CN112712373B - Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal equipment and storage medium - Google Patents

Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal equipment and storage medium Download PDF

Info

Publication number
CN112712373B
CN112712373B CN201911023663.4A CN201911023663A CN112712373B CN 112712373 B CN112712373 B CN 112712373B CN 201911023663 A CN201911023663 A CN 201911023663A CN 112712373 B CN112712373 B CN 112712373B
Authority
CN
China
Prior art keywords
electronic cigarette
activation code
verification
user
cigarette
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911023663.4A
Other languages
Chinese (zh)
Other versions
CN112712373A (en
Inventor
古莹飘
王业凝
金刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sotrowin Technology Co ltd
Original Assignee
Shenzhen Sotrowin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sotrowin Technology Co ltd filed Critical Shenzhen Sotrowin Technology Co ltd
Priority to CN201911023663.4A priority Critical patent/CN112712373B/en
Priority to PCT/CN2020/121150 priority patent/WO2021078057A1/en
Publication of CN112712373A publication Critical patent/CN112712373A/en
Application granted granted Critical
Publication of CN112712373B publication Critical patent/CN112712373B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • AHUMAN NECESSITIES
    • A24TOBACCO; CIGARS; CIGARETTES; SIMULATED SMOKING DEVICES; SMOKERS' REQUISITES
    • A24FSMOKERS' REQUISITES; MATCH BOXES; SIMULATED SMOKING DEVICES
    • A24F40/00Electrically operated smoking devices; Component parts thereof; Manufacture thereof; Maintenance or testing thereof; Charging means specially adapted therefor
    • A24F40/10Devices using liquid inhalable precursors
    • AHUMAN NECESSITIES
    • A24TOBACCO; CIGARS; CIGARETTES; SIMULATED SMOKING DEVICES; SMOKERS' REQUISITES
    • A24FSMOKERS' REQUISITES; MATCH BOXES; SIMULATED SMOKING DEVICES
    • A24F40/00Electrically operated smoking devices; Component parts thereof; Manufacture thereof; Maintenance or testing thereof; Charging means specially adapted therefor
    • A24F40/65Devices with integrated communication means, e.g. Wi-Fi
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce

Abstract

The application relates to the field of electronic cigarettes and provides an electronic cigarette verification method, an electronic cigarette chip, an electronic cigarette, terminal equipment and a storage medium, wherein the electronic cigarette verification method comprises the following steps: under the condition that the user of the electronic cigarette passes the authentication, receiving an activation code sent by external equipment; checking the activation code; and under the condition that the activation code passes the verification, executing unlocking action. The embodiment of the application can provide a better anti-counterfeiting verification function.

Description

Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal equipment and storage medium
Technical Field
The application relates to the field of electronic cigarettes, in particular to an electronic cigarette verification method, an electronic cigarette chip, an electronic cigarette, terminal equipment and a computer readable storage medium.
Background
An electronic atomizer (VAPE or electronic cigarette, english) commonly called as an "electronic cigarette" is a product that is driven by a battery to heat tobacco tar in an oil tank to become vapor and then be inhaled by a user.
Generally, the battery, the atomizer and other structures are arranged in the tobacco stem of the electronic cigarette, while tobacco tar is filled in the tobacco cartridge, and propylene glycol, plant glycerol, edible essence or nicotine is contained in the tobacco tar. Because the electronic cigarette does not need to burn, only 'steam' is generated, and tar and carbon monoxide are not generated, part of medical staff think that the electronic cigarette is a potential nicotine substitute, the influence of part of traditional cigarettes on the body and the possibility of fire disaster can be reduced theoretically, and smokers who replace the cigarettes with the electronic cigarette can be far away from cancerogenic substances in the cigarettes.
However, the electronic cigarettes in the prior art lack effective and controllable anti-counterfeiting monitoring technology, and counterfeit electronic cigarettes are likely to harm the health of users.
Disclosure of Invention
To solve the above problems or at least partially solve the above technical problems, in one embodiment of the present application, an electronic cigarette verification method is provided. The electronic cigarette verification method comprises the following steps:
receiving an activation code sent by external equipment;
checking the activation code;
and under the condition that the activation code passes the verification, executing unlocking action.
Another embodiment of the present application provides an electronic cigarette verification method, including:
establishing communication connection with the electronic cigarette;
responding to a data input event triggered by a user through an interactive interface, and acquiring identity data input by the user in the data input event;
verifying the identity of the user of the electronic cigarette according to the identity data;
acquiring an activation code under the condition that the identity data passes verification;
and sending the activation code to the electronic cigarette to activate the electronic cigarette.
Another embodiment of the present application also provides an electronic cigarette verification method, including:
establishing communication connection with the electronic cigarette;
acquiring an activation code;
and sending the activation code to the electronic cigarette to activate the electronic cigarette.
The embodiment of the application also provides an electronic cigarette chip, which comprises:
the electronic cigarette communication module is used for being in communication connection with external equipment;
and the electronic cigarette verification module is used for verifying the activation code received by the communication module from the external equipment and executing unlocking action under the condition that the activation code passes the verification.
The embodiment of the application also provides an electronic cigarette, which comprises an electronic cigarette chip, wherein the electronic cigarette chip comprises:
the electronic cigarette communication module is used for being in communication connection with external equipment;
and the electronic cigarette verification module is used for verifying the activation code received by the communication module from the external equipment and executing unlocking action under the condition that the activation code passes the verification.
The embodiment of the application also provides a terminal device, which is characterized by comprising:
the short-distance communication module is used for establishing communication connection with the electronic cigarette;
the terminal acquisition module is used for acquiring identity data input by a user;
the verification module is used for verifying the identity of the user of the electronic cigarette according to the identity data;
the terminal communication module is used for acquiring an activation code under the condition that the identity data passes verification, and sending the activation code to the electronic cigarette so as to activate the electronic cigarette.
Embodiments of the present application also provide a computer readable storage medium storing a computer program, which when executed by a processor, enables implementation of steps in any one of the methods described above.
Embodiments of the present application also provide a computing device comprising: a memory and a processor, wherein,
the memory is used for storing programs;
the processor is coupled to the memory for executing the program stored in the memory for implementing the steps of any one of the methods described above.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following description will make brief introduction to the drawings used in the description of the embodiments or the prior art. It is apparent that the figures in the following description are only for illustrating some embodiments of the present application, and that it is possible for a person skilled in the art to obtain technical features, connection relations and even method steps not mentioned in other figures from these figures without inventive effort.
Fig. 1 is a schematic communication diagram of an electronic cigarette and an external device according to an embodiment of the present application;
fig. 2 is an unlocking flowchart of an electronic cigarette according to another embodiment of the present application;
fig. 3 is a block diagram of a communication connection module of an electronic cigarette, a terminal device, and a server according to another embodiment of the present application;
fig. 4 is an authentication flow chart of an electronic cigarette according to another embodiment of the present application;
fig. 5 is a block diagram of a communication connection module of an electronic cigarette, a terminal device, and a server according to another embodiment of the present application;
fig. 6 is a schematic communication diagram of an electronic cigarette and an external device according to another embodiment of the present application;
FIG. 7 is a block diagram of a computing device of an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some of the embodiments of the present application, but not all of the embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present disclosure.
It is to be understood that the terminology used in the description of the embodiments of the application is for the purpose of describing particular embodiments only, and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, the "plurality" generally includes at least two, but does not exclude the case of at least one.
It should be understood that although the terms first, second, third, etc. may be used in embodiments of the present application to describe certain components, these components should not be limited to only these terms. These terms are only used to distinguish one element from another. For example, a first component may also be referred to as a second component, and similarly, a second component may also be referred to as a first component, without departing from the scope of embodiments of the present application.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a product or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such product or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a commodity or system comprising such elements.
While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated by one of ordinary skill in the art that the methodologies are not limited by the order of acts, as some acts may, in accordance with one or more embodiments, occur in different orders and/or concurrently with other acts from that shown and described herein or otherwise not shown and described herein, as would be understood and appreciated by those skilled in the art.
Those of skill would further appreciate that the various illustrative logical blocks, modules, units, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, units, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The inventors of the present application found that: in the prior art, some anti-counterfeiting verification methods for electronic cigarettes are designed, however, the anti-counterfeiting methods are generally limited to the electronic cigarette, namely anti-counterfeiting between a cigarette rod and a cigarette bullet, and ciphertext is easy to crack.
In view of this, embodiments of the present application provide an electronic cigarette verification method, an electronic cigarette chip, an electronic cigarette, a terminal device, and a computer-readable storage medium.
An electronic cigarette chip, as shown in fig. 1, includes:
the electronic cigarette communication module is used for being in communication connection with external equipment;
and the electronic cigarette verification module is used for verifying the activation code received by the communication module from the external equipment and executing unlocking action under the condition that the activation code passes the verification.
The embodiment of the application also provides an electronic cigarette, which comprises the electronic cigarette chip. In addition, the electronic cigarette can also comprise an electronic cigarette working module connected with the electronic cigarette chip. When the electronic cigarette chip executes unlocking action, the electronic cigarette working module can start working so as to heat the electronic cigarette cartridge.
In the embodiment of the present application, the external device may be a server, a terminal device for relay connection with the server, or just an independent terminal device. The form and scale of the external device are not limited as long as the activation code can be provided for the electronic cigarette.
The trigger of sending the activation code from the external device to the electronic cigarette chip may be that the activation code is requested by the electronic cigarette, or that the activation code is actively sent by the external device. When the activation code is requested through the electronic cigarette, the characteristic data of the tobacco stem and the tobacco cartridge of the electronic cigarette can be sent to the server through the electronic cigarette, so that the server can verify authenticity.
The embodiment of the application also provides an electronic cigarette verification method which can be applied to the electronic cigarette chip, and referring to fig. 2, the method comprises the following steps:
receiving an activation code sent by external equipment;
checking the activation code;
and under the condition that the activation code passes the verification, executing the unlocking action.
For simplicity of description, referring to fig. 1, next, an application scenario is given by taking a stand-alone external device as an example:
scene one
The user purchases an electronic cigarette to home on line. After the package of the electronic cigarette is opened at home, a switch of the electronic cigarette is turned on. At this time, the electronic cigarette tries to connect with the network through the electronic cigarette communication module to acquire the activation code. If the acquisition fails, the electronic cigarette working module does not work, and the electronic cigarette cannot be used. If the acquired activation code is correctly checked in the electronic cigarette chip, the electronic cigarette working module can work and the electronic cigarette can be used.
The electronic cigarette communication module can be a plurality of communication modules in the forms of GSM, 3G, 4G, 5G and the like. The wireless connection with external equipment can be realized by means of the low-power-consumption narrowband Internet of things such as NB-IOT or LoRa. Of course, the electronic cigarette communication module can also access the internet by means of WIFI.
Based on the application scene, a cigarette rod of the electronic cigarette can be provided with a mechanism for verifying the cigarette bullet of the electronic cigarette. When the user wants to inhale the cigarette each time, or when new cartridges are installed, the user can check the cartridge once, and the feature code of the cartridge is sent to the server. If the cartridge is likely to be forged, the server does not return the activation code, and the electronic cigarette cannot work, so that the health of a user is protected.
It should be noted that, since the battery capacity of the electronic cigarette is relatively small, the endurance time is ensured. The electronic cigarette generally does not need to be provided with an excessively complex electronic structure. Accordingly, the terminal equipment connected with the electronic cigarette can participate in verification, so that the service time of the electronic cigarette can be prolonged. As described above, the external device referred to in the present application may be a server, an independent terminal device, or a terminal device connected to the server.
Based on the above consideration, the embodiment of the present application further provides a terminal device, as shown in fig. 3, including:
the short-distance communication module is used for establishing communication connection with the electronic cigarette;
and the verification module is used for acquiring the activation code and sending the activation code to the electronic cigarette through the close range communication module so as to activate the electronic cigarette.
The terminal device of the application may be a fixed terminal or a mobile terminal. The terminal device can provide the verification activation code, and can also be in communication connection with a server, and the activation code can be obtained from the server. When the activation code is acquired through the server, local cracking of the terminal can be effectively prevented, and safety is improved.
Corresponding to the terminal equipment, the embodiment of the application also provides an electronic cigarette verification method, which comprises the following steps:
establishing communication connection with the electronic cigarette;
acquiring an activation code;
and sending the activation code to the electronic cigarette to activate the electronic cigarette.
That is, optionally, the step of receiving the activation code transmitted by the external device includes:
receiving an activation code fed back by a server through terminal equipment; or,
and acquiring the activation code fed back by the external device through a communication link established with the external device.
Because the embodiment of the application connects the server through the provided terminal equipment and acquires the activation code, compared with the electronic cigarette directly connected with the server, the electronic cigarette only needs to bear the power consumption of near field communication, and the endurance time of the electronic cigarette is obviously prolonged. Specifically, the electronic cigarette can be connected with the terminal device through a low-power Bluetooth or a wired interface.
When the activation code is acquired through the server, the method may further include the steps of: and receiving the activation code generated and transmitted by the server aiming at the information of the electronic cigarette.
The activation code generated and sent by adopting the information aiming at the electronic cigarette has higher security.
As a substitute for nicotine substances, electronic cigarettes have a certain addiction. The purchasable age of electronic cigarettes is therefore basically limited to adults in various countries. However, the applicant of the present application has found that no viable authentication solutions have been devised in the prior art for purchasers of electronic cigarettes, and that, generally, the electronic cigarettes are still readily available to minors.
