CN112396757A - Cipher type networking controller and control method - Google Patents

Cipher type networking controller and control method Download PDF

Info

Publication number
CN112396757A
CN112396757A CN202011295165.8A CN202011295165A CN112396757A CN 112396757 A CN112396757 A CN 112396757A CN 202011295165 A CN202011295165 A CN 202011295165A CN 112396757 A CN112396757 A CN 112396757A
Authority
CN
China
Prior art keywords
user
controller
password
state
control system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011295165.8A
Other languages
Chinese (zh)
Inventor
蔡建闯
刘宇莎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Micro Smart Electronic Information Technology Co ltd
Original Assignee
Guangdong Micro Smart Electronic Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Micro Smart Electronic Information Technology Co ltd filed Critical Guangdong Micro Smart Electronic Information Technology Co ltd
Priority to CN202011295165.8A priority Critical patent/CN112396757A/en
Publication of CN112396757A publication Critical patent/CN112396757A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F13/00Coin-freed apparatus for controlling dispensing or fluids, semiliquids or granular material from reservoirs
    • G07F13/02Coin-freed apparatus for controlling dispensing or fluids, semiliquids or granular material from reservoirs by volume
    • G07F13/025Coin-freed apparatus for controlling dispensing or fluids, semiliquids or granular material from reservoirs by volume wherein the volume is determined during delivery

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a password type networking controller and a control method, comprising the following steps: the upper control system is used for acquiring the ID of the user, distributing a first password required by the use for the user according to the ID of the user, determining a first controller in a user forbidden state from all controllers, and issuing the first password to the user and the first controller; and the first controller is used for acquiring a second password input by the user, determining that the second password is the same as the first password, and controlling the first controller to be adjusted from the user forbidden state to the user using state. Because the upper control system can distribute the first password for the user based on the ID of the user and send the first password to the first controller, when the user inputs the second password on the first controller, and the first controller verifies that the second password is the same as the first password, the water can be used without using the water card, and the inconvenience brought to the water use due to the fact that the water card is lost or forgotten to be carried is solved.

