CN110891045A - Password setting method, password verification method and related equipment - Google Patents
Password setting method, password verification method and related equipment Download PDFInfo
- Publication number
- CN110891045A CN110891045A CN201811059662.0A CN201811059662A CN110891045A CN 110891045 A CN110891045 A CN 110891045A CN 201811059662 A CN201811059662 A CN 201811059662A CN 110891045 A CN110891045 A CN 110891045A
- Authority
- CN
- China
- Prior art keywords
- password
- intelligent terminal
- time information
- verification
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 115
- 238000000034 method Methods 0.000 title claims abstract description 61
- 238000012545 processing Methods 0.000 claims description 33
- 238000004590 computer program Methods 0.000 claims description 22
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a password setting method, a password verification method and related equipment, wherein the password setting method comprises the steps of obtaining first scene information and first time information of an intelligent terminal; the first scene information and the first time information are processed to obtain the decryption password of the intelligent terminal, so that a user does not remember the decryption password any more, and the intelligent terminal is more convenient and quicker to unlock.
Description
Technical Field
The invention relates to the technical field of network security, in particular to a password setting method, a password verification method and related equipment.
Background
With the increasing awareness of the network security of users, the application scenarios of passwords are increasing, such as terminal passwords, access passwords, bank passwords, mobile phone passwords, application passwords, and the like.
In the prior art, if the complexity of the password is ensured to be high, the user can hardly remember the password, and the user is troublesome to forget the password; if the password complexity is not high, although the user can easily remember the password, the password is easy to crack and is very insecure. This causes a technical problem that it is difficult to compromise between the convenience of password use and the security of the password.
Therefore, how to implement the set password is convenient for the user to remember and use on the premise of higher security, which is a technical problem that needs to be solved urgently by technical personnel in the field.
Disclosure of Invention
In view of this, the present invention provides a method for setting a secret password, a method for verifying the secret password, and a related device, so as to facilitate the user to memorize and use the set secret password on the premise of higher security.
In order to achieve the above object, the present invention provides a password setting method, including:
acquiring first scene information and first time information of an intelligent terminal;
and processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
The invention also provides a password verification method, which comprises the following steps:
acquiring second scene information and second time information of the intelligent terminal;
processing the second scene information and the second time information to obtain a verification password of the intelligent terminal;
and if the verification password is matched with a preset decryption password, controlling the intelligent terminal to unlock, wherein the decryption password is obtained after processing according to the first scene information and the first time information.
The invention also provides a password verification method, which comprises the following steps:
receiving an authentication password sent by the intelligent terminal, wherein the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
verifying the verification password and a preset decryption password to obtain a verification result;
sending the verification result to an intelligent terminal so that the intelligent terminal is controlled to unlock when the verification result is that the verification password is matched with the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
The invention also provides a password setting device, comprising:
the first acquisition module is used for acquiring first scene information and first time information of the intelligent terminal;
and the first processing module is used for processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
The invention also provides a password verification device, which comprises:
the second acquisition module is used for acquiring second scene information and second time information of the intelligent terminal;
the second processing module is used for processing the second scene information and the second time information to obtain a verification password of the intelligent terminal;
and the control module is used for controlling the intelligent terminal to unlock if the verification password is matched with a preset decryption password, wherein the decryption password is obtained after processing according to the first scene information and the first time information.
The invention also provides a password verification device, which comprises:
the receiving module is used for receiving an authentication password sent by the intelligent terminal, wherein the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
the verification module is used for verifying the verification password and a preset decryption password to obtain a verification result;
the second sending module is used for sending the verification result to the intelligent terminal so that the intelligent terminal can be controlled to unlock when the verification result is that the verification password is matched with the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
The invention also provides an intelligent terminal for setting the password, which comprises a first processor and a first memory;
the first processor is connected with the first memory;
the first memory is used for storing a computer program at least for storing the password setting method of the above claim;
the first processor is used for calling and executing the computer program.
The invention also provides an intelligent terminal for verifying the password, which comprises a second processor and a second memory;
the second processor is connected with the second memory;
the second memory is used for storing a computer program, and the computer program is at least used for storing the password authentication method;
the second processor is used for calling and executing the computer program.
