CN112311785A - Method and device for cascade update of equipment authentication information - Google Patents

Method and device for cascade update of equipment authentication information Download PDF

Info

Publication number
CN112311785A
CN112311785A CN202011167273.7A CN202011167273A CN112311785A CN 112311785 A CN112311785 A CN 112311785A CN 202011167273 A CN202011167273 A CN 202011167273A CN 112311785 A CN112311785 A CN 112311785A
Authority
CN
China
Prior art keywords
authentication information
equipment
temporary
temporary authentication
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011167273.7A
Other languages
Chinese (zh)
Inventor
徐率率
杨丰玮
葛春光
王通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202011167273.7A priority Critical patent/CN112311785A/en
Publication of CN112311785A publication Critical patent/CN112311785A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method and a device for cascade update of equipment authentication information, and belongs to the technical field of intelligent home. The application includes: when the equipment carries out user authentication, the equipment authenticates local authentication information input by the user; if the local authentication information passes the authentication, the equipment acquires temporary authentication information associated with the local authentication information and authenticates the temporary authentication information, wherein the server sends the temporary authentication information to the equipment every preset time period; and if the temporary authentication information passes the authentication, the equipment determines that the user passes the authentication. Through the method and the device, safety verification is facilitated in equipment authentication, and related authentication information is updated more efficiently and more safely and secretly.