Description

Cipher type networking controller and control method
Technical Field
The application relates to the technical field of water control, in particular to a password type networking controller and a control method.
Background
The mode of using the water card to pay for water is more conventional at present and is also a widely used mode. Specifically, when the user needs to use water, such as when the user needs to rain or take water, the user can carry the water card to a bathing room or a water station and then swipe the card to use the water.
However, once the water card is lost or forgotten, the water card cannot be used, which brings great inconvenience to water use and influences normal use of users.
Disclosure of Invention
The embodiment of the application provides a password type networking controller and a control method, which can solve the inconvenience brought to water consumption due to the fact that a water card is lost or forgotten to be taken, and ensure normal water consumption of a user.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, an embodiment of the present application provides a cryptographic networking controller, including: the system comprises an upper control system and a first controller connected with the upper control system; the upper control system is used for acquiring an ID of a user, distributing a first password required by use for the user according to the ID of the user, determining a first controller in a user forbidden state from all controllers, and issuing the first password to the user and the first controller; the first controller is used for acquiring a second password input by the user, determining that the second password is the same as the first password, and controlling the first controller to adjust from a user disabled state to a user using state, wherein the user disabled state indicates that the first controller cannot control the faucet to release water in response to the control of the user, and the user using state indicates that the first controller controls the faucet to release water in response to the control of the user.
Based on the system, the upper control system can distribute the first password to the user based on the ID of the user and send the first password to the first controller, so that the user can use water when the user inputs the second password on the first controller and the first controller verifies that the second password is the same as the first password, and the water card is not needed to be used, so that the inconvenience brought to water use due to the fact that the water card is lost or forgotten to be carried is solved, and the normal water use of the user is ensured.
Optionally, the cryptographic networking controller further comprises: a second water control system; the upper control system is further configured to issue the first password to the second controller in a user disabled state; the first controller is also used for sending a use instruction to the upper control system after determining that the second password is the same as the first password; the upper control system is further configured to delete the first password on the second controller according to the use instruction, and adjust the first controller from a user disabled state to a user used state.
It can be understood that the upper control system can delete the first password on the second controller, so that the user is ensured to have only one controller for use, and the ordered use of the user is realized.
Optionally, after the upper control system allocates the first password, the upper control system is further configured to delete the first password on the first controller and the second controller if the use instruction is not received within a preset time period.
It can be understood that the upper control system can delete the first passwords on all the water controllers when the time is out, so that the password leakage risk is reduced, and the safety of the system is enhanced.
Optionally, the first controller is further configured to determine that the user is finished using water, adjust the first controller from a user use state to a user disabled state, and notify the upper control system of the user disabled state of the first controller; the first controller is further used for adjusting the first controller from a user use state to a user forbidden state according to the notification of the first controller.
It can be understood that after each use, the upper control system can synchronously adjust the controller to the user disabled state, so that the controller can be normally used next time, and each user can use the controller orderly.
Optionally, the first controller and the second controller are provided with keys for a user to input the second password; .
It can be understood that, because the controller is provided with keys or passwords, the user can conveniently input the password using the controller.
In a second aspect, an embodiment of the present application provides a method for controlling a cryptographic networking controller, where the cryptographic networking controller includes: the system comprises an upper control system and a first controller connected with the upper control system; the method is applied to the first controller, and comprises the following steps: acquiring a second password input by a user; judging whether the second password is the same as a preset first password or not, wherein the first password is as follows: the ID of the user of the upper control system is a password distributed by the user; if the first controller is the same as the second controller, the first controller is controlled to be adjusted from a user disabled state to a user using state, wherein the user disabled state indicates that the first controller cannot control the water faucet to release water in response to the control of the user, and the user using state indicates that the first controller controls the water faucet to release water in response to the control of the user.
Based on the method, the upper control system can distribute the first password to the user based on the ID of the user and send the first password to the first controller, so that the user can use water when the user inputs the second password on the first controller and the first controller verifies that the second password is the same as the first password, and the water card is not needed to be used, thereby solving the inconvenience brought to the water use due to the loss or forgetting of the water card and ensuring the normal water use of the user.
Optionally, the method further comprises: and determining that the water consumption of the user is finished, adjusting the first controller from the user using state to the user forbidden state, and informing the user of the forbidden state of the first controller to the upper control system.
