CN110891045A - Password setting method, password verification method and related equipment - Google Patents

Password setting method, password verification method and related equipment Download PDF

Info

Publication number
CN110891045A
CN110891045A CN201811059662.0A CN201811059662A CN110891045A CN 110891045 A CN110891045 A CN 110891045A CN 201811059662 A CN201811059662 A CN 201811059662A CN 110891045 A CN110891045 A CN 110891045A
Authority
CN
China
Prior art keywords
password
intelligent terminal
time information
verification
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811059662.0A
Other languages
Chinese (zh)
Inventor
王伟
杨扬
梁博
唐晓晖
向彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201811059662.0A priority Critical patent/CN110891045A/en
Publication of CN110891045A publication Critical patent/CN110891045A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a password setting method, a password verification method and related equipment, wherein the password setting method comprises the steps of obtaining first scene information and first time information of an intelligent terminal; the first scene information and the first time information are processed to obtain the decryption password of the intelligent terminal, so that a user does not remember the decryption password any more, and the intelligent terminal is more convenient and quicker to unlock.

Description

Password setting method, password verification method and related equipment
Technical Field
The invention relates to the technical field of network security, in particular to a password setting method, a password verification method and related equipment.
Background
With the increasing awareness of the network security of users, the application scenarios of passwords are increasing, such as terminal passwords, access passwords, bank passwords, mobile phone passwords, application passwords, and the like.
In the prior art, if the complexity of the password is ensured to be high, the user can hardly remember the password, and the user is troublesome to forget the password; if the password complexity is not high, although the user can easily remember the password, the password is easy to crack and is very insecure. This causes a technical problem that it is difficult to compromise between the convenience of password use and the security of the password.
Therefore, how to implement the set password is convenient for the user to remember and use on the premise of higher security, which is a technical problem that needs to be solved urgently by technical personnel in the field.
Disclosure of Invention
In view of this, the present invention provides a method for setting a secret password, a method for verifying the secret password, and a related device, so as to facilitate the user to memorize and use the set secret password on the premise of higher security.
In order to achieve the above object, the present invention provides a password setting method, including:
acquiring first scene information and first time information of an intelligent terminal;
and processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
The invention also provides a password verification method, which comprises the following steps:
acquiring second scene information and second time information of the intelligent terminal;
processing the second scene information and the second time information to obtain a verification password of the intelligent terminal;
and if the verification password is matched with a preset decryption password, controlling the intelligent terminal to unlock, wherein the decryption password is obtained after processing according to the first scene information and the first time information.
The invention also provides a password verification method, which comprises the following steps:
receiving an authentication password sent by the intelligent terminal, wherein the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
verifying the verification password and a preset decryption password to obtain a verification result;
sending the verification result to an intelligent terminal so that the intelligent terminal is controlled to unlock when the verification result is that the verification password is matched with the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
The invention also provides a password setting device, comprising:
the first acquisition module is used for acquiring first scene information and first time information of the intelligent terminal;
and the first processing module is used for processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
The invention also provides a password verification device, which comprises:
the second acquisition module is used for acquiring second scene information and second time information of the intelligent terminal;
the second processing module is used for processing the second scene information and the second time information to obtain a verification password of the intelligent terminal;
and the control module is used for controlling the intelligent terminal to unlock if the verification password is matched with a preset decryption password, wherein the decryption password is obtained after processing according to the first scene information and the first time information.
The invention also provides a password verification device, which comprises:
the receiving module is used for receiving an authentication password sent by the intelligent terminal, wherein the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
the verification module is used for verifying the verification password and a preset decryption password to obtain a verification result;
the second sending module is used for sending the verification result to the intelligent terminal so that the intelligent terminal can be controlled to unlock when the verification result is that the verification password is matched with the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