The invention also provides a server, which comprises a third processor and a third memory;
the third memory is used for storing a computer program, and the computer program is at least used for storing the password authentication method;
and the third processor is used for calling and executing the computer program.
According to the password setting method, the password setting device and the intelligent terminal, the first scene information and the first time information of the intelligent terminal are obtained; the first scene information and the first time information are processed to obtain the decryption password of the intelligent terminal, so that a user does not remember the decryption password any more, and the intelligent terminal is more convenient and quicker to unlock.
According to the password verification method, the password verification device and the intelligent terminal, second scene information and second time information of the intelligent terminal are obtained; processing the second scene information and the second time information to obtain an authentication password of the intelligent terminal; if the verification password is matched with the preset decryption password, the intelligent terminal is controlled to unlock, so that the user does not remember the decryption password any more, and the intelligent terminal is controlled to unlock more conveniently and quickly.
According to the password authentication method, the password authentication device and the server, the authentication password sent by the intelligent terminal is received, the authentication password and the preset decryption password are authenticated to obtain the authentication result, and the authentication result is sent to the intelligent terminal so that the intelligent terminal is controlled to unlock when the authentication result is that the authentication password is matched with the decryption password; the technical scheme of the invention can ensure that the password is convenient for the user to memorize and use on the premise of higher safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of an embodiment of a password setting method of the present invention;
FIG. 2 is a flowchart of a first embodiment of a method for verifying a password according to the present invention;
FIG. 3 is a flowchart of a second embodiment of a method for verifying a password of the present invention;
FIG. 4 is a schematic structural diagram of an embodiment of a password setting apparatus according to the present invention;
FIG. 5 is a schematic structural diagram of a first embodiment of a password authentication apparatus according to the present invention;
fig. 6 is a schematic structural diagram of a second embodiment of the password authentication device of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
Fig. 1 is a flowchart of an embodiment of a password setting method of the present invention, and as shown in fig. 1, the password setting method of the present embodiment may specifically include the following steps:
100. acquiring first scene information and first time information of an intelligent terminal;
for example, in this embodiment, the first scene information may include first image information of a specified object in a scene where the intelligent terminal is currently located and current position information of the intelligent terminal when the first image information is acquired. The designated object can be an article carried by a user, an article placed in current position information, a picture and the like, and the user can acquire first scene information and first time information by adopting hardware equipment arranged on the intelligent terminal. In this embodiment, a camera on the intelligent terminal may be used to obtain first image information of the specified object, and a positioning module on the intelligent terminal is used to obtain current location information of the intelligent terminal, where the current location information may be an accurate longitude and latitude value or a longitude and latitude range value, and the embodiment is preferably a longitude and latitude range value. The first time information may be acquired by using a clock module of the intelligent terminal, wherein in order to effectively avoid the problem that the local time of the intelligent terminal is inaccurate, the first time information acquired in this embodiment is preferably the network time corresponding to the clock module.
It should be noted that, in this embodiment, if the hardware device set in the intelligent terminal does not satisfy the requirement of obtaining the first scene information and the first time information by itself, other intelligent terminals may be used to obtain the first scene information and the first time information of the intelligent terminal.
101. And processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
After the first scene information and the first time information are obtained, the first image information, the current position information and the first time information can be analyzed, calculated and the like based on a preset algorithm, so that a unique identification code is obtained and used as a decryption password of the intelligent terminal. Because the decryption password contains image information, position information and time information, the decryption password is more complex to obtain and has higher safety.
In this embodiment, the obtained decryption password may be sent to the cloud, so that the cloud stores the decryption password; or storing the decryption password locally in the intelligent terminal. When the user needs to unlock the intelligent terminal, corresponding image information, position information and time information also need to be acquired, a corresponding verification password is acquired, whether the decryption password is matched with the verification password is verified through the cloud or the intelligent terminal, and when the verification password is matched with the decryption password, the intelligent terminal is controlled to unlock.
According to the password setting method, first scene information and first time information of the intelligent terminal are obtained; the first scene information and the first time information are processed to obtain the decryption password of the intelligent terminal, so that a user does not remember the decryption password any more, and the intelligent terminal is more convenient and quicker to unlock.
Fig. 2 is a flowchart of a first embodiment of a password verification method according to the present invention, and as shown in fig. 2, the password verification method of the present embodiment may specifically include the following steps:
200. acquiring second scene information and second time information of the intelligent terminal;
for example, the second scene information includes: and second image information of the specified object in the scene where the intelligent terminal is located currently and current position information of the intelligent terminal. The second time information includes current network time information.
In this embodiment, a hardware device disposed on the intelligent terminal may also be used to collect the second scene information and the second time information of the intelligent terminal, and the implementation principle of step 100 in the above embodiment is the same, and please refer to the above related records in detail, which is not described herein again.
201. Processing the second scene information and the second time information to obtain an authentication password of the intelligent terminal;
the implementation principle in this embodiment is the same as that in step 101 in the above embodiment, and please refer to the above related description for details, which is not repeated herein.
202. And if the verification password is matched with the preset decryption password, controlling the intelligent terminal to unlock.
After the verification password is obtained, the intelligent terminal can verify the verification password and a preset decryption password, for example, the verification password and the decryption password locally stored by the intelligent terminal are verified to obtain a verification result; and when the verification result is that the verification password is matched with the decryption password, controlling the intelligent terminal to unlock. The verification password and the preset decryption password can also be verified by the cloud, for example, the verification password is sent to the cloud, so that the cloud verifies the verification password and the decryption password stored by the cloud, and a verification result is obtained; and receiving a verification result sent by the cloud, and controlling the intelligent terminal to unlock when the verification result is that the verification password is matched with the decryption password.
Specifically, it may be detected whether the second scene information matches the first scene information; detecting whether the second time information is greater than the first time information; and if the second scene information is matched with the first scene information and the second time information is greater than the first time information, determining that the verification password is matched with the decryption password. In this embodiment, it may be detected whether the second image information matches the first image information, and if the second image information does not match the first image information, it may be determined that the verification password does not match the decryption password, and subsequent detection is not required. If the second image information is matched with the first image information, whether the current position information of the intelligent terminal is matched with the geographical position information of the intelligent terminal when the password is set is detected, if the current position information of the intelligent terminal is not matched with the geographical position information of the intelligent terminal when the password is set, the verification password is determined not to be matched with the decryption password, subsequent detection is not needed, if the current position information of the intelligent terminal is matched with the geographical position information of the intelligent terminal when the password is set, whether the second time information is larger than the first time information is detected, and if the second time information is larger than the first time information, the verification password can be determined to be matched with the decryption password. If the second time information is less than or equal to the first time information, it may be determined that the authentication password does not match the decryption password.
It should be noted that, in this embodiment, the second time information is greater than the first time information and is only a case of the current embodiment, which may be specifically set according to an actual requirement of a user, and this embodiment is not particularly limited.
In practical application, when the intelligent terminal can control self unlocking, other terminals can also be controlled to unlock. For example, the intelligent terminal can control self unlocking after being verified by the method in a screen locking state. For another example, for the access control device, after determining that the verification password matches the decryption password, the intelligent terminal may send an unlocking instruction to the access control device by using the terminal, so as to unlock the access control device.
In the embodiment, the function that the user unlocks a certain decryption password at a specific time and an accurate geographic position can be met. For example, for a financial software in the intelligent terminal, the user can unlock the financial software only when the user is at home, but can not unlock the financial software at a position outside the home, so that the property safety of the user can be guaranteed,
in the password verification method of the embodiment, second scene information and second time information of the intelligent terminal are obtained; processing the second scene information and the second time information to obtain an authentication password of the intelligent terminal; if the verification password is matched with the preset decryption password, the intelligent terminal is controlled to unlock, so that the user does not remember the decryption password any more, and the intelligent terminal is controlled to unlock more conveniently and quickly.
Fig. 3 is a flowchart of a second embodiment of the password verification method of the present invention, and as shown in fig. 3, the password verification method of this embodiment may specifically include the following steps:
300. receiving an authentication password sent by an intelligent terminal;
the verification password is obtained by the intelligent terminal according to the second scene information and the second time information; the decryption password is obtained after processing according to the first scene information and the first time information.
301. Verifying the verification password and a preset decryption password to obtain a verification result;
for example, it may be detected whether the second scene information matches the first scene information; detecting whether the second time information is greater than the first time information; and if the second scene information is matched with the first scene information and the second time information is greater than the first time information, determining that the verification password is matched with the decryption password.
302. And sending the verification result to the intelligent terminal.
And after the intelligent terminal receives the verification result, controlling the intelligent terminal to unlock when the verification result is determined to be that the verification password is matched with the decryption password.
The difference between the password authentication method of the present embodiment and the password authentication method of the embodiment shown in fig. 2 is that: the embodiment shown in fig. 2 above describes the technical solution of the present invention on the side of the intelligent terminal; in the embodiment, the technical scheme of the invention is described on the cloud side, and the specific implementation manner is the same. Therefore, reference may be made to the above description of the embodiment shown in fig. 2 for details, which are not repeated herein.
It should be noted that, in this embodiment, because the user needs to control the unlocking of the intelligent terminal under a special condition, but the geographic location of the user cannot match the verification password with the decryption password, in order to ensure that the unlocking of the intelligent terminal can be controlled, in this embodiment, authorization information of the user, such as a fingerprint, a face image, and the like, may be stored in advance, and the user may input relevant identity information and compare the identity information with the authorization information, and if the two are consistent, it may be determined that the user needs to control the unlocking of the functional terminal, at this time, the user may perform an authorization operation on the current geographic location information, so that when it is detected whether the current geographic location information matches the preset geographic location information, an obtained result is that the current geographic location information matches the preset geographic location information, and thus the unlocking of the control terminal may be achieved.
Fig. 4 is a schematic structural diagram of an embodiment of a password setting apparatus according to the present invention, and as shown in fig. 4, the password setting apparatus of the present embodiment includes a first obtaining module 10 and a first processing module 11;
the first obtaining module 10 is configured to obtain first scene information and first time information of the intelligent terminal;
and the first processing module 11 is configured to process the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
The password setting device of the embodiment acquires first scene information and first time information of the intelligent terminal; the first scene information and the first time information are processed to obtain the decryption password of the intelligent terminal, so that a user does not remember the decryption password any more, and the intelligent terminal is more convenient and quicker to unlock.
Further, in the above embodiment, the setting apparatus of the password further includes a first sending module or a storage module; the first sending module is used for sending the decryption password to the cloud end so that the cloud end can store the decryption password; and the storage module is used for storing the decryption password locally in the intelligent terminal.
Fig. 5 is a schematic structural diagram of a first embodiment of the password authentication device of the present invention, and as shown in fig. 5, the password authentication device of the present embodiment includes a second obtaining module 20, a second processing module 21 and a control module 22;
the second obtaining module 20 is configured to obtain second scene information and second time information of the intelligent terminal;
for example, the second scene information and the second time information of the intelligent terminal may be collected by using a hardware device provided on the intelligent terminal.
The second processing module 21 is configured to process the second scene information and the second time information to obtain an authentication password of the intelligent terminal;
and the control module 22 is used for controlling the intelligent terminal to unlock if the verification password is matched with the preset decryption password.
The decryption password is obtained by processing according to the first context information and the first time information, for example, the second context information includes: second image information of a specified object in the scene where the intelligent terminal is located currently and current position information of the intelligent terminal; the first scene information includes: when the intelligent terminal sets the decryption password, the first image information of the object and the position information of the intelligent terminal are specified. The second time information includes: current network time information, the first time information comprising: and the intelligent terminal sets the network time information when the decryption password is set.
In this embodiment, the control module can send the verification password to the cloud terminal, so that the cloud terminal verifies the verification password and the decryption password stored in the cloud terminal, and obtains a verification result; and receiving a verification result sent by the cloud, and controlling the intelligent terminal to unlock when the verification result is that the verification password is matched with the decryption password. Alternatively, the control module 22 may also verify the verification password and the decryption password locally stored in the intelligent terminal to obtain a verification result; for example, it is detected whether the second scene information matches the first scene information; detecting whether the second time information is greater than the first time information; and if the second scene information is matched with the first scene information and the second time information is greater than the first time information, determining that the verification password is matched with the decryption password. And when the verification result is that the verification password is matched with the decryption password, controlling the intelligent terminal to unlock.
The password verification device of the embodiment obtains second scene information and second time information of the intelligent terminal; processing the second scene information and the second time information to obtain an authentication password of the intelligent terminal; if the verification password is matched with the preset decryption password, the intelligent terminal is controlled to unlock, so that the user does not remember the decryption password any more, and the intelligent terminal is controlled to unlock more conveniently and quickly.
Fig. 6 is a schematic structural diagram of a second embodiment of the password authentication device of the present invention, and as shown in fig. 6, the password authentication device of the present embodiment includes a receiving module 30, an authentication module 31, and a second sending module 32.
The receiving module 30 is configured to receive an authentication password sent by the intelligent terminal, where the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
the verification module 31 is configured to verify the verification password and a preset decryption password to obtain a verification result;
the second sending module 32 is configured to send the verification result to the intelligent terminal, so that the intelligent terminal is controlled to unlock when the verification result is that the verification password matches the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The invention also provides an intelligent terminal for setting the password, which comprises a first processor and a first memory;
the first processor is connected with the first memory;
the first memory is used for storing a computer program, and the computer program is at least used for storing the password setting method of the embodiment;
and the first processor is used for calling and executing the computer program.
The invention also provides an intelligent terminal for verifying the password, which comprises a second processor and a second memory;
the second processor is connected with the second memory;
the second memory is used for storing a computer program for storing at least a method for authenticating a password according to the embodiment of fig. 2 as described above;
and the second processor is used for calling and executing the computer program.
The invention also provides a server, which comprises a third processor and a third memory;
the third memory is used for storing a computer program, and the computer program is at least used for storing the password authentication method of the embodiment shown in the figure 3;
and the third processor is used for calling and executing the computer program.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (18)
1. A password setting method is characterized by comprising the following steps:
acquiring first scene information and first time information of an intelligent terminal;
and processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
2. The method of claim 1, further comprising:
sending the decryption password to a cloud end so that the cloud end stores the decryption password; or,
and storing the decryption password locally in the intelligent terminal.
3. A method for authenticating a password, comprising:
acquiring second scene information and second time information of the intelligent terminal;
processing the second scene information and the second time information to obtain a verification password of the intelligent terminal;
and if the verification password is matched with a preset decryption password, controlling the intelligent terminal to unlock, wherein the decryption password is obtained after processing according to the first scene information and the first time information.
4. The method of claim 3, wherein the second scene information comprises: second image information of a specified object in the scene where the intelligent terminal is located currently and current position information of the intelligent terminal; the first scene information includes: and when the intelligent terminal sets a decryption password, the first image information of the specified object and the position information of the intelligent terminal.
5. The method of claim 3, wherein the second time information comprises: current network time information, the first time information comprising: and the intelligent terminal sets the network time information when the decryption password is set.
6. The method according to any one of claims 3 to 5, wherein the obtaining of the second scene information and the second time information of the intelligent terminal comprises:
and acquiring second scene information and second time information of the intelligent terminal by adopting hardware equipment arranged on the intelligent terminal.
7. The method according to any one of claims 3 to 5, wherein the controlling the intelligent terminal to unlock if the verification password matches a preset decryption password comprises:
sending the verification password to a cloud end so that the cloud end verifies the verification password and the decryption password stored by the cloud end and obtains a verification result;
and receiving a verification result sent by the cloud, and controlling the intelligent terminal to unlock when the verification result is that the verification password is matched with the decryption password.
8. The method according to any one of claims 3 to 5, wherein the controlling the intelligent terminal to unlock if the verification password matches a preset decryption password comprises:
verifying the verification password and the decryption password locally stored in the intelligent terminal to obtain a verification result;
and controlling the intelligent terminal to unlock when the verification result is that the verification password is matched with the decryption password.