In a third aspect, an embodiment of the present application provides a control device for a cryptographic networking controller, where the cryptographic networking controller includes: the system comprises an upper control system and a first controller connected with the upper control system; the device is applied to the first controller, and comprises:
the acquisition module is used for acquiring a second password input by a user;
the control module is used for judging whether the second password is the same as a preset first password or not, wherein the first password is as follows: the ID of the user of the upper control system is a password distributed by the user; if the first controller is the same as the second controller, the first controller is controlled to be adjusted from a user disabled state to a user using state, wherein the user disabled state indicates that the first controller cannot control the water faucet to release water in response to the control of the user, and the user using state indicates that the first controller controls the water faucet to release water in response to the control of the user.
Optionally, the processing module is further configured to determine that the water use by the user is finished, adjust the first controller from the user use state to the user disabled state, and notify the user of the user disabled state of the first controller, where the upper control system is in the upper control system.
Optionally, the apparatus according to the third aspect may further include a sending module and a receiving module, where the sending module is configured to implement a sending function of data, and the receiving module is configured to implement a receiving function of data.
Alternatively, the sending module and the receiving module may be integrated into one module, such as a transceiver module. The transceiver module is used for realizing the sending function and the receiving function of the communication device.
Alternatively, various functional modules of the apparatus according to the third aspect, such as the sending module, the receiving module, the obtaining module and the control module, may also be integrated into one processing module. The processing module is used for realizing the processing function of the device.
Optionally, the apparatus of the third aspect may further include a storage module storing the program or the instructions. The program or instructions, when executed by the processing module, cause the apparatus to perform the method of the second aspect.
In addition, for technical effects of the apparatus according to the third aspect, reference may be made to the technical effects of the method according to the first aspect, and details are not repeated here.
In a fourth aspect, an embodiment of the present application provides a method for controlling a cryptographic networking controller, where the cryptographic networking controller includes: the system comprises an upper control system and a first controller connected with the upper control system; the method is applied to the upper control system and comprises the following steps: acquiring an ID of a user; distributing a first password required by use for the user according to the ID of the user; determining the first controller in a user forbidden state from all controllers, and sending the first password to the user and the first controller; wherein the user disabled state indicates that the first controller is unable to control the faucet to release water in response to the user's control, and the user engaged state indicates that the first controller controls the faucet to release water in response to the user's control.
Based on the method, the upper control system can distribute the first password to the user based on the ID of the user and send the first password to the first controller, so that the user can use water when the user inputs the second password on the first controller and the first controller verifies that the second password is the same as the first password, and the water card is not needed to be used, thereby solving the inconvenience brought to the water use due to the loss or forgetting of the water card and ensuring the normal water use of the user.
Optionally, the cryptographic networking controller further comprises: a second water control system, the method further comprising: sending the first password to the second controller in a user disabled state; and deleting the first password on the second controller according to a use instruction sent by the first controller, and adjusting the first controller from a user disabled state to a user used state.
Optionally, the method further comprises: and adjusting the first controller from the user use state to the user forbidden state according to the fact that the first controller informs that the first controller is in the user forbidden state.
In a fifth aspect, an embodiment of the present application provides a control device for a cryptographic networking controller, where the cryptographic networking controller includes: the system comprises an upper control system and a first controller connected with the upper control system; the method is applied to the upper control system, and the device comprises the following steps:
the acquisition module is used for acquiring the ID of the user;
the control module is used for distributing a first password required by use to the user according to the ID of the user; determining the first controller in a user forbidden state from all controllers, and sending the first password to the user and the first controller; wherein the user disabled state indicates that the first controller is unable to control the faucet to release water in response to the user's control, and the user engaged state indicates that the first controller controls the faucet to release water in response to the user's control.
Optionally, the cryptographic networking controller further comprises: the control module is also used for sending the first password to the second controller in a user forbidden state; and deleting the first password on the second controller according to a use instruction sent by the first controller, and adjusting the first controller from a user disabled state to a user used state.
Optionally, the control module is further configured to adjust the first controller from the user use state to the user disabled state according to the fact that the first controller informs that the first controller is in the user disabled state.
Optionally, the apparatus according to the fifth aspect may further include a sending module and a receiving module, where the sending module is configured to implement a sending function of data, and the receiving module is configured to implement a receiving function of data.