The invention also provides an intelligent terminal for setting the password, which comprises a first processor and a first memory;
the first processor is connected with the first memory;
the first memory is used for storing a computer program at least for storing the password setting method of the above claim;
the first processor is used for calling and executing the computer program.
The invention also provides an intelligent terminal for verifying the password, which comprises a second processor and a second memory;
the second processor is connected with the second memory;
the second memory is used for storing a computer program, and the computer program is at least used for storing the password authentication method;
the second processor is used for calling and executing the computer program.
The invention also provides a server, which comprises a third processor and a third memory;
the third memory is used for storing a computer program, and the computer program is at least used for storing the password authentication method;
and the third processor is used for calling and executing the computer program.
According to the password setting method, the password setting device and the intelligent terminal, the first scene information and the first time information of the intelligent terminal are obtained; the first scene information and the first time information are processed to obtain the decryption password of the intelligent terminal, so that a user does not remember the decryption password any more, and the intelligent terminal is more convenient and quicker to unlock.
According to the password verification method, the password verification device and the intelligent terminal, second scene information and second time information of the intelligent terminal are obtained; processing the second scene information and the second time information to obtain an authentication password of the intelligent terminal; if the verification password is matched with the preset decryption password, the intelligent terminal is controlled to unlock, so that the user does not remember the decryption password any more, and the intelligent terminal is controlled to unlock more conveniently and quickly.
According to the password authentication method, the password authentication device and the server, the authentication password sent by the intelligent terminal is received, the authentication password and the preset decryption password are authenticated to obtain the authentication result, and the authentication result is sent to the intelligent terminal so that the intelligent terminal is controlled to unlock when the authentication result is that the authentication password is matched with the decryption password; the technical scheme of the invention can ensure that the password is convenient for the user to memorize and use on the premise of higher safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of an embodiment of a password setting method of the present invention;
FIG. 2 is a flowchart of a first embodiment of a method for verifying a password according to the present invention;
FIG. 3 is a flowchart of a second embodiment of a method for verifying a password of the present invention;
FIG. 4 is a schematic structural diagram of an embodiment of a password setting apparatus according to the present invention;
FIG. 5 is a schematic structural diagram of a first embodiment of a password authentication apparatus according to the present invention;
fig. 6 is a schematic structural diagram of a second embodiment of the password authentication device of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
Fig. 1 is a flowchart of an embodiment of a password setting method of the present invention, and as shown in fig. 1, the password setting method of the present embodiment may specifically include the following steps:
100. acquiring first scene information and first time information of an intelligent terminal;
for example, in this embodiment, the first scene information may include first image information of a specified object in a scene where the intelligent terminal is currently located and current position information of the intelligent terminal when the first image information is acquired. The designated object can be an article carried by a user, an article placed in current position information, a picture and the like, and the user can acquire first scene information and first time information by adopting hardware equipment arranged on the intelligent terminal. In this embodiment, a camera on the intelligent terminal may be used to obtain first image information of the specified object, and a positioning module on the intelligent terminal is used to obtain current location information of the intelligent terminal, where the current location information may be an accurate longitude and latitude value or a longitude and latitude range value, and the embodiment is preferably a longitude and latitude range value. The first time information may be acquired by using a clock module of the intelligent terminal, wherein in order to effectively avoid the problem that the local time of the intelligent terminal is inaccurate, the first time information acquired in this embodiment is preferably the network time corresponding to the clock module.
It should be noted that, in this embodiment, if the hardware device set in the intelligent terminal does not satisfy the requirement of obtaining the first scene information and the first time information by itself, other intelligent terminals may be used to obtain the first scene information and the first time information of the intelligent terminal.
101. And processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