Description

Method and device for cascade update of equipment authentication information
Technical Field
The application belongs to the technical field of smart home, and particularly relates to a method and a device for cascade update of equipment authentication information, computer equipment and a computer readable storage medium.
Background
With the rapid development of socio-economy, the intelligent society is accelerating, wherein the development of smart homes is approaching to maturity. In the aspect of the most important household safety in an intelligent home, if the safety of the intelligent household is required, the safety of the intelligent door lock is critical. In the maintenance of the intelligent door lock, the authentication password needs to be updated regularly to increase the security of the intelligent door lock. In the related art, when the password of the intelligent door lock is updated, a user needs to manually input a new password, and the background server can update the password according to the password input by the user.
The password updating efficiency of the intelligent door lock under the application scheme is low, and the password has potential safety hazards, so that the safety performance of the intelligent door lock is influenced.
Disclosure of Invention
In order to overcome the problems in the related art at least to a certain extent, the application provides a method and a device for cascade update of equipment authentication information, computer equipment and a computer readable storage medium, which can achieve the effects of safety check in equipment authentication and safer and more secret update of related authentication information.
In order to achieve the purpose, the following technical scheme is adopted in the application:
in a first aspect,
the application provides a method for cascade update of equipment authentication information, which comprises the following steps:
when the equipment carries out user authentication, the equipment authenticates local authentication information input by the user;
if the local authentication information passes the authentication, the equipment acquires temporary authentication information associated with the local authentication information and authenticates the temporary authentication information, wherein the server sends the temporary authentication information to the equipment every preset time period;
and if the temporary authentication information passes the authentication, the equipment determines that the user passes the authentication.
Further, the server transmitting the temporary authentication information to the device every predetermined period of time includes:
the equipment establishes the temporary authentication information, and sets the validity period of the temporary authentication information as the preset time period;
and when the preset time period is detected to be reached, setting the temporary authentication information to be in a forbidden state.
Further, the method further comprises:
when the server deletes the temporary authentication information, the device deletes the local authentication information associated with the temporary authentication information.
Further, the method further comprises:
when a user uses the equipment for the first time, the equipment receives and verifies the temporary authentication information issued by the server;
if the temporary authentication information passes the verification, the equipment allows the user to input the local authentication information;
if the temporary authentication information is not verified, the equipment inquires the temporary authentication information in the current time period from the server according to the reserved information and verifies the inquired temporary authentication information in the current time period.
In a second aspect of the present invention,
the application provides a device for cascade update of equipment authentication information, which comprises:
the device comprises a first authentication unit and a second authentication unit, wherein the first authentication unit is used for authenticating local authentication information input by a user when the device authenticates the user;
the second authentication unit is used for acquiring temporary authentication information associated with the local authentication information by the equipment and authenticating the temporary authentication information if the local authentication information passes the authentication, wherein the server sends the temporary authentication information to the equipment at intervals of a preset time period;
and the determining unit is used for determining that the user authentication is passed by the equipment if the temporary authentication information passes the authentication.
Further, the server transmitting the temporary authentication information to the device every predetermined period of time includes:
the equipment establishes the temporary authentication information, and sets the validity period of the temporary authentication information as the preset time period;
and when the preset time period is detected to be reached, setting the temporary authentication information to be in a forbidden state.
Further, the apparatus further comprises:
a deletion unit configured to delete the local authentication information associated with the temporary authentication information by the device when the server deletes the temporary authentication information.
Further, the apparatus further comprises:
the verification unit is used for receiving and verifying the temporary authentication information issued by the server by the equipment when the equipment is used by a user for the first time;
the input unit is used for allowing the user to input the local authentication information if the temporary authentication information passes the verification;
and the query unit is used for querying the temporary authentication information in the current time period from the server according to the reserved information and verifying the queried temporary authentication information in the current time period if the verification of the temporary authentication information fails.
In a third aspect,
the present application provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method for cascade update of device authentication information according to the first aspect when executing the computer program.
In a fourth aspect of the present invention,
an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for cascading updating of device authentication information according to the first aspect.
This application adopts above technical scheme, possesses following beneficial effect at least:
when the user authentication is carried out on the equipment, the equipment authenticates the local authentication information input by the user; if the local authentication information passes the authentication, the equipment acquires temporary authentication information associated with the local authentication information and authenticates the temporary authentication information, wherein the server sends the temporary authentication information to the equipment every preset time period; if the temporary authentication information passes the authentication, the equipment determines that the user passes the authentication, and compared with a mode of updating a password according to a password input by a user in the prior art, the method and the device for verifying the password of the user can achieve the effects that the password is safely verified and the related authentication information is updated more safely and secretly in the equipment authentication.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow diagram illustrating a method of cascading updates of device authentication information in accordance with an example embodiment;
FIG. 2 is a flow diagram illustrating a method of device authentication information concatenation update in accordance with the preferred embodiments;
fig. 3 is a schematic diagram illustrating an apparatus for cascading updates of device authentication information according to an example embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail below. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a flowchart illustrating a method for cascading updates of device authentication information according to an exemplary embodiment, where the method includes the following steps, as shown in fig. 1:
step S101, when the equipment carries out user authentication, the equipment authenticates local authentication information input by the user;
step S102, if the local authentication information passes the authentication, the equipment acquires temporary authentication information associated with the local authentication information and authenticates the temporary authentication information, wherein the server sends the temporary authentication information to the equipment every preset time period;
step S103, if the temporary authentication information passes the authentication, the equipment determines that the user passes the authentication.
Specifically, the device in the embodiment of the present application may include, but is not limited to, an intelligent door lock, and the authentication information may include, but is not limited to, a password, a fingerprint, NFC, and other information.
In some embodiments, the server sending the temporary authentication information to the device every predetermined period of time may include: the equipment establishes the temporary authentication information, and sets the validity period of the temporary authentication information as the preset time period; and when the preset time period is detected to be reached, setting the temporary authentication information to be in a forbidden state.
The device authentication process uses a mode that temporary authentication information (such as a temporary password or temporary NFC, and the temporary authentication information is updated by the server at intervals) issued by the server is associated with local authentication information (such as a local password), and specifically includes: the temporary authentication information is assigned with an ID, each ID is ensured not to be repeated, and the ID is used to be associated with the unique ID of local authentication information (including fingerprints, digital passwords, NFC and the like) needing to be saved and verified by the temporary authentication information. The primary authentication process is as follows: the user uses local authentication information (including fingerprints, digital passwords, NFC and the like) to verify, after the verification is passed, other verification information (such as the validity period/forbidden state of the temporary authentication information and the like) of the associated temporary authentication information is obtained, and when the other verification information of the temporary authentication information is also passed, the user is considered to be passed.
The association mode between the temporary authentication information and the local authentication information is specifically as follows: the unique ID (unable to repeat) of the temporary authentication information inside the equipment is associated with the unique ID (unable to repeat) of the local authentication information (including fingerprints, digital passwords, NFC and the like), and when the server updates the temporary authentication information, the specific updating mode is as follows: the method comprises the steps of establishing a piece of temporary authentication information in the equipment, setting the validity period of the piece of temporary authentication information as the time for updating the temporary authentication information by the server at regular time, ensuring that the previous piece of temporary authentication information is in a failure state when the server updates the temporary authentication information, setting the forbidden state of the temporary authentication information before updating to be 'yes' when the equipment detects that the piece of temporary authentication information is updated through secondary verification, and ensuring that only one piece of temporary authentication information in the equipment is associated with local authentication information (including fingerprints, digital passwords, NFC and the like).
In some of these embodiments, when the server deletes the temporary authentication information, the device deletes the local authentication information associated with the temporary authentication information, thereby concatenating the deletions.
When a user uses the equipment for the first time, the temporary authentication information issued by the authentication server is needed, when the authentication passes, the user can add local authentication information (including fingerprints, digital passwords, NFC and the like) to the equipment, if the user verifies that the temporary authentication information does not pass, the temporary authentication information in the current time period of the equipment is inquired according to information such as a mobile phone number, identity information, equipment mac and the like provided when the equipment is purchased, and then the local authentication information (including fingerprints, digital passwords, NFC and the like) is verified and added through the temporary authentication information. When a user needs to authenticate the device, the user first needs to input local authentication information (including a fingerprint, a digital password, NFC and the like) added before the device, after the authentication is passed, the device verifies the state (valid period/disabled state) of the temporary authentication information associated with the local authentication information (including the fingerprint, the digital password, the NFC and the like), and only if the state (valid period/disabled state) of the temporary authentication information is also verified, the user is authenticated. If the user forgets the local authentication information (including fingerprint, digital password, NFC, etc.) added before, the temporary authentication information in the current time period should be queried by providing information such as the mobile phone number, the identity information, and the device mac provided when the device is purchased, and the local authentication information is updated through the temporary authentication information.