Alternatively, the sending module and the receiving module may be integrated into one module, such as a transceiver module. The transceiver module is used for realizing the sending function and the receiving function of the communication device.
Alternatively, various functional modules of the apparatus according to the fifth aspect, such as the sending module, the receiving module, the obtaining module and the control module, may also be integrated into one processing module. The processing module is used for realizing the processing function of the device.
Optionally, the apparatus of the fifth aspect may further include a storage module, which stores the program or the instructions. The program or instructions, when executed by the processing module, cause the apparatus to perform the method of the fourth aspect.
In addition, for technical effects of the apparatus according to the fifth aspect, reference may be made to technical effects of the method according to the first aspect, and details are not repeated here.
In a sixth aspect, the present application provides a storage medium having a computer program stored thereon, where the computer program is executed by a computer to perform the method according to the second or fourth aspect.
In a seventh aspect, there is provided a computer program product comprising a computer program or instructions which, when run on a computer, causes the computer to perform the method of the second or fourth aspect.
Drawings
Fig. 1 is a first schematic structural diagram of a cryptographic networking controller according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a cryptographic networking controller according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a first controller in a cryptographic networking controller according to an embodiment of the present application;
fig. 4 is a third schematic structural diagram of a cryptographic networking controller according to an embodiment of the present application;
fig. 5 is a first schematic structural diagram of a control device of a cryptographic networking controller according to an embodiment of the present application;
fig. 6 is a second schematic structural diagram of a control device of a cryptographic networking controller according to an embodiment of the present application.
Detailed Description
The technical solution in the present application will be described below with reference to the accompanying drawings.
Referring to fig. 1, an embodiment of the present application provides a cryptographic networking controller 100, where the cryptographic networking controller 100 may include: the host control system 110, and at least one controller 120 connected to the host control system 110.
For ease of understanding, the control principle of the cryptographic networking controller 100 will be described below by taking the control of the cryptographic networking controller 100 to one controller 120 and two controllers 120 as an example.
As shown in fig. 2, the controller 120 controlled by the upper control system 110 is a first controller 121.
Specifically, when the user needs to use water, the user can access the upper control system 110 through the user device, so as to send the ID of the user to the upper control system 110.
Correspondingly, the upper control system 110 may obtain the ID of the user, and obtain the school number, name, and account balance of the user according to the account of the user found by the ID of the user. After determining that the account of the user is found, the upper control system 110 may also assign the first password required for the user. And the upper control system 110 further determines the first controller 121 in the user disabled state from all the controllers 120 (the states of the other controllers 120 are all user use states), so as to issue the first password, the student number, the name and the account balance of the user to the first controller 121 and the user.
Correspondingly, the first controller 121 stores the received first password, the school number, the name and the account balance of the user.
As shown in fig. 3, in this embodiment, the first controller 121 is provided with a key and a display screen for a user to input a password.
When a user comes to a place where water is used and inputs a password through a key of the first controller 121, the first controller 121 acquires a second password input by the user, determines that the second password is the same as the first password, so that the first controller 121 is controlled to be adjusted from a user disabled state to a user using state, and displays the school number, the name and the account balance of the user on a display screen, wherein the user disabled state indicates that the first controller cannot control the faucet to release water in response to the control of the user, and the user using state indicates that the first controller controls the faucet to release water in response to the control of the user. Thus, the user can use water by pressing the water boiling button on the first controller 121, and can pause water use by pressing the water closing button on the first controller 121.
Meanwhile, after determining that the second password is the same as the first password, the first controller 121 may further send a use instruction carrying a user use state to the upper control system 110, so that the upper control system 110 correspondingly adjusts the state of the first controller 121 to the user use state.
Then, when the user finishes using water, the user can press the water-off button on the first controller 121 for a long time, and correspondingly, the first controller 121 can adjust its own state to the user disabled state again, and synchronize the user disabled state to the upper control system 110, so that the upper control system 110 also correspondingly adjusts the state of the first controller 121 to the user disabled state.
In addition, after the upper control system 110 allocates the first password, if the use instruction is not received within a preset time period, for example, 30 minutes, the first password of the first controller 121, and the student number, name and account balance of the user are deleted.
As shown in fig. 4, the controllers 120 controlled by the upper control system 110 are a first controller 121 and a second controller 122.
Specifically, when the user needs to use water, the user can access the upper control system 110 through the user device, so as to send the ID of the user to the upper control system 110.