After the first scene information and the first time information are obtained, the first image information, the current position information and the first time information can be analyzed, calculated and the like based on a preset algorithm, so that a unique identification code is obtained and used as a decryption password of the intelligent terminal. Because the decryption password contains image information, position information and time information, the decryption password is more complex to obtain and has higher safety.
In this embodiment, the obtained decryption password may be sent to the cloud, so that the cloud stores the decryption password; or storing the decryption password locally in the intelligent terminal. When the user needs to unlock the intelligent terminal, corresponding image information, position information and time information also need to be acquired, a corresponding verification password is acquired, whether the decryption password is matched with the verification password is verified through the cloud or the intelligent terminal, and when the verification password is matched with the decryption password, the intelligent terminal is controlled to unlock.
According to the password setting method, first scene information and first time information of the intelligent terminal are obtained; the first scene information and the first time information are processed to obtain the decryption password of the intelligent terminal, so that a user does not remember the decryption password any more, and the intelligent terminal is more convenient and quicker to unlock.
Fig. 2 is a flowchart of a first embodiment of a password verification method according to the present invention, and as shown in fig. 2, the password verification method of the present embodiment may specifically include the following steps:
200. acquiring second scene information and second time information of the intelligent terminal;
for example, the second scene information includes: and second image information of the specified object in the scene where the intelligent terminal is located currently and current position information of the intelligent terminal. The second time information includes current network time information.
In this embodiment, a hardware device disposed on the intelligent terminal may also be used to collect the second scene information and the second time information of the intelligent terminal, and the implementation principle of step 100 in the above embodiment is the same, and please refer to the above related records in detail, which is not described herein again.
201. Processing the second scene information and the second time information to obtain an authentication password of the intelligent terminal;
the implementation principle in this embodiment is the same as that in step 101 in the above embodiment, and please refer to the above related description for details, which is not repeated herein.
202. And if the verification password is matched with the preset decryption password, controlling the intelligent terminal to unlock.
After the verification password is obtained, the intelligent terminal can verify the verification password and a preset decryption password, for example, the verification password and the decryption password locally stored by the intelligent terminal are verified to obtain a verification result; and when the verification result is that the verification password is matched with the decryption password, controlling the intelligent terminal to unlock. The verification password and the preset decryption password can also be verified by the cloud, for example, the verification password is sent to the cloud, so that the cloud verifies the verification password and the decryption password stored by the cloud, and a verification result is obtained; and receiving a verification result sent by the cloud, and controlling the intelligent terminal to unlock when the verification result is that the verification password is matched with the decryption password.
Specifically, it may be detected whether the second scene information matches the first scene information; detecting whether the second time information is greater than the first time information; and if the second scene information is matched with the first scene information and the second time information is greater than the first time information, determining that the verification password is matched with the decryption password. In this embodiment, it may be detected whether the second image information matches the first image information, and if the second image information does not match the first image information, it may be determined that the verification password does not match the decryption password, and subsequent detection is not required. If the second image information is matched with the first image information, whether the current position information of the intelligent terminal is matched with the geographical position information of the intelligent terminal when the password is set is detected, if the current position information of the intelligent terminal is not matched with the geographical position information of the intelligent terminal when the password is set, the verification password is determined not to be matched with the decryption password, subsequent detection is not needed, if the current position information of the intelligent terminal is matched with the geographical position information of the intelligent terminal when the password is set, whether the second time information is larger than the first time information is detected, and if the second time information is larger than the first time information, the verification password can be determined to be matched with the decryption password. If the second time information is less than or equal to the first time information, it may be determined that the authentication password does not match the decryption password.
It should be noted that, in this embodiment, the second time information is greater than the first time information and is only a case of the current embodiment, which may be specifically set according to an actual requirement of a user, and this embodiment is not particularly limited.
In practical application, when the intelligent terminal can control self unlocking, other terminals can also be controlled to unlock. For example, the intelligent terminal can control self unlocking after being verified by the method in a screen locking state. For another example, for the access control device, after determining that the verification password matches the decryption password, the intelligent terminal may send an unlocking instruction to the access control device by using the terminal, so as to unlock the access control device.
In the embodiment, the function that the user unlocks a certain decryption password at a specific time and an accurate geographic position can be met. For example, for a financial software in the intelligent terminal, the user can unlock the financial software only when the user is at home, but can not unlock the financial software at a position outside the home, so that the property safety of the user can be guaranteed,
in the password verification method of the embodiment, second scene information and second time information of the intelligent terminal are obtained; processing the second scene information and the second time information to obtain an authentication password of the intelligent terminal; if the verification password is matched with the preset decryption password, the intelligent terminal is controlled to unlock, so that the user does not remember the decryption password any more, and the intelligent terminal is controlled to unlock more conveniently and quickly.
Fig. 3 is a flowchart of a second embodiment of the password verification method of the present invention, and as shown in fig. 3, the password verification method of this embodiment may specifically include the following steps:
300. receiving an authentication password sent by an intelligent terminal;
the verification password is obtained by the intelligent terminal according to the second scene information and the second time information; the decryption password is obtained after processing according to the first scene information and the first time information.
301. Verifying the verification password and a preset decryption password to obtain a verification result;
for example, it may be detected whether the second scene information matches the first scene information; detecting whether the second time information is greater than the first time information; and if the second scene information is matched with the first scene information and the second time information is greater than the first time information, determining that the verification password is matched with the decryption password.
302. And sending the verification result to the intelligent terminal.
And after the intelligent terminal receives the verification result, controlling the intelligent terminal to unlock when the verification result is determined to be that the verification password is matched with the decryption password.
The difference between the password authentication method of the present embodiment and the password authentication method of the embodiment shown in fig. 2 is that: the embodiment shown in fig. 2 above describes the technical solution of the present invention on the side of the intelligent terminal; in the embodiment, the technical scheme of the invention is described on the cloud side, and the specific implementation manner is the same. Therefore, reference may be made to the above description of the embodiment shown in fig. 2 for details, which are not repeated herein.
It should be noted that, in this embodiment, because the user needs to control the unlocking of the intelligent terminal under a special condition, but the geographic location of the user cannot match the verification password with the decryption password, in order to ensure that the unlocking of the intelligent terminal can be controlled, in this embodiment, authorization information of the user, such as a fingerprint, a face image, and the like, may be stored in advance, and the user may input relevant identity information and compare the identity information with the authorization information, and if the two are consistent, it may be determined that the user needs to control the unlocking of the functional terminal, at this time, the user may perform an authorization operation on the current geographic location information, so that when it is detected whether the current geographic location information matches the preset geographic location information, an obtained result is that the current geographic location information matches the preset geographic location information, and thus the unlocking of the control terminal may be achieved.
Fig. 4 is a schematic structural diagram of an embodiment of a password setting apparatus according to the present invention, and as shown in fig. 4, the password setting apparatus of the present embodiment includes a first obtaining module 10 and a first processing module 11;
the first obtaining module 10 is configured to obtain first scene information and first time information of the intelligent terminal;
and the first processing module 11 is configured to process the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
The password setting device of the embodiment acquires first scene information and first time information of the intelligent terminal; the first scene information and the first time information are processed to obtain the decryption password of the intelligent terminal, so that a user does not remember the decryption password any more, and the intelligent terminal is more convenient and quicker to unlock.