9. The method according to claim 8, wherein the verifying the verification password and the decryption password stored locally by the smart terminal comprises:
detecting whether the second scene information is matched with the first scene information;
detecting whether the second time information is greater than the first time information;
and if the second scene information is matched with the first scene information and the second time information is larger than the first time information, determining that the verification password is matched with the decryption password.
10. A method for authenticating a password, comprising:
receiving an authentication password sent by the intelligent terminal, wherein the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
verifying the verification password and a preset decryption password to obtain a verification result;
sending the verification result to an intelligent terminal so that the intelligent terminal is controlled to unlock when the verification result is that the verification password is matched with the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
11. The method according to claim 10, wherein the verifying the verification password with the preset decryption password to obtain a verification result comprises:
detecting whether the second scene information is matched with the first scene information;
detecting whether the second time information is greater than the first time information;
and if the second scene information is matched with the first scene information and the second time information is larger than the first time information, determining that the verification password is matched with the decryption password.
12. A password setting apparatus, comprising:
the first acquisition module is used for acquiring first scene information and first time information of the intelligent terminal;
and the first processing module is used for processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
13. The apparatus of claim 12, further comprising a first sending module or a storage module;
the first sending module is used for sending the decryption password to a cloud end so that the cloud end stores the decryption password;
and the storage module is used for storing the decryption password locally in the intelligent terminal.
14. An apparatus for authenticating a password, comprising:
the second acquisition module is used for acquiring second scene information and second time information of the intelligent terminal;
the second processing module is used for processing the second scene information and the second time information to obtain a verification password of the intelligent terminal;
and the control module is used for controlling the intelligent terminal to unlock if the verification password is matched with a preset decryption password, wherein the decryption password is obtained after processing according to the first scene information and the first time information.
15. An apparatus for authenticating a password, comprising:
the receiving module is used for receiving an authentication password sent by the intelligent terminal, wherein the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
the verification module is used for verifying the verification password and a preset decryption password to obtain a verification result;
the second sending module is used for sending the verification result to the intelligent terminal so that the intelligent terminal can be controlled to unlock when the verification result is that the verification password is matched with the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
16. An intelligent terminal for setting a password is characterized by comprising a first processor and a first memory;
the first processor is connected with the first memory;
the first memory is used for storing a computer program for storing at least a setting method of a password of claim 1 or 2;
the first processor is used for calling and executing the computer program.
17. An intelligent terminal for verifying a password, comprising a second processor and a second memory;
the second processor is connected with the second memory;
the second memory is for storing a computer program for storing at least a method of authenticating a password as claimed in any one of claims 3 to 9;
the second processor is used for calling and executing the computer program.
18. A server comprising a third processor and a third memory;
the third memory is used for storing a computer program for storing at least a password authentication method of claim 10 or 11;
and the third processor is used for calling and executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811059662.0A CN110891045A (en) | 2018-09-11 | 2018-09-11 | Password setting method, password verification method and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811059662.0A CN110891045A (en) | 2018-09-11 | 2018-09-11 | Password setting method, password verification method and related equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110891045A true CN110891045A (en) | 2020-03-17 |
Family
ID=69745683
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811059662.0A Pending CN110891045A (en) | 2018-09-11 | 2018-09-11 | Password setting method, password verification method and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110891045A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110121174A (en) * | 2019-05-16 | 2019-08-13 | 徐国愚 | A kind of implicit identity identifying method of mobile intelligent terminal |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202059427U (en) * | 2011-03-23 | 2011-11-30 | 北京恒光数码科技有限公司 | Dynamic cipher token apparatus and system |
CN103745144A (en) * | 2014-01-08 | 2014-04-23 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and terminal unlocking method |
CN104023315A (en) * | 2014-06-20 | 2014-09-03 | 中科创达软件股份有限公司 | Password input method and device based on geographical location information |
CN104320256A (en) * | 2014-10-20 | 2015-01-28 | 厦门美图移动科技有限公司 | Method for achieving fingerprint universal password verification |
CN105323294A (en) * | 2014-08-20 | 2016-02-10 | 广东小天才科技有限公司 | Authority control method and device of intelligent terminal |
CN106570694A (en) * | 2016-10-28 | 2017-04-19 | 努比亚技术有限公司 | Server, mobile terminal and mobile payment method |
CN106611111A (en) * | 2016-12-12 | 2017-05-03 | 珠海市魅族科技有限公司 | Use control method and apparatus for terminal equipment |
CN106934264A (en) * | 2015-12-31 | 2017-07-07 | 深圳先进技术研究院 | A kind of intelligent unlocking method, device and lock device |
US20170318019A1 (en) * | 2016-04-29 | 2017-11-02 | John C. Gordon | Gaze-based authentication |
-
2018
- 2018-09-11 CN CN201811059662.0A patent/CN110891045A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202059427U (en) * | 2011-03-23 | 2011-11-30 | 北京恒光数码科技有限公司 | Dynamic cipher token apparatus and system |
CN103745144A (en) * | 2014-01-08 | 2014-04-23 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and terminal unlocking method |
CN104023315A (en) * | 2014-06-20 | 2014-09-03 | 中科创达软件股份有限公司 | Password input method and device based on geographical location information |
CN105323294A (en) * | 2014-08-20 | 2016-02-10 | 广东小天才科技有限公司 | Authority control method and device of intelligent terminal |
CN104320256A (en) * | 2014-10-20 | 2015-01-28 | 厦门美图移动科技有限公司 | Method for achieving fingerprint universal password verification |
CN106934264A (en) * | 2015-12-31 | 2017-07-07 | 深圳先进技术研究院 | A kind of intelligent unlocking method, device and lock device |
US20170318019A1 (en) * | 2016-04-29 | 2017-11-02 | John C. Gordon | Gaze-based authentication |
CN106570694A (en) * | 2016-10-28 | 2017-04-19 | 努比亚技术有限公司 | Server, mobile terminal and mobile payment method |
CN106611111A (en) * | 2016-12-12 | 2017-05-03 | 珠海市魅族科技有限公司 | Use control method and apparatus for terminal equipment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110121174A (en) * | 2019-05-16 | 2019-08-13 | 徐国愚 | A kind of implicit identity identifying method of mobile intelligent terminal |
CN110121174B (en) * | 2019-05-16 | 2022-04-15 | 徐国愚 | Implicit identity authentication method of mobile intelligent terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11038879B2 (en) | Identity authentication method and apparatus, and user equipment | |
US10515203B2 (en) | Method and system for improving security of a mobile terminal | |
US8955069B1 (en) | Event-based biometric authentication using mobile device | |
EP3516569B1 (en) | Passive availability testing | |
US11263846B2 (en) | Authentication method and user equipment | |
US20150358317A1 (en) | Behavioral Authentication System using a biometric fingerprint sensor and User Behavior for Authentication | |
CN113272805A (en) | Proximity-based unlocking of a common computing device | |
CN107230066B (en) | Payment method and device, computer device and readable storage medium | |
WO2017031850A1 (en) | User identity authentication method, device, system and smart home | |
US9792421B1 (en) | Secure storage of fingerprint related elements | |
CN107145772B (en) | Terminal equipment security control method and device and terminal equipment | |
CN108322507A (en) | A kind of method and system executing safety operation using safety equipment | |
CN107358763A (en) | A kind of method, apparatus and system of ATM checking identity | |
CN107231338B (en) | Network connection method, device and device for network connection | |
US10922514B2 (en) | Electronic apparatus | |
CN110891045A (en) | Password setting method, password verification method and related equipment | |
CN116777441A (en) | Information verification method, device, equipment and computer readable storage medium | |
EP3236377B1 (en) | Method, device and system for preventing account from being broken into | |
JP6441544B2 (en) | Information device operation system, information device operation method, and program | |
WO2019108576A1 (en) | System and method for issuing a certificate to permit access to information | |
CN105701392B (en) | Information processing method and electronic equipment | |
CN111681348A (en) | Access control authentication method and device | |
WO2017012216A1 (en) | Login processing method and apparatus, and terminal | |
CN111179469A (en) | Voice prompt method and intelligent door lock | |
US20180075227A1 (en) | Systems and methods for surveillance of user access to a security critical resource |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200317 |