Correspondingly, the upper control system 110 may obtain the ID of the user, and obtain the school number, name, and account balance of the user according to the account of the user found by the ID of the user. After determining that the account of the user is found, the upper control system 110 may also assign the first password required for the user. And the upper control system 110 further determines the first controller 121 and the second controller 122 in the user disabled state from all the controllers 120 (the states of the other controllers 120 are all the user using states), so as to issue the first password, the student number, the name and the account balance of the user to the first controller 121, the second controller 122 and the user.
Correspondingly, the first controller 121 and the first controller 122 save the received first password, the user's school number, name, and account balance.
In this embodiment, the first controller 121 and the second controller 122 are provided with a key and a display screen for a user to input a password. When a user comes to a place where water is used and inputs a password through a key of the first controller 121, the first controller 121 acquires a second password input by the user, determines that the second password is the same as the first password, so that the first controller 121 is controlled to be adjusted from a user disabled state to a user using state, and displays the school number, the name and the account balance of the user on a display screen, wherein the user disabled state indicates that the first controller cannot control the faucet to release water in response to the control of the user, and the user using state indicates that the first controller controls the faucet to release water in response to the control of the user. Thus, the user can use water by pressing the water boiling button on the first controller 121, and can pause water use by pressing the water closing button on the first controller 121.
Meanwhile, after determining that the second password is the same as the first password, the first controller 121 may further send a use instruction carrying a user use state to the upper control system 110. The upper control system 110 can correspondingly adjust the state of the first controller 121 to be the user use state according to the use instruction, and can also delete the first password on the second controller, the learning number, the name and the account balance of the user according to the use instruction.
Then, when the user finishes using water, the user can press the water-off button on the first controller 121 for a long time, and correspondingly, the first controller 121 can adjust its own state to the user disabled state again, and synchronize the user disabled state to the upper control system 110, so that the upper control system 110 also correspondingly adjusts the state of the first controller 121 to the user disabled state.
In addition, after the upper control system 110 allocates the first password, if the use instruction is not received within a preset time period, for example, 30 minutes, the first passwords of the first controller 121 and the first controller 122, and the school number, the name, and the account balance of the user are deleted.
In the embodiment of the present application, there is also provided a control method for a cryptographic networking controller, where the method may be applied to the first controller 121, and the method includes:
step S110, acquiring a second password input by a user;
step S120, determining whether the second password is the same as a preset first password, where the first password is: the ID of the user of the upper control system is a password distributed by the user;
step S130, if the two conditions are the same, controlling the first controller to adjust from a user disabled state to a user used state, where the user disabled state indicates that the first controller cannot control the faucet to release water in response to the user 'S control, and the user used state indicates that the first controller controls the faucet to release water in response to the user' S control.
Optionally, the method further comprises:
step S140, determining that the water usage of the user is finished, adjusting the first controller from the user usage state to the user disabled state, and informing the user of the user disabled state of the upper control system.
In an embodiment of the present application, there is further provided a control method of a cryptographic networking controller, where the method is applied to the upper control system 110, and the method includes:
step S210, obtaining the ID of the user;
step S220, distributing a first password required by the use for the user according to the ID of the user; determining the first controller in a user forbidden state from all controllers, and sending the first password to the user and the first controller; wherein the user disabled state indicates that the first controller is unable to control the faucet to release water in response to the user's control, and the user engaged state indicates that the first controller controls the faucet to release water in response to the user's control.
Optionally, the method further comprises:
step S230, issuing the first password to the second controller in the user disabled state; and deleting the first password on the second controller according to a use instruction sent by the first controller, and adjusting the first controller from a user disabled state to a user used state.
Optionally, the method further comprises:
step S240, according to the fact that the first controller informs that the first controller is in the user disabled state, adjusting the first controller from the user enabled state to the user disabled state.
As shown in fig. 5 in the embodiment of the present application, there is further provided a control apparatus 500 of a cryptographic networking controller, where the apparatus 500 is applied to the first controller, and the apparatus 500 includes:
an obtaining module 510, configured to obtain a second password input by the user;
a control module 520, configured to determine whether the second password is the same as a preset first password, where the first password is: the ID of the user of the upper control system is a password distributed by the user; if the first controller is the same as the second controller, the first controller is controlled to be adjusted from a user disabled state to a user using state, wherein the user disabled state indicates that the first controller cannot control the water faucet to release water in response to the control of the user, and the user using state indicates that the first controller controls the water faucet to release water in response to the control of the user.
Optionally, the processing module 520 is further configured to determine that the water usage of the user is finished, adjust the first controller from the user usage state to the user disabled state, and notify the user of the user disabled state of the first controller.
In addition, the apparatus 500 may also be applied to the upper control system.
Thus, the obtaining module 510 is further configured to obtain an ID of the user;
the control module 520 is further configured to allocate a first password required for use to the user according to the ID of the user; determining the first controller in a user forbidden state from all controllers, and sending the first password to the user and the first controller; wherein the user disabled state indicates that the first controller is unable to control the faucet to release water in response to the user's control, and the user engaged state indicates that the first controller controls the faucet to release water in response to the user's control.
Optionally, the control module 520 is further configured to issue the first password to the second controller in a user disabled state; and deleting the first password on the second controller according to a use instruction sent by the first controller, and adjusting the first controller from a user disabled state to a user used state.
Optionally, the control module 520 is further configured to adjust the first controller from the user use state to the user disabled state according to that the first controller informs that the first controller is in the user disabled state.
Optionally, the apparatus 500 may further include a sending module and a receiving module, where the sending module is configured to implement a sending function of data, and the receiving module is configured to implement a receiving function of data.
Alternatively, the sending module and the receiving module may be integrated into one module, such as a transceiver module. The transceiver module is used for realizing the sending function and the receiving function of the communication device.
Alternatively, the various functional modules of the apparatus 500, such as the sending module, the receiving module, the obtaining module and the control module, may be integrated into one processing module. Wherein the processing module is used for implementing the processing function of the apparatus 500.
Optionally, the apparatus 500 may further include a storage module storing a program or instructions. The program or instructions, when executed by the processing module, enable the apparatus 500 to perform the methods described above.
Further, the following describes the components of the control device 600 of the cryptographic networking controller in detail with reference to fig. 6:
the processor 601 is a control center of the control device 600 of the cryptographic network controller, and may be a single processor or a collective name of a plurality of processing elements. For example, the processor 601 is one or more Central Processing Units (CPUs), or may be an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application, such as: one or more microprocessors (digital signal processors), or one or more Field Programmable Gate Arrays (FPGAs).
Alternatively, processor 601 may perform the various functions of gas malodour agent concentration measurement sensor sensitivity calibration apparatus 600 by running or executing a software program stored in memory 602, and invoking data stored in memory 602.
In particular implementations, processor 601 may include one or more CPUs such as CPU0 and CPU1 shown in fig. 6 as an example.
In one embodiment, the control device 600 of the cryptographic networking controller may also include a plurality of processors, such as the processor 601 and the processor 604 shown in fig. 6. Each of these processors may be a single-Core Processor (CPU) or a multi-Core Processor (CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The memory 602 is configured to store a software program for executing the scheme of the present application, and the processor 601 controls the execution of the software program.
Alternatively, the memory 602 may be a read-only memory (ROM) or other type of static storage device that may store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that may store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory 602 may be integrated with the processor 601, or may be independent, and is coupled to the processor 601 through an interface circuit (not shown in fig. 6) of the control device 600 of the cryptographic networking controller, which is not specifically limited in this embodiment of the present application.
A transceiver 603 for communication with other communication devices. For example, the control device 600 of the cryptographic networking controller is a terminal device, and the transceiver 603 may be used to communicate with a network device or with another terminal device. Also for example, the control device 600 of the cryptographic networking controller is a network device, and the transceiver 603 may be used to communicate with a terminal device or with another network device.
Optionally, the transceiver 603 may include a receiver and a transmitter (not separately shown in fig. 6). Wherein the receiver is configured to implement a receive function and the transmitter is configured to implement a transmit function.
Alternatively, the transceiver 603 may be integrated with the processor 601, or may be independent, and is coupled to the processor 601 through an interface circuit (not shown in fig. 6) of the control device 600 of the cryptographic type networking controller, which is not specifically limited in this embodiment of the present application.
It should be noted that the structure of the apparatus 600 shown in fig. 6 does not constitute a limitation of the communication apparatus, and an actual communication apparatus may include more or less components than those shown, or combine some components, or arrange different components.
In addition, the technical effects of the method described in the above method embodiment can be referred to for the technical effects of the apparatus 600, and are not described herein again.
It should be understood that the processor in the embodiments of the present application may be a Central Processing Unit (CPU), and the processor may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It will also be appreciated that the memory in the embodiments of the subject application can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable EPROM (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of example, but not limitation, many forms of Random Access Memory (RAM) are available, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and direct bus RAM (DRRAM).
The above embodiments may be implemented in whole or in part by software, hardware (e.g., circuitry), firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product comprises one or more computer instructions or computer programs. The procedures or functions according to the embodiments of the present application are wholly or partially generated when the computer instructions or the computer program are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium. The semiconductor medium may be a solid state disk.
It should be understood that the term "and/or" herein is merely one type of association relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. In addition, the "/" in this document generally indicates that the former and latter associated objects are in an "or" relationship, but may also indicate an "and/or" relationship, which may be understood with particular reference to the former and latter text.
In the present application, "at least one" means one or more, "a plurality" means two or more. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and the actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some feature fields may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A cryptographic networking controller, comprising: the system comprises an upper control system and a first controller connected with the upper control system;
the upper control system is used for acquiring an ID of a user, distributing a first password required by use for the user according to the ID of the user, determining a first controller in a user forbidden state from all controllers, and issuing the first password to the user and the first controller;
the first controller is used for acquiring a second password input by the user, determining that the second password is the same as the first password, and controlling the first controller to adjust from a user disabled state to a user using state, wherein the user disabled state indicates that the first controller cannot control the faucet to release water in response to the control of the user, and the user using state indicates that the first controller controls the faucet to release water in response to the control of the user.
2. The cryptographic networking controller of claim 1, further comprising: a second water control system;
the upper control system is further configured to issue the first password to the second controller in a user disabled state;
the first controller is also used for sending a use instruction to the upper control system after determining that the second password is the same as the first password;
the upper control system is further configured to delete the first password on the second controller according to the use instruction, and adjust the first controller from a user disabled state to a user used state.
3. The cryptographic networking controller of claim 2,
and after the upper control system distributes the first password, if the use instruction is not received within a preset time length, deleting the first password on the first controller and the second controller.
4. The cryptographic networking controller of claim 2,
the first controller is further used for determining that the water consumption of the user is finished, adjusting the use state of the first controller from a user use state to a user forbidden state, and informing the upper control system of the user forbidden state of the first controller;
the first controller is further used for adjusting the first controller from a user use state to a user forbidden state according to the notification of the first controller.
5. The cryptographic networking controller of claim 2,
the first controller and the second controller are provided with keys for a user to input the second password; .
6. A method for controlling a cryptographic networking controller, the cryptographic networking controller comprising: the system comprises an upper control system and a first controller connected with the upper control system; the method is applied to the first controller, and comprises the following steps:
acquiring a second password input by a user;
judging whether the second password is the same as a preset first password or not, wherein the first password is as follows: the ID of the user of the upper control system is a password distributed by the user;
if the first controller is the same as the second controller, the first controller is controlled to be adjusted from a user disabled state to a user using state, wherein the user disabled state indicates that the first controller cannot control the water faucet to release water in response to the control of the user, and the user using state indicates that the first controller controls the water faucet to release water in response to the control of the user.
7. The method for controlling a cryptographic networking controller of claim 6, the method further comprising:
and determining that the water consumption of the user is finished, adjusting the first controller from the user using state to the user forbidden state, and informing the user of the forbidden state of the first controller to the upper control system.
8. A method for controlling a cryptographic networking controller, the cryptographic networking controller comprising: the system comprises an upper control system and a first controller connected with the upper control system; the method is applied to the upper control system and comprises the following steps:
acquiring an ID of a user;
distributing a first password required by use for the user according to the ID of the user;
determining the first controller in a user forbidden state from all controllers, and sending the first password to the user and the first controller; wherein the user disabled state indicates that the first controller is unable to control the faucet to release water in response to the user's control, and the user engaged state indicates that the first controller controls the faucet to release water in response to the user's control.
9. The method for controlling a cryptographic networking controller of claim 8, wherein the cryptographic networking controller further comprises: a second water control system, the method further comprising:
sending the first password to the second controller in a user disabled state;
and deleting the first password on the second controller according to a use instruction sent by the first controller, and adjusting the first controller from a user disabled state to a user used state.
10. The method for controlling a password-based networked controller of claim 8, further comprising:
and adjusting the first controller from the user use state to the user forbidden state according to the fact that the first controller informs that the first controller is in the user forbidden state.
CN202011295165.8A 2020-11-18 2020-11-18 Cipher type networking controller and control method Pending CN112396757A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011295165.8A CN112396757A (en) 2020-11-18 2020-11-18 Cipher type networking controller and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011295165.8A CN112396757A (en) 2020-11-18 2020-11-18 Cipher type networking controller and control method