Further, in the above embodiment, the setting apparatus of the password further includes a first sending module or a storage module; the first sending module is used for sending the decryption password to the cloud end so that the cloud end can store the decryption password; and the storage module is used for storing the decryption password locally in the intelligent terminal.
Fig. 5 is a schematic structural diagram of a first embodiment of the password authentication device of the present invention, and as shown in fig. 5, the password authentication device of the present embodiment includes a second obtaining module 20, a second processing module 21 and a control module 22;
the second obtaining module 20 is configured to obtain second scene information and second time information of the intelligent terminal;
for example, the second scene information and the second time information of the intelligent terminal may be collected by using a hardware device provided on the intelligent terminal.
The second processing module 21 is configured to process the second scene information and the second time information to obtain an authentication password of the intelligent terminal;
and the control module 22 is used for controlling the intelligent terminal to unlock if the verification password is matched with the preset decryption password.
The decryption password is obtained by processing according to the first context information and the first time information, for example, the second context information includes: second image information of a specified object in the scene where the intelligent terminal is located currently and current position information of the intelligent terminal; the first scene information includes: when the intelligent terminal sets the decryption password, the first image information of the object and the position information of the intelligent terminal are specified. The second time information includes: current network time information, the first time information comprising: and the intelligent terminal sets the network time information when the decryption password is set.
In this embodiment, the control module can send the verification password to the cloud terminal, so that the cloud terminal verifies the verification password and the decryption password stored in the cloud terminal, and obtains a verification result; and receiving a verification result sent by the cloud, and controlling the intelligent terminal to unlock when the verification result is that the verification password is matched with the decryption password. Alternatively, the control module 22 may also verify the verification password and the decryption password locally stored in the intelligent terminal to obtain a verification result; for example, it is detected whether the second scene information matches the first scene information; detecting whether the second time information is greater than the first time information; and if the second scene information is matched with the first scene information and the second time information is greater than the first time information, determining that the verification password is matched with the decryption password. And when the verification result is that the verification password is matched with the decryption password, controlling the intelligent terminal to unlock.
The password verification device of the embodiment obtains second scene information and second time information of the intelligent terminal; processing the second scene information and the second time information to obtain an authentication password of the intelligent terminal; if the verification password is matched with the preset decryption password, the intelligent terminal is controlled to unlock, so that the user does not remember the decryption password any more, and the intelligent terminal is controlled to unlock more conveniently and quickly.
Fig. 6 is a schematic structural diagram of a second embodiment of the password authentication device of the present invention, and as shown in fig. 6, the password authentication device of the present embodiment includes a receiving module 30, an authentication module 31, and a second sending module 32.
The receiving module 30 is configured to receive an authentication password sent by the intelligent terminal, where the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
the verification module 31 is configured to verify the verification password and a preset decryption password to obtain a verification result;
the second sending module 32 is configured to send the verification result to the intelligent terminal, so that the intelligent terminal is controlled to unlock when the verification result is that the verification password matches the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The invention also provides an intelligent terminal for setting the password, which comprises a first processor and a first memory;
the first processor is connected with the first memory;
the first memory is used for storing a computer program, and the computer program is at least used for storing the password setting method of the embodiment;
and the first processor is used for calling and executing the computer program.
The invention also provides an intelligent terminal for verifying the password, which comprises a second processor and a second memory;
the second processor is connected with the second memory;
the second memory is used for storing a computer program for storing at least a method for authenticating a password according to the embodiment of fig. 2 as described above;
and the second processor is used for calling and executing the computer program.
The invention also provides a server, which comprises a third processor and a third memory;
the third memory is used for storing a computer program, and the computer program is at least used for storing the password authentication method of the embodiment shown in the figure 3;
and the third processor is used for calling and executing the computer program.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (18)

