A CN107483581B (en) 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system

Publications (2)

Publication Number Publication Date
CN107483581A CN107483581A (en) 2017-12-15
CN107483581B true CN107483581B (en) 2020-02-14

Family

ID=60600611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710703147.0A Active CN107483581B (en) 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system

Country Status (2)

Country Link
CN (1) CN107483581B (en)
WO (1) WO2019033840A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483581B (en) * 2017-08-16 2020-02-14 珠海格力电器股份有限公司 Password verification method of sharing device, cloud server and system
CN109978529B (en) * 2017-12-27 2024-01-23 海尔衣联生态科技(上海)有限公司 Offline payment method
CN108335218A (en) * 2018-02-12 2018-07-27 平安科技(深圳)有限公司 Insurance premium computational methods, device, computer equipment and storage medium
CN109448209A (en) * 2019-01-07 2019-03-08 上海早米网络科技有限公司 A kind of dynamic password massage control system and control method based on off-line mode
CN109887179A (en) * 2019-01-23 2019-06-14 上海早米网络科技有限公司 Charge sharing massage control system and control method based on offline dynamic password
CN110322599B (en) * 2019-05-23 2021-10-26 深圳绿米联创科技有限公司 Door lock management method and device, electronic equipment and storage medium
CN110335394A (en) * 2019-07-05 2019-10-15 深圳市智臻环保能源科技有限公司 A kind of smart lock control method and system based on cipher code set
CN112653701B (en) * 2020-12-24 2023-03-14 北京安信天行科技有限公司 Application password safe use monitoring method and system
CN114973518A (en) * 2022-04-21 2022-08-30 杭州小电科技股份有限公司 Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106652232A (en) * 2016-12-28 2017-05-10 北京拜克洛克科技有限公司 Bike sharing method and system
CN106780917A (en) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 The control method and system of lock

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7898439B2 (en) * 2008-03-20 2011-03-01 Isabelle Bettez Bicycle rental system and station
CN107483581B (en) * 2017-08-16 2020-02-14 珠海格力电器股份有限公司 Password verification method of sharing device, cloud server and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106652232A (en) * 2016-12-28 2017-05-10 北京拜克洛克科技有限公司 Bike sharing method and system
CN106780917A (en) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 The control method and system of lock

Also Published As

Publication number Publication date
WO2019033840A1 (en) 2019-02-21
CN107483581A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
CN107483581B (en) Password verification method of sharing device, cloud server and system
CN108737418B (en) Identity authentication method and system based on block chain
CN103297408B (en) Login method and device and terminal, the webserver
CN101815291A (en) Method and system for logging on client automatically
CN109033857B (en) Method, device and equipment for accessing data and readable storage medium
CN105450583A (en) Information authentication method and device
CN102999711A (en) Application copyright protection method, network platform and system
CN112069493A (en) Authentication system and authentication method
CN106572074B (en) Verification method and device for verification code
CN103634328A (en) Authentication method, device and system for network platform authentication server
CN105610771A (en) Account associating method and account associating device
CN105072608B (en) A kind of method and device of administrative authentication token
CN112819454B (en) Payment method, gateway device, server and storage medium
CN110324344A (en) The method and device of account information certification
CN105681258A (en) Session method and session device based on third-party server
CN111065090A (en) Method for establishing network connection and wireless routing equipment
CN113112266A (en) Multi-card processing method and system based on 5G message and block chain
CN103415847A (en) A system and method for accessing a service
CN109389392B (en) Security authentication transaction method and device
CN117022030A (en) Safety protection method and device for vehicle charging pile, electronic equipment and storage medium
CN104113417A (en) Dynamic password identity authentication method and system based on near field communication (NFC)
CN103580874B (en) Identity identifying method, system and cipher protection apparatus
CN109147120A (en) Authority processing method and device
CN106888195B (en) Verification method and device
CN107872773A (en) Cut-in method and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant