CN110570176A - Equipment control method and device - Google Patents

Equipment control method and device Download PDF

Info

Publication number
CN110570176A
CN110570176A CN201810569888.9A CN201810569888A CN110570176A CN 110570176 A CN110570176 A CN 110570176A CN 201810569888 A CN201810569888 A CN 201810569888A CN 110570176 A CN110570176 A CN 110570176A
Authority
CN
China
Prior art keywords
password
identification code
character string
electronic equipment
graphic identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810569888.9A
Other languages
Chinese (zh)
Inventor
陈光乐
叶麟峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Hangzhou Hikvision System Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201810569888.9A priority Critical patent/CN110570176A/en
Publication of CN110570176A publication Critical patent/CN110570176A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a device control method and device, and belongs to the technical field of information. The method comprises the following steps: displaying a first graphic identification code, wherein the first graphic identification code is generated based on a first encryption character string; when the input password is acquired and is the same as the first password, responding to the use operation of the electronic equipment; when the use of the electronic equipment is detected to be finished, acquiring a second graphic identification code, wherein the second graphic identification code is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment; refreshing the currently displayed first graphic identification code, and displaying the second graphic identification code. In the invention, the user can use the electronic equipment only by inputting the password of the electronic equipment, thereby simplifying the operation of the user. In addition, the electronic equipment has variable passwords and graphic identification codes, so that the safety of the equipment can be improved.

Description

Equipment control method and device
Technical Field
the present invention relates to the field of information technologies, and in particular, to a device control method and apparatus.
Background
With the development of information automation technology, more and more automatic billing systems are appearing in the market to provide self-service use services for user-related devices. For example, an automated billing system may be an offline single-charge system, in which the devices provided for use by the user are typically offline devices.
at present, an RFID card reading module is configured on the offline device, a user can use an RFID card as a fee storage medium, the user can use the offline device by swiping the RFID card on the offline device, and the RFID card reading module of the offline device can read the RFID card of the user to complete consumption settlement.
in the process of implementing the invention, the inventor finds that the related art has at least the following problems:
The device is provided for the user to use by reading the RFID card, and the user needs to perform a series of operations such as card opening and recharging, so that the operation is complicated.
Disclosure of Invention
the embodiment of the invention provides a device control method and device, which can solve the problem of complicated operation in the related art. The technical scheme is as follows:
in a first aspect, a device control method is provided, which is applied to an electronic device, and includes:
displaying a first graphic identification code, wherein the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment;
When the input password is acquired and is the same as the first password, responding to the use operation of the electronic equipment;
when the use of the electronic equipment is detected to be finished, acquiring a second graphic identification code, wherein the second graphic identification code is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment;
refreshing the currently displayed first graphic identification code, and displaying the second graphic identification code.
in one possible implementation manner, the acquiring the second graphic identification code includes:
Randomly generating the second password;
Encrypting the second password by using a key to obtain a second encryption character string;
and generating the second graphic identification code based on the second encryption character string.
in one possible implementation, the encrypting the second cipher with the key includes:
Encrypting the second password using a private key in an asymmetric encryption algorithm; or the like, or, alternatively,
encrypting the second cipher using a public key in the asymmetric encryption algorithm.
In one possible implementation, the displaying the first graphic identification code includes:
And displaying the first graphic identification code through an electronic ink screen.
in one possible implementation, the method further includes:
When the operation of ending the use is detected, executing the step of acquiring the second graphic identification code; or the like, or, alternatively,
and after the preset task is finished, executing the step of acquiring the second graphic identification code.
In a second aspect, a method for obtaining a password is provided, and is applied to a server, and the method includes:
receiving a decryption request sent by a terminal, wherein the decryption request carries an encrypted character string, and the encrypted character string is obtained by encrypting a password of electronic equipment;
Decrypting the encrypted character string to obtain a password of the electronic equipment;
And sending the password of the electronic equipment to the terminal.
in one possible implementation manner, the decrypting the encrypted character string to obtain the password of the electronic device includes:
when the encrypted character string is obtained by encrypting the password of the electronic equipment by using a private key in an asymmetric encryption algorithm, decrypting the encrypted character string by using a public key in the asymmetric encryption algorithm; or the like, or, alternatively,
When the encrypted character string is obtained by encrypting the password of the electronic equipment by using the public key in the asymmetric encryption algorithm, the encrypted character string is decrypted by using the private key in the asymmetric encryption algorithm.
In one possible implementation manner, before the sending the password of the electronic device to the terminal, the method further includes:
Generating a fee order, wherein the fee order comprises the fee to be paid for the use;
Sending the expense order to the terminal;
and when the payment completion is detected, executing the step of sending the password of the electronic equipment to the terminal.
In a third aspect, a method for obtaining a password is provided, and is applied to a terminal, where the method includes:
When a scanning instruction is received, scanning a graphic identification code of the electronic equipment, wherein the graphic identification code is generated based on an encrypted character string, and the encrypted character string is obtained by encrypting a password of the electronic equipment;
Analyzing the graphic identification code to obtain the encrypted character string;
sending a decryption request to a server, wherein the decryption request carries the encrypted character string;
and receiving and displaying the password of the electronic equipment.
In a fourth aspect, there is provided a device control apparatus applied to an electronic device, the apparatus including:
the display module is used for displaying a first graphic identification code, the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment;
The response module is used for responding to the use operation of the electronic equipment when the input password is acquired and is the same as the first password;
The acquisition module is used for acquiring a second graphic identification code when the use of the electronic equipment is detected to be finished, wherein the second graphic identification code is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment;
The display module is further used for refreshing the currently displayed first graphic identification code and displaying the second graphic identification code.
in one possible implementation, the obtaining module is configured to:
Randomly generating the second password;
Encrypting the second password by using a key to obtain a second encryption character string;
and generating the second graphic identification code based on the second encryption character string.
In one possible implementation, the obtaining module is configured to encrypt the second password using a private key in an asymmetric encryption algorithm; or the like, or, alternatively,
the obtaining module is used for encrypting the second password by using a public key in the asymmetric encryption algorithm.
In one possible implementation, the display module is configured to display the first graphic identification code through an electronic ink screen.
In one possible implementation manner, the obtaining module is configured to perform the step of obtaining the second graphic identification code when the end-of-use operation is detected; or the like, or, alternatively,
the acquisition module is used for executing the step of acquiring the second graphic identification code after the preset task is completed.
In a fifth aspect, an apparatus for obtaining a password is provided, and is applied to a server, the apparatus includes:
the receiving module is used for receiving a decryption request sent by a terminal, wherein the decryption request carries an encrypted character string, and the encrypted character string is obtained by encrypting a password of the electronic equipment;
the decryption module is used for decrypting the encrypted character string to obtain a password of the electronic equipment;
and the sending module is used for sending the password of the electronic equipment to the terminal.
In one possible implementation manner, the decryption module is configured to decrypt the encrypted string using a public key in an asymmetric encryption algorithm when the encrypted string is obtained by encrypting a password of the electronic device using a private key in the asymmetric encryption algorithm; or the like, or, alternatively,
The decryption module is used for decrypting the encrypted character string by using a private key in the asymmetric encryption algorithm when the encrypted character string is obtained by encrypting the password of the electronic equipment by using the public key in the asymmetric encryption algorithm.
In one possible implementation, the apparatus further includes:
The generating module is used for generating a fee order, and the fee order comprises the fee to be paid in the use;
the sending module is further configured to send the fee order to the terminal;
The sending module is further configured to execute the step of sending the password of the electronic device to the terminal when the payment completion is detected.
in a sixth aspect, an apparatus for obtaining a password is provided, where the apparatus is applied to a terminal, and the apparatus includes:
the scanning module is used for scanning a graphic identification code of the electronic equipment when a scanning instruction is received, wherein the graphic identification code is generated based on an encrypted character string, and the encrypted character string is obtained by encrypting a password of the electronic equipment;
The analysis module is used for analyzing the graphic identification code to obtain the encrypted character string;
The sending module is used for sending a decryption request to a server, wherein the decryption request carries the encrypted character string;
and the display module is used for receiving and displaying the password of the electronic equipment.
in a seventh aspect, a device control system is provided, where the system includes an electronic device, a terminal, and a server:
the electronic equipment is used for displaying a first graphic identification code, the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment;
the terminal is used for scanning the first graph identification code of the electronic equipment when receiving a scanning instruction, analyzing the graph identification code to obtain a first encryption character string, and sending a decryption request to a server, wherein the decryption request carries the first encryption character string;
the server is used for decrypting the first encrypted character string to obtain the first password of the electronic equipment and sending the first password to the terminal when receiving the decryption request sent by the terminal;
The terminal is also used for receiving and displaying the first password;
The electronic equipment is also used for responding to the use operation of the electronic equipment when the input password is acquired and is the same as the first password; when the fact that the use of the electronic equipment is finished is detected, a second graphic identification code is obtained, the currently displayed first graphic identification code is refreshed, and the second graphic identification code is displayed and is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment.
in an eighth aspect, an electronic device is provided that includes a processor and a memory; the memory is used for storing at least one instruction; the processor is configured to execute at least one instruction stored in the memory to implement the method steps of any one of the implementation manners of the first aspect.
In a ninth aspect, there is provided a server comprising a processor and a memory; the memory is used for storing at least one instruction; the processor is configured to execute at least one instruction stored in the memory to implement the method steps of any implementation manner of the second aspect.
in a tenth aspect, there is provided a terminal comprising a processor and a memory; the memory is used for storing at least one instruction; the processor is configured to execute at least one instruction stored in the memory to implement the method steps of the third aspect.
In an eleventh aspect, there is provided a computer-readable storage medium having stored therein at least one instruction which, when executed by a processor, implements the method steps of any one of the implementations of any one of the aspects.
the technical scheme provided by the embodiment of the invention has the beneficial effects that at least:
By displaying the graphic identification code, when the input password is the same as the password of the electronic equipment, the operation of the user on the electronic equipment is responded, after the use is finished, a new graphic identification code is generated based on the new password, and the currently displayed graphic identification code is refreshed into the new graphic identification code. The user can use the electronic equipment only by inputting the password of the electronic equipment, so that the operation of the user is simplified. In addition, the electronic equipment has variable passwords and graphic identification codes, and the new graphic identification codes are generated based on the new passwords, so that the problem of escaping from charging can be avoided, and the safety of the equipment is improved.
Drawings
in order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of an appliance control system provided by an embodiment of the present invention;
fig. 2 is a flowchart of an apparatus control method according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for obtaining a password according to an embodiment of the present invention;
fig. 4 is a flowchart of a method for obtaining a password according to an embodiment of the present invention;
fig. 5 is a flowchart of a device control method according to an embodiment of the present invention;
fig. 6 is a flowchart of a device control method according to an embodiment of the present invention;
Fig. 7 is a flowchart of encryption and decryption using the RSA algorithm according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an apparatus control device according to an embodiment of the present invention;
Fig. 9 is a schematic structural diagram of an apparatus for obtaining a password according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an apparatus for obtaining a password according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an apparatus for obtaining a password according to an embodiment of the present invention;
Fig. 12 is a schematic structural diagram of an electronic device 1200 according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a server 1300 according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
fig. 1 is a schematic diagram of an apparatus control system according to an embodiment of the present invention, where the apparatus control system may include an electronic apparatus 101, a terminal 102, and a server 103.
The electronic device 101 is a terminal provided for each user, and for example, the electronic device 101 may be a self-service vending machine, a shared bicycle, or the like. The electronic device 101 may display a graphic identification code that is generated based on an encryption string of the electronic device 101, the encryption string being obtained by encrypting a password of the electronic device 101.
the terminal 102 may be a user device such as a mobile phone and a tablet computer, and is configured to scan a graphic identification code of the electronic device 101 to obtain an encrypted character string of the electronic device 101, interact with the server 103, and send the encrypted character string to the server 103 by carrying the encrypted character string in a decryption request, so that the server 103 decrypts the encrypted character string and returns the decrypted character string to the terminal 102.
the server is configured to decrypt the encrypted character string carried in the decryption request sent by the terminal 102, obtain the password of the electronic device 101, and send the password of the electronic device 101 to the terminal 102.
Fig. 2 is a flowchart of an apparatus control method according to an embodiment of the present invention. The method is applied to the electronic device, and referring to fig. 2, the method comprises the following steps:
201. displaying a first graphic identification code, wherein the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment.
202. And when the input password is acquired and is the same as the first password, responding to the use operation of the electronic equipment.
203. When the fact that the electronic equipment is used is detected, a second graphic identification code is obtained, the second graphic identification code is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment.
204. Refreshing the currently displayed first graphic identification code, and displaying the second graphic identification code.
according to the method provided by the embodiment of the invention, the graphic identification code is displayed, when the input password is the same as the password of the electronic equipment, the use operation of the electronic equipment by a user is responded, after the use is finished, the new graphic identification code is generated based on the new password, and the currently displayed graphic identification code is refreshed into the new graphic identification code. The user can use the electronic equipment only by inputting the password of the electronic equipment, so that the operation of the user is simplified. In addition, the electronic equipment has variable passwords and graphic identification codes, and the new graphic identification codes are generated based on the new passwords, so that the problem of escaping from charging can be avoided, and the safety of the equipment is improved.
in one possible implementation, the obtaining the second graphic identification code includes:
Randomly generating the second password;
Encrypting the second password by using a key to obtain a second encryption character string;
The second graphical identification code is generated based on the second encrypted string.
in one possible implementation, the encrypting the second cipher using the key includes:
Encrypting the second password by using a private key in an asymmetric encryption algorithm; or the like, or, alternatively,
The second cipher is encrypted using a public key in the asymmetric encryption algorithm.
in one possible implementation, the displaying the first graphic identification code includes:
and displaying the first graphic identification code through the electronic ink screen.
In one possible implementation, the method further comprises:
when the operation of ending the use is detected, executing the step of acquiring the second graphic identification code; or the like, or, alternatively,
and after the preset task is finished, executing the step of acquiring the second graphic identification code.
all the above-mentioned optional technical solutions can be combined arbitrarily to form the optional embodiments of the present invention, and are not described herein again.
Fig. 3 is a flowchart of a method for obtaining a password according to an embodiment of the present invention. The method is applied to a server, and referring to fig. 3, the method comprises the following steps:
301. and receiving a decryption request sent by the terminal, wherein the decryption request carries an encryption character string, and the encryption character string is obtained by encrypting the password of the electronic equipment.
302. And decrypting the encrypted character string to obtain the password of the electronic equipment.
303. And sending the password of the electronic equipment to the terminal.
According to the method provided by the embodiment of the invention, when the decryption request of the terminal is received, the encrypted character string carried in the decryption request is decrypted, and the password obtained by decryption is returned to the terminal, so that a user of the terminal can know the password and then use the electronic equipment.
In one possible implementation manner, the decrypting the encrypted character string to obtain the password of the electronic device includes:
when the encrypted character string is obtained by encrypting the password of the electronic equipment by using a private key in an asymmetric encryption algorithm, decrypting the encrypted character string by using a public key in the asymmetric encryption algorithm; or the like, or, alternatively,
when the encrypted character string is obtained by encrypting the password of the electronic equipment by using the public key in the asymmetric encryption algorithm, the encrypted character string is decrypted by using the private key in the asymmetric encryption algorithm.
in one possible implementation manner, before the sending the password of the electronic device to the terminal, the method further includes:
generating a fee order, wherein the fee order comprises the fee to be paid for the use;
sending the fee order to the terminal;
when the payment completion is detected, a step of transmitting the password of the electronic device to the terminal is performed.
All the above-mentioned optional technical solutions can be combined arbitrarily to form the optional embodiments of the present invention, and are not described herein again.
fig. 4 is a flowchart of a method for obtaining a password according to an embodiment of the present invention. The method is applied to the terminal, and referring to fig. 4, the method includes:
401. when a scanning instruction is received, scanning a graphic identification code of the electronic equipment, wherein the graphic identification code is generated based on an encryption character string, and the encryption character string is obtained by encrypting a password of the electronic equipment.
402. and analyzing the graphic identification code to obtain the encrypted character string.
403. and sending a decryption request to the server, wherein the decryption request carries the encrypted character string.
404. And receiving and displaying the password of the electronic equipment.
according to the method provided by the embodiment of the invention, after the encrypted character string is obtained by scanning the graphic identification code of the electronic equipment, the encrypted character string is carried in the decryption request and is sent to the server, and after the encrypted character string is decrypted by the server, the password obtained by decryption is returned to the terminal, so that a user of the terminal can use the electronic equipment after knowing the password.
all the above-mentioned optional technical solutions can be combined arbitrarily to form the optional embodiments of the present invention, and are not described herein again.
fig. 5 is a flowchart of a device control method according to an embodiment of the present invention. Referring to fig. 5, the method includes:
501. the electronic equipment displays a first graphic identification code, the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment.
in the embodiment of the invention, the electronic equipment can provide the graphic identification code for the user to scan by using the terminal so as to acquire the password of the electronic equipment, so that the user can use the electronic equipment by inputting the password. The graphic identification code may be a two-dimensional code, such as a QR (Quick Response) code. The QR code is one of two-dimensional bar codes, the borne content of the QR code can be quickly decoded, the QR code can store more data than a common bar code, and a scanner does not need to be aligned in a straight line during scanning like the common bar code.
in step 501, the first graphic identification code refers to a graphic identification code currently displayed by the electronic device, and the electronic device needs to acquire the first graphic identification code before displaying the first graphic identification code. In one possible implementation, the process of acquiring the first graphic identification code includes: randomly generating a first password; encrypting the first password by using the key to obtain a first encryption character string; the first graphical identification code is generated based on the first encrypted string. By using the randomly generated password as the password when the electronic equipment is used, the safety of the electronic equipment can be guaranteed.
the first encryption character string refers to the encrypted first password. In order to ensure the safety of the electronic equipment and avoid the electronic equipment from being used by a user at will, the electronic equipment can generate a random password, and further generate a graphic identification code based on the encrypted password after encrypting the password by using a locally stored key, so that the password of the electronic equipment can be protected by the key and the graphic identification code.
In one possible implementation, the encrypting the first password using the key includes: encrypting the first password by using a private key in an asymmetric encryption algorithm; or, the first password is encrypted by using the public key in the asymmetric encryption algorithm. The password is encrypted by using the key in the asymmetric encryption algorithm, and the key used for encryption and the key required for decryption are respectively stored in different devices, so that the user can only realize decryption through interaction between the terminal and the server, and the security of decryption is improved.
the asymmetric encryption algorithm can be an RSA algorithm, the RSA algorithm has two keys, namely a public key and a private key, the public key and the private key are stored separately by two devices, one is stored in the electronic device, the other is stored in the server, and a cracker cannot obtain the two keys at the same time. If the private key is used for encryption, only the public key can be used for decryption. If public key encryption is used, only private key decryption can be used. If random collision library method is used for test, it may need to go through 2nAnd (4) secondary random library collision, wherein n is the bit number of the key. The electronic device can store the public key, and the server stores the private key, so that the electronic device encrypts the password by using the public key and the server decrypts the password by using the private key; the electronic device may store the private key and the server stores the public key, such that the electronic device encrypts the password using the private key and the server decrypts the password using the public key.
In the embodiment of the invention, the electronic equipment can be provided with a self-contained display screen, and the graphic identification code is displayed through the display screen. In one possible implementation, the display screen may be an electronic ink screen, and accordingly, the displaying the first graphic identification code includes: and displaying the first graphic identification code through the electronic ink screen.
The electronic ink screen is an E-Link screen, the E-Link screen is a display technology based on an electrophoresis technology, and dot particles with black and white colors float up and down in a liquid capsule under the action of an electric field to form a picture. After the picture is formed, the color particles stop moving, and the picture does not disappear even if the power is off. The electronic device may employ an E-Link screen of a suitable size as a display element of the electronic device, for example, the suitable size may be 1.54 inches. The E-Link screen is used for displaying the graphic identification code of the electronic equipment and is proper in size. When the user consumes, the graphic identification code can be scanned and identified when the distance between the camera of the terminal and the camera is about 0.5 m, and meanwhile, the E-Link screen is excellent in display under outdoor strong light and is particularly suitable for being applied in outdoor scenes. The screen consumes energy only at the time of refresh, and is excellent in low power consumption and excellent in low power consumption.
502. when a scanning instruction is received, the terminal scans a first graphic identification code of the electronic equipment, and analyzes the first graphic identification code to obtain a first encryption character string.
In the embodiment of the invention, when a user wants to use the electronic equipment, the terminal can be used for scanning the first graphic identification code currently displayed by the electronic equipment. The user may perform a manual operation on the terminal to trigger the scan instruction. For example, a user may open an APP of a terminal, click a scanning option on the APP, trigger a scanning instruction for a first graphic identification code, and when the terminal receives the scanning instruction, scan to obtain the first graphic identification code and analyze the first graphic identification code. Corresponding to the description of the generation process of the first graphic identification code in step 501, since the first graphic identification code is generated based on the first encryption character string, the server can only obtain the first encryption character string, that is, the encrypted first password, after analyzing the graphic identification code.
503. And the terminal sends a decryption request to the server, wherein the decryption request carries the first encryption character string.
in the embodiment of the invention, the electronic equipment and the terminal respectively store the key for encrypting the password of the electronic equipment and the key for decrypting the password of the electronic equipment, so that the terminal can carry the first encryption character string in the decryption request and send the first encryption character string to the server after acquiring the first encryption character string, and the server decrypts the first encryption character string.
504. And when a decryption request sent by the terminal is received, the server decrypts the first encryption character string to obtain a first password of the electronic equipment.
in the embodiment of the present invention, the server may decrypt the first encrypted string using the locally stored key. In one possible implementation manner, the decrypting the first encrypted string to obtain a first password of the electronic device includes: when the first encrypted character string is obtained by encrypting the first password of the electronic equipment by using a private key in an asymmetric encryption algorithm, decrypting the first encrypted character string by using a public key in the asymmetric encryption algorithm; or when the first encrypted character string is obtained by encrypting the first password of the electronic equipment by using the public key in the asymmetric encryption algorithm, the first encrypted character string is decrypted by using the private key in the asymmetric encryption algorithm.
For the case that the electronic device encrypts the password of the electronic device using the public key in step 501, in step 504, the server may decrypt the first encrypted string using the private key to obtain the first password of the electronic device; for the case that the electronic device encrypts the password of the electronic device using the private key in step 501, in step 504, the server may decrypt the first encrypted string using the public key to obtain the first password of the electronic device. The cipher is decrypted by using the key in the asymmetric encryption algorithm, and the key required by decryption and the key used by encryption are respectively stored in different devices, so that the user can only realize decryption through interaction between the terminal and the server, and the decryption security is improved. In addition, the private key can be used for encryption and the public key can be used for decryption, the public key can also be used for decryption, and the private key is used for encryption, so that the flexibility of encryption and decryption is improved.
505. and the server sends the first password of the electronic equipment to the terminal.
in the embodiment of the invention, the server can return the first password of the electronic equipment to the terminal after obtaining the first password.
it should be noted that the server may also perform step 504 and step 505 after the payment is completed. Of course, the server may also perform step 504 before making the payment, or perform step 504 during the payment process, and then perform step 505 after the payment is completed. Correspondingly, before the server sends the password of the electronic equipment to the terminal, a fee order can be generated, wherein the fee order comprises the fee to be paid for the use; sending the fee order to the terminal; when completion of the payment is detected, step 505 or step 504 and step 505 are performed. The terminal may display the fee order when receiving the fee order, and the user may complete settlement on the terminal according to the fee included in the fee order, for example, the terminal may call a third party payment platform to perform payment, and complete settlement of the order. By performing the decryption operation after the payment is completed, the problem that the user escapes consumption after using the device is avoided.
506. The terminal receives and displays the first password of the electronic equipment.
in the embodiment of the invention, after receiving the first password of the electronic equipment, the terminal displays the first password, so that a user of the terminal can see the first password and input the first password on the electronic equipment, thereby using the electronic equipment.
507. When the input password is acquired and is the same as the first password, the electronic equipment responds to the use operation of the user on the electronic equipment.
in the embodiment of the invention, after the user acquires the first password by displaying the first password through the terminal, the user can input the first password on the electronic equipment, the electronic equipment can compare the input password with the first password when acquiring the password input by the user, and when the two passwords are the same as each other, the user is indicated to input the correct password, and at the moment, the electronic equipment can open the use permission so that the user can use the electronic equipment. During the use of the electronic device by the user, the electronic device can respond to the operation of the user during the use.
508. when the fact that the electronic equipment is used is detected, the electronic equipment obtains a second graphic identification code, the second graphic identification code is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment.
in the embodiment of the invention, after the user finishes using the electronic equipment, the user can perform the operation of ending the use on the electronic equipment, so that the electronic equipment determines the use end of the electronic equipment according to the operation of ending the use, or the electronic equipment automatically considers that the use of the electronic equipment is ended after finishing the preset task. At this time, the electronic device may acquire a new graphic identification code, such as a second graphic identification code, and refresh the currently displayed first graphic identification code to display the second graphic identification code. Taking the electronic device as a sharing bicycle as an example, the use ending operation refers to locking operation, taking the electronic device as a self-service selling terminal as an example, and the completing the preset task refers to outputting the articles purchased by the user. After the use is finished, the new graphic identification code is automatically acquired to refresh the graphic identification code, so that the safety of the electronic equipment can be improved.
In one possible implementation manner, the electronic device may acquire the second graphic identification code in the same manner as the first graphic identification code is acquired in step 501, including: randomly generating the second password; encrypting the second password by using a key to obtain a second encryption character string; the second graphical identification code is generated based on the second encrypted string. The way of encrypting the second password by using the key is the same as the way of encrypting the first password in step 501, and is not described herein again. The password of the electronic equipment can be protected by the key and the graphic identification code by using the randomly generated password as the password when the electronic equipment is used and encrypting the password by using the key.
After each use, the electronic equipment changes the password of the electronic equipment and refreshes the graphic identification code. The graphic identification code is obtained by adopting a private encryption algorithm, the electronic equipment and the server can realize the encryption algorithm, but the APP operation code of the terminal does not contain the realization logic of the encryption algorithm, so that the terminal can only obtain the password of the electronic equipment through the interaction with the server, and the safety of the electronic equipment is guaranteed.
in addition, after the user uses the electronic device, the user may perform a use ending operation on the APP of the terminal, for example, click an end use button, trigger the terminal to send a use ending message to the server, and when the server receives the use ending message, the server may generate a fee order and send the fee order to the terminal, and the user may complete settlement on the terminal according to the fee included in the fee order, for example, the terminal may invoke a third party payment platform to perform payment, and complete order settlement.
509. the electronic equipment refreshes the first graphic identification code which is currently displayed, and displays the second graphic identification code.
In the embodiment of the invention, after acquiring the new graphic identification code, namely the second graphic identification code, the electronic device can refresh the currently displayed first graphic identification code so as to display the second graphic identification code.
in this step 509, the terminal may also display the second graphic identification code through the electronic ink screen, in the same way as the electronic device displays the first graphic identification code. The display mode of adopting the ink screen, in static display application, need not extra backlight under its powerful low-power consumption and the highlight, be particularly suitable for using as the demonstration original paper under adverse circumstances, the screen only need consume the power when needing to refresh, and this kind of screen is used for showing the figure identification code that the consumption was used to under outdoor condition, its display effect is comparable with the paper figure identification code of printing.
optionally, the electronic device may use an electronic ink screen (E-link screen) as a display original, and may also use an STM8 ultra-low power consumption embedded single chip microcomputer as a main control MCU (micro controller Unit), where the chip has a low cost, and the cost of the electronic device may be greatly reduced. The MCU is also called a single chip Microcomputer (MCU) or a single chip Microcomputer (MCU), which properly reduces the frequency and specification of a CPU (Central processing Unit), and integrates peripheral interfaces such as a Memory (Memory), a counter (Timer), a USB (Universal serial bus), a/D conversion, a UART (Universal Asynchronous Receiver/Transmitter), a PLC (Planar Light wave Circuit, Planar optical waveguide), DMA (Direct Memory Access), and the like, even a LCD (Liquid Crystal Display) driving Circuit on a single chip, thereby forming a chip-level computer and performing different combination control for different application occasions.
The electronic equipment can also adopt a matrix keyboard consisting of 12 buttons as an input element, and a user inputs a password to the electronic equipment through the keyboard to finish the interaction between the user and the electronic equipment. In addition, the electronic device may adopt a lithium battery as an element of power.
The STM8 of the electronic equipment is used as an MCU, and a minimum system board circuit can be formed by a crystal oscillator and other components. The E-link screen of the electronic device may be connected to the MCU through a Serial Peripheral Interface (SPI) bus, and Interface corresponding to the hardware SPI of the STM 8. The SPI is a high-speed, full-duplex and synchronous communication bus, and only four wires are occupied on pins of a chip, so that the pins of the chip are saved. The matrix keyboard of the electronic device is docked with the external interrupt interface of the MCU. The power supply of the electronic device is directly connected to VCC (voltage Current connector) and GND (Ground) of the MCU.
in the embodiment of the invention, the MCU of the electronic equipment can run in two modes, one mode is a low power consumption mode, and the other mode is a sleep mode. The MCU of the electronic equipment is set to be operated in a low power consumption mode by default, the electronic equipment can be operated in a sleep mode in a non-working mode, when an external interrupt signal of the MCU is received, the MCU is operated from the sleep mode to the low power consumption mode, and after the MCU is used, the electronic equipment is operated from the low power consumption mode to the sleep mode. For example, a matrix keyboard of the electronic device is connected to a General Purpose Input/Output (GPIO) interface of the external interrupt of the MCU, and when a user presses a key on the electronic device, the electronic device returns to the low power consumption mode from the sleep mode due to reception of the external interrupt signal.
in order to more clearly embody the above technical solution, the graphic identification code is taken as a two-dimensional code, and the above technical solution is explained with reference to fig. 4. As shown in fig. 6, a flowchart of an apparatus control method is provided, where a user is a user of a terminal, the user may scan a two-dimensional code of an electronic apparatus using an APP of the terminal to obtain an encrypted character string, the electronic apparatus requests a server for decryption through the APP, the server may return a password obtained by decryption to the electronic apparatus, the electronic apparatus displays the password, and the user inputs the password into the electronic apparatus and uses the electronic apparatus. After the user finishes using, single consumption can be carried out through the interaction between the terminal and the server. After the electronic equipment is used, the two-dimensional code can be refreshed.
Referring to fig. 7, a flowchart of encrypting and decrypting using the RSA algorithm is provided, as shown in fig. 5, an electronic device may encrypt a password using a public key of the RSA algorithm, and generate a two-dimensional code based on the encrypted password, after a user scans the two-dimensional code using an APP of a terminal, the terminal may request decryption from a server, and the server decrypts the password using a private key of the RSA algorithm, and returns the password to the terminal after obtaining the password of the electronic device, so that the user may operate the electronic device using the password.
in the technical scheme, the off-line electronic equipment has the variable password, and compared with the off-line equipment with the fixed password in the related technology, the problem that a user escapes consumption by recording the fixed equipment password can be avoided, and the off-line electronic equipment has obvious advantages in the aspect of equipment safety. Compared with the online variable password device in the related art, the device generally needs to be configured with the SIM card to communicate with the server, and the cost is high, so that the electronic device in the embodiment of the invention has the advantage of cost in the infrastructure of the device, the cost of the device and the large-scale expansion business, and the operation cost of the whole system can be greatly reduced.
The realization of user consumption needs the user to accomplish consumption through the APP on-line check-up at terminal, compares in relevant technology, and off-line equipment consumes through the consumption card (IC-card, RFID card) of firm private agreement, and this scheme is by a wide margin widened user's scope, has avoided because the problem that opens the card, fills the loaded down with trivial details user's that leads to run off, convenience of customers ' use that can be true.
The electronic equipment has low power consumption during operation, does not need additional power access, realizes the whole low-power consumption dormant operation of the electronic equipment by combining the low-power consumption chip and the E-Link screen, displays the two-dimensional code by the E-Link screen, and only runs in a low-power consumption mode during consumption because the power is not consumed when the electronic equipment is not refreshed, and immediately returns to the dormant mode after consumption is finished. Therefore, the electronic equipment can realize power supply in the process of normal operation for many years only through the self-contained storage battery.
According to the method provided by the embodiment of the invention, the graphic identification code is displayed, when the input password is the same as the password of the electronic equipment, the use operation of the electronic equipment by a user is responded, after the use is finished, the new graphic identification code is generated based on the new password, and the currently displayed graphic identification code is refreshed into the new graphic identification code. The user can use the electronic equipment only by inputting the password of the electronic equipment, so that the operation of the user is simplified. In addition, the electronic equipment has variable passwords and graphic identification codes, and the new graphic identification codes are generated based on the new passwords, so that the problem of escaping from charging can be avoided, and the safety of the equipment is improved.
fig. 8 is a schematic structural diagram of an apparatus control device according to an embodiment of the present invention. Referring to fig. 8, the apparatus includes:
a display module 801, configured to display a first graphic identification code, where the first graphic identification code is generated based on a first encrypted character string, and the first encrypted character string is obtained by encrypting a first password of the electronic device;
A response module 802, configured to, when an input password is obtained and the input password is the same as the first password, respond to a use operation of the electronic device;
an obtaining module 803, configured to obtain, when it is detected that the electronic device is finished being used, a second graphic identification code, where the second graphic identification code is generated based on a second encrypted character string, and the second encrypted character string is obtained by encrypting a second password of the electronic device;
the display module 801 is further configured to refresh the currently displayed first graphic identification code and display the second graphic identification code.
In one possible implementation, the obtaining module 803 is configured to:
Randomly generating the second password;
Encrypting the second password by using a key to obtain a second encryption character string;
the second graphical identification code is generated based on the second encrypted string.
in one possible implementation, the obtaining module 803 is configured to encrypt the second password by using a private key in an asymmetric encryption algorithm; or the like, or, alternatively,
The obtaining module 803 is configured to encrypt the second password using the public key in the asymmetric encryption algorithm.
In one possible implementation, the display module 801 is configured to display the first graphic identification code through an electronic ink screen.
In one possible implementation manner, the obtaining module 803 is configured to perform the step of obtaining the second graphic identification code when detecting the end-of-use operation; or the like, or, alternatively,
The obtaining module 803 is configured to perform a step of obtaining a second graphic identification code after completing a preset task.
according to the device provided by the embodiment of the invention, the graphic identification code is displayed, when the input password is the same as that of the electronic equipment, the use operation of the electronic equipment by a user is responded, after the use is finished, the new graphic identification code is generated based on the new password, and the currently displayed graphic identification code is refreshed into the new graphic identification code. The user can use the electronic equipment only by inputting the password of the electronic equipment, so that the operation of the user is simplified. In addition, the electronic equipment has variable passwords and graphic identification codes, and the new graphic identification codes are generated based on the new passwords, so that the problem of escaping from charging can be avoided, and the safety of the equipment is improved.
fig. 9 is a schematic structural diagram of an apparatus for obtaining a password according to an embodiment of the present invention. Referring to fig. 9, the apparatus includes:
A receiving module 901, configured to receive a decryption request sent by a terminal, where the decryption request carries an encrypted character string, and the encrypted character string is obtained by encrypting a password of an electronic device;
A decryption module 902, configured to decrypt the encrypted character string to obtain a password of the electronic device;
a sending module 903, configured to send the password of the electronic device to the terminal.
In one possible implementation manner, the decryption module 902 is configured to decrypt the encrypted character string by using a public key in an asymmetric encryption algorithm when the encrypted character string is obtained by encrypting a password of the electronic device by using a private key in the asymmetric encryption algorithm; or the like, or, alternatively,
The decryption module 902 is configured to decrypt the encrypted character string by using a private key in the asymmetric encryption algorithm when the encrypted character string is obtained by encrypting the password of the electronic device by using the public key in the asymmetric encryption algorithm.
In one possible implementation, referring to fig. 10, the apparatus further includes:
a generating module 904, configured to generate a fee order, where the fee order includes a fee to be paid for the current use;
the sending module 903 is further configured to send the fee order to the terminal;
The sending module 903 is further configured to execute the step of sending the password of the electronic device to the terminal when the payment completion is detected.
according to the device provided by the embodiment of the invention, when the decryption request of the terminal is received, the encrypted character string carried in the decryption request is decrypted, and the password obtained by decryption is returned to the terminal, so that a user of the terminal can know the password and then use the electronic equipment.
Fig. 11 is a schematic structural diagram of an apparatus for obtaining a password according to an embodiment of the present invention. Referring to fig. 11, the apparatus includes:
The scanning module 1101 is configured to, when a scanning instruction is received, scan a graphic identification code of the electronic device, where the graphic identification code is generated based on an encrypted character string obtained by encrypting a password of the electronic device;
the analysis module 1102 is configured to analyze the graphic identification code to obtain the encrypted character string;
A sending module 1103, configured to send a decryption request to a server, where the decryption request carries the encrypted character string;
and a display module 1104 for receiving and displaying the password of the electronic device.
according to the device provided by the embodiment of the invention, after the encrypted character string is obtained by scanning the graphic identification code of the electronic equipment, the encrypted character string is carried in the decryption request and is sent to the server, and after the encrypted character string is decrypted by the server, the password obtained by decryption is returned to the terminal, so that a user of the terminal can use the electronic equipment after knowing the password.
it should be noted that: the device control apparatus provided in the above embodiment is illustrated by only dividing the functional modules when displaying the graphic identification code, and in practical applications, the function allocation may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above. In addition, the device control apparatus and the device control method provided in the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.
Fig. 12 is a schematic structural diagram of an electronic device 1200 according to an embodiment of the present invention. The electronic device may be provided as the electronic device or the terminal in the above-described embodiments. The electronic device 1200 may be a kiosk, a shared cart, or the like that provides self-service.
in general, the electronic device 1200 includes: a processor 1201 and a memory 1202.
in some embodiments, the processor 1201 may be integrated with a GPU (Graphics Processing Unit) that is responsible for rendering and drawing content that the display screen needs to display. In some embodiments, the processor 1201 may use an STM8 ultra-low power consumption embedded single chip microcomputer as a master MCU. The MCU is also called a single-chip microcomputer or a single-chip microcomputer, the frequency and specification of the CPU are properly reduced, and peripheral interfaces such as a memory, a counter, a USB, an A/D conversion, a UART, a PLC, a DMA and the like, even an LCD driving circuit are integrated on a single chip to form a chip-level computer, and different combination control is carried out on different application occasions.
Memory 1202 may include one or more computer-readable storage media, which may be non-transitory. Memory 1202 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1202 is used to store at least one instruction for execution by processor 1201 to implement the device control methods provided by method embodiments herein.
in some embodiments, the electronic device 1200 may further optionally include: a peripheral interface 1203 and at least one peripheral. The processor 1201, memory 1202, and peripheral interface 1203 may be connected by a bus or signal line. Various peripheral devices may be connected to peripheral interface 1203 via a bus, signal line, or circuit board. In particular, the peripheral devices include at least one of a display 1205, a keypad 1206, audio circuitry 1207, a pointing component 1208, and a power supply 1209.
The peripheral interface 1203 may be used to connect at least one peripheral associated with I/O (Input/Output) to the processor 1201 and the memory 1202. In some embodiments, the processor 1201, memory 1202, and peripheral interface 1203 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 1201, the memory 1202 and the peripheral device interface 1203 may be implemented on a separate chip or circuit board, which is not limited in this embodiment.
The display screen 1205 is for displaying a graphic identification code, for example, the display screen 1205 may be an electronic ink screen (E-link screen). The keypad 1206 is used for inputting a password of the electronic device 1200, for example, the keypad 1206 may be a matrix keypad of 12 buttons. The audio circuitry 1207 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals and inputting the electric signals to the processor 1201 for processing. The speaker is used to convert the electrical signals from the processor 1201 into sound waves.
the positioning component 1208 is used to locate a current geographic Location of the electronic device 1200 to implement navigation or LBS (Location Based Service). The Positioning component 1208 can be a Positioning component based on the united states GPS (Global Positioning System), the chinese beidou System, the russian graves System, or the european union galileo System.
The power supply 1209 is used to supply power to various components in the electronic device 1200. For example, the power source 1209 may be a lithium battery.
Those skilled in the art will appreciate that the configuration shown in fig. 12 is not limiting of electronic device 1200 and may include more or fewer components than shown, or combine certain components, or employ a different arrangement of components.
Fig. 13 is a schematic structural diagram of a server 1300 according to an embodiment of the present invention, where the server 1300 may generate a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 1301 and one or more memories 1302, where the memory 1302 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 1301 to implement the methods provided by the foregoing method embodiments. Certainly, the server 1300 may further include components such as a wired or wireless network interface, a keyboard, and an input/output interface, so as to perform input and output, and the server 1300 may further include other components for implementing the functions of the device, which is not described herein again.
In an exemplary embodiment, a computer-readable storage medium, such as a memory, storing at least one instruction, which when executed by a processor, implements the device control method in the above embodiments, is also provided. For example, the computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a Compact Disc Read-Only Memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
The embodiment of the present disclosure further provides an apparatus control system, where the system includes an electronic apparatus, a terminal, and a server:
the electronic equipment is used for displaying a first graphic identification code, the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment;
the terminal is used for scanning the first graph identification code of the electronic equipment when receiving a scanning instruction, analyzing the graph identification code to obtain a first encryption character string, and sending a decryption request to a server, wherein the decryption request carries the first encryption character string;
The server is used for decrypting the first encrypted character string to obtain the first password of the electronic equipment and sending the first password to the terminal when receiving the decryption request sent by the terminal;
The terminal is also used for receiving and displaying the first password;
the electronic equipment is also used for responding to the use operation of the electronic equipment when the input password is acquired and is the same as the first password; when the fact that the electronic equipment is used is detected, a second graphic identification code is obtained, the currently displayed first graphic identification code is refreshed, and the second graphic identification code is displayed and is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment.
it will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present invention and should not be taken as limiting the invention, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (16)

1. An apparatus control method applied to an electronic apparatus, the method comprising:
displaying a first graphic identification code, wherein the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment;
When the input password is acquired and is the same as the first password, responding to the use operation of the electronic equipment;
when the use of the electronic equipment is detected to be finished, acquiring a second graphic identification code, wherein the second graphic identification code is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment;
refreshing the currently displayed first graphic identification code, and displaying the second graphic identification code.
2. the method of claim 1, wherein the obtaining the second graphical identification code comprises:
Randomly generating the second password;
Encrypting the second password by using a key to obtain a second encryption character string;
And generating the second graphic identification code based on the second encryption character string.
3. The method of claim 2, wherein the encrypting the second cipher using the key comprises:
Encrypting the second password using a private key in an asymmetric encryption algorithm; or the like, or, alternatively,
encrypting the second cipher using a public key in the asymmetric encryption algorithm.
4. The method of claim 1, wherein displaying the first graphical identification code comprises:
And displaying the first graphic identification code through an electronic ink screen.
5. The method of claim 1, further comprising:
When the operation of ending the use is detected, executing the step of acquiring the second graphic identification code; or the like, or, alternatively,
And after the preset task is finished, executing the step of acquiring the second graphic identification code.
6. a method for obtaining a password, which is applied to a server, the method comprising:
receiving a decryption request sent by a terminal, wherein the decryption request carries an encrypted character string, and the encrypted character string is obtained by encrypting a password of electronic equipment;
decrypting the encrypted character string to obtain a password of the electronic equipment;
and sending the password of the electronic equipment to the terminal.
7. The method of claim 1, wherein decrypting the encrypted string to obtain the password of the electronic device comprises:
When the encrypted character string is obtained by encrypting the password of the electronic equipment by using a private key in an asymmetric encryption algorithm, decrypting the encrypted character string by using a public key in the asymmetric encryption algorithm; or the like, or, alternatively,
when the encrypted character string is obtained by encrypting the password of the electronic equipment by using the public key in the asymmetric encryption algorithm, the encrypted character string is decrypted by using the private key in the asymmetric encryption algorithm.
8. The method of claim 6, wherein before sending the password of the electronic device to the terminal, the method further comprises:
generating a fee order, wherein the fee order comprises the fee to be paid for the use;
sending the expense order to the terminal;
and when the payment completion is detected, executing the step of sending the password of the electronic equipment to the terminal.
9. A method for obtaining a password is applied to a terminal, and the method comprises the following steps:
When a scanning instruction is received, scanning a graphic identification code of the electronic equipment, wherein the graphic identification code is generated based on an encrypted character string, and the encrypted character string is obtained by encrypting a password of the electronic equipment;
Analyzing the graphic identification code to obtain the encrypted character string;
Sending a decryption request to a server, wherein the decryption request carries the encrypted character string;
And receiving and displaying the password of the electronic equipment.
10. an apparatus control device, applied to an electronic apparatus, the apparatus comprising:
The display module is used for displaying a first graphic identification code, the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment;
The response module is used for responding to the use operation of the electronic equipment when the input password is acquired and is the same as the first password;
The acquisition module is used for acquiring a second graphic identification code when the use of the electronic equipment is detected to be finished, wherein the second graphic identification code is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment;
the display module is further used for refreshing the currently displayed first graphic identification code and displaying the second graphic identification code.
11. The apparatus of claim 10, wherein the obtaining module is configured to:
Randomly generating the second password;
Encrypting the second password by using a key to obtain a second encryption character string;
and generating the second graphic identification code based on the second encryption character string.
12. The apparatus of claim 10, wherein the display module is configured to display the first graphical identification code via an electronic ink screen.
13. an apparatus control system, characterized in that the system comprises an electronic apparatus, a terminal, and a server:
The electronic equipment is used for displaying a first graphic identification code, the first graphic identification code is generated based on a first encryption character string, and the first encryption character string is obtained by encrypting a first password of the electronic equipment;
The terminal is used for scanning the first graph identification code of the electronic equipment when receiving a scanning instruction, analyzing the graph identification code to obtain a first encryption character string, and sending a decryption request to a server, wherein the decryption request carries the first encryption character string;
the server is used for decrypting the first encrypted character string to obtain the first password of the electronic equipment and sending the first password to the terminal when receiving the decryption request sent by the terminal;
The terminal is also used for receiving and displaying the first password;
The electronic equipment is also used for responding to the use operation of the electronic equipment when the input password is acquired and is the same as the first password; when the fact that the use of the electronic equipment is finished is detected, a second graphic identification code is obtained, the currently displayed first graphic identification code is refreshed, and the second graphic identification code is displayed and is generated based on a second encryption character string, and the second encryption character string is obtained by encrypting a second password of the electronic equipment.
14. An electronic device comprising a processor and a memory; the memory is used for storing at least one instruction; the processor, configured to execute at least one instruction stored on the memory to implement the method steps of any of claims 1-5.
15. A server, comprising a processor and a memory; the memory is used for storing at least one instruction; the processor, configured to execute at least one instruction stored on the memory to implement the method steps of any of claims 6-8.
16. a terminal comprising a processor and a memory; the memory is used for storing at least one instruction; the processor, configured to execute at least one instruction stored in the memory, to implement the method steps of claim 9.
CN201810569888.9A 2018-06-05 2018-06-05 Equipment control method and device Pending CN110570176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810569888.9A CN110570176A (en) 2018-06-05 2018-06-05 Equipment control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810569888.9A CN110570176A (en) 2018-06-05 2018-06-05 Equipment control method and device