The cascade update mode is that the temporary authentication information is updated by the server at regular time to change the information of the secondary authentication check, but the local authentication information (including fingerprint, digital password, NFC, etc.) stored by the user is not changed. When the server deletes the temporary authentication information, the device also deletes the correspondingly created local authentication information at the same time, thereby performing cascade deletion.
The embodiment of the application solves the problem that the intelligent door lock is lack of safe updating in password management; aiming at the problem that the password verification in the equipment cascade information lacks relevant safety, a method for verifying the password by associating a temporary password with a local password issued by a server is used. The embodiment of the application can achieve the effect that the related authentication information is safely and secretly verified and updated in equipment authentication, namely the temporary authentication information issued by the server is associated with the local authentication information (including fingerprints, digital passwords, NFC and the like) added by a user, when the server updates the temporary authentication information, the authentication verification password is updated in the next authentication process, but the authentication information is not updated from the perspective of the user, so that the effect that the information is safely, secretly and more quickly verified and updated is achieved.
Fig. 2 is a flowchart illustrating a method for cascading updates of device authentication information according to the preferred embodiment, as shown in fig. 2, the method includes the following steps:
step S201, the server issues a temporary password.
In step S202, there is a user authentication temporary password. If the verification is passed, executing step S203; if the verification is not passed, the process returns to step S201.
Step S203, add the local password to the device.
And step S204, the user authenticates and verifies the local password of the equipment. If yes, go to step S205; if not, go to step S206.
In step S205, the device checks the temporary secret status. If yes, go to step S207; if not, go to step S206.
In step S206, it is determined that the authentication has not passed.
Step S207, it is determined that the authentication is passed.
In summary, according to the present application, when a device performs user authentication, the device authenticates local authentication information input by the user; if the local authentication information passes the authentication, the equipment acquires temporary authentication information associated with the local authentication information and authenticates the temporary authentication information, wherein the server sends the temporary authentication information to the equipment every preset time period; if the temporary authentication information passes the authentication, the equipment determines that the user passes the authentication, and compared with a mode of updating a password according to a password input by a user in the prior art, the method and the device for verifying the password of the user can achieve the effects that the password is safely verified and the related authentication information is updated more safely and secretly in the equipment authentication.
The present embodiment further provides a device for cascading and updating device authentication information, where the device is used to implement the foregoing embodiments and preferred embodiments, and the details of the foregoing description are omitted. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 3 is a schematic diagram illustrating an apparatus for cascading update of device authentication information according to an exemplary embodiment, where the apparatus, as shown in fig. 3, includes:
a first authentication unit 31, configured to authenticate, when a device performs user authentication, local authentication information input by a user;
a second authentication unit 32, configured to, if the local authentication information passes authentication, acquire, by the device, temporary authentication information associated with the local authentication information, and authenticate the temporary authentication information, where the server sends the temporary authentication information to the device every predetermined time period;
a determining unit 33, configured to determine that the user authentication is passed by the device if the temporary authentication information is authenticated.
Further, the server transmitting the temporary authentication information to the device every predetermined period of time includes:
the equipment establishes the temporary authentication information, and sets the validity period of the temporary authentication information as the preset time period;
and when the preset time period is detected to be reached, setting the temporary authentication information to be in a forbidden state.
Further, the apparatus further comprises:
a deletion unit configured to delete the local authentication information associated with the temporary authentication information by the device when the server deletes the temporary authentication information.
Further, the apparatus further comprises:
the verification unit is used for receiving and verifying the temporary authentication information issued by the server by the equipment when the equipment is used by a user for the first time;
the input unit is used for allowing the user to input the local authentication information if the temporary authentication information passes the verification;
and the query unit is used for querying the temporary authentication information in the current time period from the server according to the reserved information and verifying the queried temporary authentication information in the current time period if the verification of the temporary authentication information fails.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
The embodiment of the application also provides computer equipment, and the method for cascade updating of the authentication information of the equipment can be realized by the computer equipment. The computer device in the embodiment of the present application includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the method for cascade update of device authentication information in any one of the above embodiments when executing the computer program.
The embodiment of the application also provides a computer readable storage medium. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement the method for cascading update of device authentication information in any of the above embodiments.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present application, the meaning of "plurality" means at least two unless otherwise specified.
It will be understood that when an element is referred to as being "secured to" or "disposed on" another element, it can be directly on the other element or intervening elements may also be present; when an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present, and further, as used herein, connected may include wirelessly connected; the term "and/or" is used to include any and all combinations of one or more of the associated listed items.
Any process or method descriptions in flow charts or otherwise described herein may be understood as: represents modules, segments or portions of code which include one or more executable instructions for implementing specific logical functions or steps of a process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A method for cascade update of equipment authentication information is characterized by comprising the following steps:
when the equipment carries out user authentication, the equipment authenticates local authentication information input by the user;
if the local authentication information passes the authentication, the equipment acquires temporary authentication information associated with the local authentication information and authenticates the temporary authentication information, wherein the server sends the temporary authentication information to the equipment every preset time period;
and if the temporary authentication information passes the authentication, the equipment determines that the user passes the authentication.
2. The method of claim 1, wherein the server sending the temporary authentication information to the device every predetermined period of time comprises:
the equipment establishes the temporary authentication information, and sets the validity period of the temporary authentication information as the preset time period;
and when the preset time period is detected to be reached, setting the temporary authentication information to be in a forbidden state.
3. The method of claim 1, further comprising:
when the server deletes the temporary authentication information, the device deletes the local authentication information associated with the temporary authentication information.
4. The method of claim 1, further comprising:
when a user uses the equipment for the first time, the equipment receives and verifies the temporary authentication information issued by the server;
if the temporary authentication information passes the verification, the equipment allows the user to input the local authentication information;
if the temporary authentication information is not verified, the equipment inquires the temporary authentication information in the current time period from the server according to the reserved information and verifies the inquired temporary authentication information in the current time period.
5. An apparatus for cascading update of device authentication information, comprising:
the device comprises a first authentication unit and a second authentication unit, wherein the first authentication unit is used for authenticating local authentication information input by a user when the device authenticates the user;
the second authentication unit is used for acquiring temporary authentication information associated with the local authentication information by the equipment and authenticating the temporary authentication information if the local authentication information passes the authentication, wherein the server sends the temporary authentication information to the equipment at intervals of a preset time period;
and the determining unit is used for determining that the user authentication is passed by the equipment if the temporary authentication information passes the authentication.
6. The apparatus of claim 5, wherein the server sends the temporary authentication information to the device every predetermined period of time comprises:
the equipment establishes the temporary authentication information, and sets the validity period of the temporary authentication information as the preset time period;
and when the preset time period is detected to be reached, setting the temporary authentication information to be in a forbidden state.
7. The apparatus of claim 5, further comprising:
a deletion unit configured to delete the local authentication information associated with the temporary authentication information by the device when the server deletes the temporary authentication information.
8. The apparatus of claim 5, further comprising:
the verification unit is used for receiving and verifying the temporary authentication information issued by the server by the equipment when the equipment is used by a user for the first time;
the input unit is used for allowing the user to input the local authentication information if the temporary authentication information passes the verification;
and the query unit is used for querying the temporary authentication information in the current time period from the server according to the reserved information and verifying the queried temporary authentication information in the current time period if the verification of the temporary authentication information fails.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 4 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 4.
CN202011167273.7A 2020-10-27 2020-10-27 Method and device for cascade update of equipment authentication information Pending CN112311785A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011167273.7A CN112311785A (en) 2020-10-27 2020-10-27 Method and device for cascade update of equipment authentication information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011167273.7A CN112311785A (en) 2020-10-27 2020-10-27 Method and device for cascade update of equipment authentication information