Publications (1)

Publication Number Publication Date
CN112396757A true CN112396757A (en) 2021-02-23

Family

ID=74607085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011295165.8A Pending CN112396757A (en) 2020-11-18 2020-11-18 Cipher type networking controller and control method

Country Status (1)

Country Link
CN (1) CN112396757A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107730733A (en) * 2017-11-16 2018-02-23 安徽亘达信息科技有限公司 A kind of water control system and its water quantity control method based on dynamic ID identification code
CN108346239A (en) * 2018-02-05 2018-07-31 新开普电子股份有限公司 A kind of virtual card application system and method based on bathhouse
CN108765745A (en) * 2018-08-06 2018-11-06 山东弘毅节能服务有限公司 A kind of split type Internet of Things intelligence water control machine and application method
CN109584451A (en) * 2019-01-07 2019-04-05 新开普电子股份有限公司 A kind of application method of virtual card fission water regulator

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107730733A (en) * 2017-11-16 2018-02-23 安徽亘达信息科技有限公司 A kind of water control system and its water quantity control method based on dynamic ID identification code
CN108346239A (en) * 2018-02-05 2018-07-31 新开普电子股份有限公司 A kind of virtual card application system and method based on bathhouse
CN108765745A (en) * 2018-08-06 2018-11-06 山东弘毅节能服务有限公司 A kind of split type Internet of Things intelligence water control machine and application method
CN109584451A (en) * 2019-01-07 2019-04-05 新开普电子股份有限公司 A kind of application method of virtual card fission water regulator

Similar Documents

Publication Publication Date Title
US10657241B2 (en) Mobile authentication using a wearable device
US9626815B2 (en) Method for unlocking electronic device, and apparatus therefor
KR102368614B1 (en) Authentication Processing Method and electronic device supporting the same
US20170103382A1 (en) Method of providing payment service and electronic device for implementing same
CN106610776B (en) Electronic device and method for executing application or service
US10735390B2 (en) Method for authentication and electronic device supporting the same
US9986436B2 (en) Random password forced failure
EP3539046B1 (en) Electronic device and method for managing data in electronic device
KR102264431B1 (en) An electronic device having the plurality of piezolectric sensor
KR102544488B1 (en) Electronic apparatus and method for performing authentication
KR102476103B1 (en) Operating Method for Sharing Content and electronic device supporting the same
EP3131267B1 (en) Electronic device and method for commonly using the same
US20160378963A1 (en) Authentication of gesture input through rfid scans
CN108460261B (en) Method for managing content and electronic device thereof
US11934247B2 (en) Information processing apparatus and information processing method
JP2013190900A (en) Terminal device
KR102553318B1 (en) Device for Performing Transaction and Method Thereof
JP6360778B2 (en) Wearable terminal and portable terminal
CN109804608B (en) Providing access to structured storage data
KR102508799B1 (en) Electronic apparatus and method for unlocking locking device
CN112396757A (en) Cipher type networking controller and control method
KR20180105819A (en) Key Controlling Method For Using Rule and Electronic Device Thereof
KR102558661B1 (en) Electronic device and method for operating the same
CN108121922B (en) Information display method and electronic equipment
US20220182392A1 (en) Remote action authorization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210223