1. A password setting method is characterized by comprising the following steps:
acquiring first scene information and first time information of an intelligent terminal;
and processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
2. The method of claim 1, further comprising:
sending the decryption password to a cloud end so that the cloud end stores the decryption password; or,
and storing the decryption password locally in the intelligent terminal.
3. A method for authenticating a password, comprising:
acquiring second scene information and second time information of the intelligent terminal;
processing the second scene information and the second time information to obtain a verification password of the intelligent terminal;
and if the verification password is matched with a preset decryption password, controlling the intelligent terminal to unlock, wherein the decryption password is obtained after processing according to the first scene information and the first time information.
4. The method of claim 3, wherein the second scene information comprises: second image information of a specified object in the scene where the intelligent terminal is located currently and current position information of the intelligent terminal; the first scene information includes: and when the intelligent terminal sets a decryption password, the first image information of the specified object and the position information of the intelligent terminal.
5. The method of claim 3, wherein the second time information comprises: current network time information, the first time information comprising: and the intelligent terminal sets the network time information when the decryption password is set.
6. The method according to any one of claims 3 to 5, wherein the obtaining of the second scene information and the second time information of the intelligent terminal comprises:
and acquiring second scene information and second time information of the intelligent terminal by adopting hardware equipment arranged on the intelligent terminal.
7. The method according to any one of claims 3 to 5, wherein the controlling the intelligent terminal to unlock if the verification password matches a preset decryption password comprises:
sending the verification password to a cloud end so that the cloud end verifies the verification password and the decryption password stored by the cloud end and obtains a verification result;
and receiving a verification result sent by the cloud, and controlling the intelligent terminal to unlock when the verification result is that the verification password is matched with the decryption password.
8. The method according to any one of claims 3 to 5, wherein the controlling the intelligent terminal to unlock if the verification password matches a preset decryption password comprises:
verifying the verification password and the decryption password locally stored in the intelligent terminal to obtain a verification result;
and controlling the intelligent terminal to unlock when the verification result is that the verification password is matched with the decryption password.
9. The method according to claim 8, wherein the verifying the verification password and the decryption password stored locally by the smart terminal comprises:
detecting whether the second scene information is matched with the first scene information;
detecting whether the second time information is greater than the first time information;
and if the second scene information is matched with the first scene information and the second time information is larger than the first time information, determining that the verification password is matched with the decryption password.
10. A method for authenticating a password, comprising:
receiving an authentication password sent by the intelligent terminal, wherein the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
verifying the verification password and a preset decryption password to obtain a verification result;
sending the verification result to an intelligent terminal so that the intelligent terminal is controlled to unlock when the verification result is that the verification password is matched with the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
11. The method according to claim 10, wherein the verifying the verification password with the preset decryption password to obtain a verification result comprises:
detecting whether the second scene information is matched with the first scene information;
detecting whether the second time information is greater than the first time information;
and if the second scene information is matched with the first scene information and the second time information is larger than the first time information, determining that the verification password is matched with the decryption password.
12. A password setting apparatus, comprising:
the first acquisition module is used for acquiring first scene information and first time information of the intelligent terminal;
and the first processing module is used for processing the first scene information and the first time information to obtain a decryption password of the intelligent terminal.
13. The apparatus of claim 12, further comprising a first sending module or a storage module;
the first sending module is used for sending the decryption password to a cloud end so that the cloud end stores the decryption password;
and the storage module is used for storing the decryption password locally in the intelligent terminal.
14. An apparatus for authenticating a password, comprising:
the second acquisition module is used for acquiring second scene information and second time information of the intelligent terminal;
the second processing module is used for processing the second scene information and the second time information to obtain a verification password of the intelligent terminal;
and the control module is used for controlling the intelligent terminal to unlock if the verification password is matched with a preset decryption password, wherein the decryption password is obtained after processing according to the first scene information and the first time information.
15. An apparatus for authenticating a password, comprising:
the receiving module is used for receiving an authentication password sent by the intelligent terminal, wherein the authentication password is obtained by the intelligent terminal according to the second scene information and the second time information;
the verification module is used for verifying the verification password and a preset decryption password to obtain a verification result;
the second sending module is used for sending the verification result to the intelligent terminal so that the intelligent terminal can be controlled to unlock when the verification result is that the verification password is matched with the decryption password;
and the decryption password is obtained after processing according to the first scene information and the first time information.
16. An intelligent terminal for setting a password is characterized by comprising a first processor and a first memory;
the first processor is connected with the first memory;
the first memory is used for storing a computer program for storing at least a setting method of a password of claim 1 or 2;
the first processor is used for calling and executing the computer program.
17. An intelligent terminal for verifying a password, comprising a second processor and a second memory;
the second processor is connected with the second memory;
the second memory is for storing a computer program for storing at least a method of authenticating a password as claimed in any one of claims 3 to 9;
the second processor is used for calling and executing the computer program.
18. A server comprising a third processor and a third memory;
the third memory is used for storing a computer program for storing at least a password authentication method of claim 10 or 11;
and the third processor is used for calling and executing the computer program.
CN201811059662.0A 2018-09-11 2018-09-11 Password setting method, password verification method and related equipment Pending CN110891045A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811059662.0A CN110891045A (en) 2018-09-11 2018-09-11 Password setting method, password verification method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811059662.0A CN110891045A (en) 2018-09-11 2018-09-11 Password setting method, password verification method and related equipment