Publications (1)

Publication Number Publication Date
CN112311785A true CN112311785A (en) 2021-02-02

Family

ID=74331116

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011167273.7A Pending CN112311785A (en) 2020-10-27 2020-10-27 Method and device for cascade update of equipment authentication information

Country Status (1)

Country Link
CN (1) CN112311785A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113129491A (en) * 2021-03-30 2021-07-16 厦门立林科技有限公司 Rapid synchronization method and system for entrance guard voucher of intelligent community building intercom system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166091A (en) * 2006-10-19 2008-04-23 阿里巴巴公司 A dynamic password authentication method and service end system
CN101682513A (en) * 2007-06-11 2010-03-24 Nxp股份有限公司 Authentication method and the electronic installation that is used to carry out authentication
US20160182481A1 (en) * 2014-12-19 2016-06-23 Orange Method for authenticating a device
CN106656946A (en) * 2015-11-03 2017-05-10 东莞酷派软件技术有限公司 Dynamic authentication method and device
CN108900561A (en) * 2018-09-28 2018-11-27 北京芯盾时代科技有限公司 The method, apparatus and system of single-sign-on
CN109327429A (en) * 2017-07-31 2019-02-12 佳能株式会社 Verification System, apparatus management system and its method
CN109389709A (en) * 2017-08-09 2019-02-26 丰田自动车株式会社 Unlocking control system and unlocking control method
CN110322603A (en) * 2019-06-18 2019-10-11 广东汇泰龙科技股份有限公司 A kind of temporary password security protection method and system for intelligent door lock
CN110717732A (en) * 2019-09-29 2020-01-21 新华三大数据技术有限公司 Information authentication method and system
US20200076813A1 (en) * 2018-09-05 2020-03-05 Consumerinfo.Com, Inc. User permissions for access to secure data at third-party
US20200252385A1 (en) * 2019-02-01 2020-08-06 EMC IP Holding Company LLC Authentication Based on Shared Secret Updates
CN111756534A (en) * 2020-06-24 2020-10-09 北京字节跳动网络技术有限公司 Network password updating method and device, network access device and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166091A (en) * 2006-10-19 2008-04-23 阿里巴巴公司 A dynamic password authentication method and service end system
CN101682513A (en) * 2007-06-11 2010-03-24 Nxp股份有限公司 Authentication method and the electronic installation that is used to carry out authentication
US20160182481A1 (en) * 2014-12-19 2016-06-23 Orange Method for authenticating a device
CN106656946A (en) * 2015-11-03 2017-05-10 东莞酷派软件技术有限公司 Dynamic authentication method and device
CN109327429A (en) * 2017-07-31 2019-02-12 佳能株式会社 Verification System, apparatus management system and its method
CN109389709A (en) * 2017-08-09 2019-02-26 丰田自动车株式会社 Unlocking control system and unlocking control method
US20200076813A1 (en) * 2018-09-05 2020-03-05 Consumerinfo.Com, Inc. User permissions for access to secure data at third-party
CN108900561A (en) * 2018-09-28 2018-11-27 北京芯盾时代科技有限公司 The method, apparatus and system of single-sign-on
US20200252385A1 (en) * 2019-02-01 2020-08-06 EMC IP Holding Company LLC Authentication Based on Shared Secret Updates
CN110322603A (en) * 2019-06-18 2019-10-11 广东汇泰龙科技股份有限公司 A kind of temporary password security protection method and system for intelligent door lock
CN110717732A (en) * 2019-09-29 2020-01-21 新华三大数据技术有限公司 Information authentication method and system
CN111756534A (en) * 2020-06-24 2020-10-09 北京字节跳动网络技术有限公司 Network password updating method and device, network access device and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHAMARTHI THARUN, CHANDRA RITHIN, B.BHARATHI: "Double Door Authentication for Mobile Devices using Personalised Lock (pins)", 《PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON TRENDS IN ELECTRONICS AND INFORMATICS》 *
彭理,梁伟,朱理望: "基于振动时间差与双重密码认证体系的智能锁设计", 《湘潭师范学院学报》 *
闫宏强,王琳杰: "物联网中认证技术研究", 《通信学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113129491A (en) * 2021-03-30 2021-07-16 厦门立林科技有限公司 Rapid synchronization method and system for entrance guard voucher of intelligent community building intercom system
CN113129491B (en) * 2021-03-30 2024-03-22 厦门立林科技有限公司 Method and system for rapidly synchronizing access control certificates of intelligent community building intercom system

Similar Documents

Publication Publication Date Title
KR102325738B1 (en) Authentication method and blockchain-based authentication data processing method and device
US11943376B1 (en) Template based credential provisioning
US10700861B2 (en) System and method for generating a recovery key and managing credentials using a smart blockchain contract
CN110958118B (en) Certificate authentication management method, device, equipment and computer readable storage medium
CN108848113B (en) Client device login control method and device, storage medium and server
US8990550B1 (en) Methods and apparatus for securing communications between a node and a server based on hardware metadata gathered by an in-memory process
KR101963776B1 (en) Method and apparatus for secure updates of software in vehicle electric system
US20170220791A1 (en) Terminal device, authentication information management method, and authentication information management system
CN107862526B (en) Resource numerical value transferring method and device, storage medium and server
CN108696356B (en) Block chain-based digital certificate deleting method, device and system
US10831881B2 (en) Method and terminal for enhancing information security
CN113343286B (en) Data encryption and decryption method, data uploading end, data receiving end and system
CN110611647A (en) Node joining method and device on block chain system
CN111340987A (en) Internet of things door lock communication method, device and system and computer storage medium
CN111065090A (en) Method for establishing network connection and wireless routing equipment
CN112311785A (en) Method and device for cascade update of equipment authentication information
KR102213460B1 (en) System and method for generating software whistlist using machine run
CN114553444A (en) Identity authentication method, identity authentication device and storage medium
JP2018174507A (en) Communication device
US20190007384A1 (en) Terminal authentication
JP7423856B2 (en) How to identify electric vehicle charging stations
CN109389720B (en) Intelligent door lock permission processing method and device
KR102332004B1 (en) Method, system and non-transitory computer-readable recording medium for managing an account on blockchain network
CN112422281B (en) Method and system for changing secret key in security module
CN112968895B (en) Password resetting method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210202

RJ01 Rejection of invention patent application after publication