Publications (1)

Publication Number Publication Date
CN110570176A true CN110570176A (en) 2019-12-13

Family

ID=68772203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810569888.9A Pending CN110570176A (en) 2018-06-05 2018-06-05 Equipment control method and device

Country Status (1)

Country Link
CN (1) CN110570176A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111798206A (en) * 2020-06-24 2020-10-20 霓检有限公司 Detection data processing method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104574062A (en) * 2015-01-21 2015-04-29 上海客非科贸有限公司 Payment system and method for automatic vending terminal
CN107301703A (en) * 2017-06-23 2017-10-27 钱本宁 Dynamic puzzle-lock system and unlocking method
CN206696954U (en) * 2017-04-28 2017-12-01 北京有财网络科技有限公司 A kind of shared charger baby system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104574062A (en) * 2015-01-21 2015-04-29 上海客非科贸有限公司 Payment system and method for automatic vending terminal
CN206696954U (en) * 2017-04-28 2017-12-01 北京有财网络科技有限公司 A kind of shared charger baby system
CN107301703A (en) * 2017-06-23 2017-10-27 钱本宁 Dynamic puzzle-lock system and unlocking method

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
徐又又等: "基于STM8L单片机的动态密码锁", 《现代计算机》, 5 September 2015 (2015-09-05), pages 45 - 50 *
潘永雄: "《STM8S系列单片机原理与应用》", 28 February 2015, pages: 229 - 231 *
王丽君等: "新型超低功耗电子密码锁设计", 《电子设计工程》, vol. 25, no. 15, 5 August 2017 (2017-08-05), pages 145 - 147 *
陈昶佚等: "一种基于动态二维码的智能车锁设计", 《电子制作》 *
陈昶佚等: "一种基于动态二维码的智能车锁设计", 《电子制作》, no. 11, 1 June 2018 (2018-06-01) *
龙顺宇: "《深入浅出STM8单片机入门、进阶与应用实例》", 30 September 2016, pages: 187 - 196 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111798206A (en) * 2020-06-24 2020-10-20 霓检有限公司 Detection data processing method, device and equipment
CN111798206B (en) * 2020-06-24 2023-11-14 霓检有限公司 Detection data processing method, device and equipment

Similar Documents

Publication Publication Date Title
KR101508320B1 (en) Apparatus for issuing and generating one time password using nfc card, and method using the same
JP6293886B2 (en) Use of biometrics for payments based on NFC
US20190379659A1 (en) Portable biometric authentication device and terminal device using near field communication
CN112118227B (en) Card binding method and terminal
CN105814590B (en) Person-to-person payment using an electronic device
TW201643787A (en) Card and application program product
CN109804376A (en) User and equipment certification for web application
CN103647587A (en) Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device
CN106030443A (en) Devices and methods for portable processing and application execution
CN111415143B (en) Payment device and payment method and device thereof
US20160070418A1 (en) Data communication device and program
CN113242134B (en) Digital certificate signing method, device, system and storage medium
WO2017076270A1 (en) Smart card having function of one time password (otp), and work method therefor
CN111901283B (en) Resource transfer method, device, terminal and storage medium
CN110365501B (en) Method and device for group joining processing based on graphic code
KR101583156B1 (en) Card reader, terminal and method for processing payment information thereof
CN110570176A (en) Equipment control method and device
CN107516215B (en) Intelligent POS terminal and method capable of safely inputting PIN code
CN104123644A (en) IC (Integrated Circuit) card capable of communicating with capacitive touch screen as well as system and method thereof
CN110942304A (en) Payment result acquisition method and device, payment equipment and cash register equipment
WO2020073412A1 (en) Electronic payment card supporting scan-to-pay technology
TW201416861A (en) Card reader combined with mobile device
CN115330379A (en) Offline payment method and device, electronic equipment and readable storage medium
CN103701603A (en) Method, terminal, equipment and system of utilizing internet banking to draw lottery
CN111125732A (en) Data processing method, system, machine readable medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191213

RJ01 Rejection of invention patent application after publication