Publications (1)

Publication Number Publication Date
CN110891045A true CN110891045A (en) 2020-03-17

Family

ID=69745683

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811059662.0A Pending CN110891045A (en) 2018-09-11 2018-09-11 Password setting method, password verification method and related equipment

Country Status (1)

Country Link
CN (1) CN110891045A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110121174A (en) * 2019-05-16 2019-08-13 徐国愚 A kind of implicit identity identifying method of mobile intelligent terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202059427U (en) * 2011-03-23 2011-11-30 北京恒光数码科技有限公司 Dynamic cipher token apparatus and system
CN103745144A (en) * 2014-01-08 2014-04-23 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal unlocking method
CN104023315A (en) * 2014-06-20 2014-09-03 中科创达软件股份有限公司 Password input method and device based on geographical location information
CN104320256A (en) * 2014-10-20 2015-01-28 厦门美图移动科技有限公司 Method for achieving fingerprint universal password verification
CN105323294A (en) * 2014-08-20 2016-02-10 广东小天才科技有限公司 Authority control method and device of intelligent terminal
CN106570694A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 Server, mobile terminal and mobile payment method
CN106611111A (en) * 2016-12-12 2017-05-03 珠海市魅族科技有限公司 Use control method and apparatus for terminal equipment
CN106934264A (en) * 2015-12-31 2017-07-07 深圳先进技术研究院 A kind of intelligent unlocking method, device and lock device
US20170318019A1 (en) * 2016-04-29 2017-11-02 John C. Gordon Gaze-based authentication

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202059427U (en) * 2011-03-23 2011-11-30 北京恒光数码科技有限公司 Dynamic cipher token apparatus and system
CN103745144A (en) * 2014-01-08 2014-04-23 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal unlocking method
CN104023315A (en) * 2014-06-20 2014-09-03 中科创达软件股份有限公司 Password input method and device based on geographical location information
CN105323294A (en) * 2014-08-20 2016-02-10 广东小天才科技有限公司 Authority control method and device of intelligent terminal
CN104320256A (en) * 2014-10-20 2015-01-28 厦门美图移动科技有限公司 Method for achieving fingerprint universal password verification
CN106934264A (en) * 2015-12-31 2017-07-07 深圳先进技术研究院 A kind of intelligent unlocking method, device and lock device
US20170318019A1 (en) * 2016-04-29 2017-11-02 John C. Gordon Gaze-based authentication
CN106570694A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 Server, mobile terminal and mobile payment method
CN106611111A (en) * 2016-12-12 2017-05-03 珠海市魅族科技有限公司 Use control method and apparatus for terminal equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110121174A (en) * 2019-05-16 2019-08-13 徐国愚 A kind of implicit identity identifying method of mobile intelligent terminal
CN110121174B (en) * 2019-05-16 2022-04-15 徐国愚 Implicit identity authentication method of mobile intelligent terminal

Similar Documents

Publication Publication Date Title
US11038879B2 (en) Identity authentication method and apparatus, and user equipment
US10515203B2 (en) Method and system for improving security of a mobile terminal
US8955069B1 (en) Event-based biometric authentication using mobile device
EP3516569B1 (en) Passive availability testing
US11263846B2 (en) Authentication method and user equipment
US20150358317A1 (en) Behavioral Authentication System using a biometric fingerprint sensor and User Behavior for Authentication
CN113272805A (en) Proximity-based unlocking of a common computing device
CN107230066B (en) Payment method and device, computer device and readable storage medium
WO2017031850A1 (en) User identity authentication method, device, system and smart home
US9792421B1 (en) Secure storage of fingerprint related elements
CN107145772B (en) Terminal equipment security control method and device and terminal equipment
CN108322507A (en) A kind of method and system executing safety operation using safety equipment
CN107358763A (en) A kind of method, apparatus and system of ATM checking identity
CN107231338B (en) Network connection method, device and device for network connection
US10922514B2 (en) Electronic apparatus
CN110891045A (en) Password setting method, password verification method and related equipment
CN116777441A (en) Information verification method, device, equipment and computer readable storage medium
EP3236377B1 (en) Method, device and system for preventing account from being broken into
JP6441544B2 (en) Information device operation system, information device operation method, and program
WO2019108576A1 (en) System and method for issuing a certificate to permit access to information
CN105701392B (en) Information processing method and electronic equipment
CN111681348A (en) Access control authentication method and device
WO2017012216A1 (en) Login processing method and apparatus, and terminal
CN111179469A (en) Voice prompt method and intelligent door lock
US20180075227A1 (en) Systems and methods for surveillance of user access to a security critical resource

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200317