The inventor of the application considers that the purchasing channel, purchasing path and using scene of the electronic cigarette can be physically traced by a technical means. So as to realize the real-name supervision of the purchase and use of the electronic cigarette.
Accordingly, for the electronic cigarette, another embodiment of the present application provides an electronic cigarette verification method, as shown in fig. 4, including:
under the condition that the user of the electronic cigarette passes the authentication, receiving an activation code sent by external equipment;
checking the activation code;
and under the condition that the activation code passes the verification, executing unlocking action.
Accordingly, as well, the external device may be a terminal device or a server, and for the terminal device, the embodiment of the present application also provides an electronic cigarette verification method, still referring to fig. 4, including:
establishing communication connection with the electronic cigarette;
responding to a data input event triggered by a user through an interactive interface, and acquiring identity data input by the user in the data input event;
verifying the identity of the user of the electronic cigarette according to the identity data;
under the condition that the identity data passes the verification, acquiring an activation code;
and sending the activation code to the electronic cigarette to activate the electronic cigarette.
Correspondingly, in the verification method of the electronic cigarette, the method further comprises the following steps:
establishing communication connection with the terminal equipment;
and sending an activation request of the electronic cigarette through the terminal equipment so that the terminal equipment can send the identity data of the user of the electronic cigarette to a server, and the server can carry out identity verification on the user of the electronic cigarette based on the identity verification data.
And optionally, verifying the identity of the user of the electronic cigarette according to the identity data, including:
and sending the identity data and the information of the electronic cigarette to a server so that the server can verify the identity of the user of the electronic cigarette based on the identity data.
Based on the above consideration, the embodiment of the present application further provides an electronic cigarette chip, an electronic cigarette and a terminal device, where, referring to fig. 5, the electronic cigarette chip includes:
the electronic cigarette communication module is used for being in communication connection with external equipment;
and the electronic cigarette verification module is used for verifying the activation code received by the communication module from the external equipment under the condition that the user of the electronic cigarette passes the authentication, and executing the unlocking action under the condition that the activation code passes the verification.
The electronic cigarette comprises the electronic cigarette chip.
The terminal device, also shown with reference to fig. 5, includes:
the short-distance communication module is used for establishing communication connection with the electronic cigarette;
the terminal acquisition module is used for acquiring identity data input by a user;
the verification module is used for verifying the identity of the user of the electronic cigarette according to the identity data, acquiring the activation code under the condition that the identity data passes the verification, and sending the activation code to the electronic cigarette through the close range communication module so as to activate the electronic cigarette.
For embodiments of the present application, the identity data may include at least age information of the user, and in verifying the identity of the user of the e-cigarette based on the identity data, the condition for passing verification should include at least a legal adult age of greater than or equal to the place of sale of the e-cigarette, or an age of a legal purchasable nicotine product.
To facilitate communication with a remote server, the authentication module may include:
and the remote communication module is used for sending the identity data and the information of the electronic cigarette to the server so that the server can verify the identity of the user of the electronic cigarette based on the identity data.
The remote communication module can be a wired network card connected with the Internet or a wireless network module based on technologies such as a mobile data communication network, WIFI, bluetooth, NB-IOT/LoRa and the like. The near field communication module corresponds to the remote communication module and is responsible for communicating with the communication module of the electronic cigarette. In this application, a near field communication module refers to "near field" communication in a broad sense, and not just to "near field communication module", that is to say "near field" referred to in this application, mainly by naming for distinction from a "remote" communication module responsible for communication with a server. The communication principle of the communication module can be consistent with the remote communication module or inconsistent with the remote communication module. Specifically, the communication module may be a bluetooth module, an NFC module, a WIFI module, and so on. In general, a bluetooth module capable of achieving both convenience and cruising is a preferred solution.
In addition, the terminal device mentioned in the application can be a smart phone, a smart watch and other handheld mobile devices which are used by users, or an automatic vending machine which is connected with a server through a remote communication module and used for vending electronic cigarettes. The technical solutions of the two embodiments are different, and will be specifically exemplified below.
First, a hand-held mobile device such as a smart phone or a smart watch will be described as an example. When the terminal equipment is a handheld mobile equipment, a user can carry out identity verification through the handheld mobile equipment carried at any time, and the terminal equipment has very excellent flexibility and convenience.
For example, when a smart phone is used as the terminal device, the terminal acquisition module may include a fingerprint recognition element, a camera, a touch screen, a microphone, and the like of the smart phone. Accordingly, the identity data may then include: fingerprint, voiceprint, facial recognition data, iris recognition data, and the like.
The verification module can forward the identity data acquired by the terminal acquisition module to the server, and compare the identity data with the identity data stored by the server, and can also compare the identity data locally. The identity of the user can be confirmed through comparison, and the illegal user is prevented from purchasing, obtaining and using the electronic cigarette.
Further, the identity data may include:
user identification number and biometric data. The identity of the user can be better confirmed by comparing the certificate number with the biological characteristic data so as to clearly determine the use qualification of the user.
Next, another application scenario will be given on the basis of the above scheme:
scene two
The user purchases an electronic cigarette online or to a store and returns to home. After the package of the electronic cigarette is opened at home, a switch of the electronic cigarette is turned on.
According to the instruction, the user matches the electronic cigarette communication module with the near field communication module of the smart phone held by the user, and establishes connection.
After the connection is successful, the intelligent mobile phone prompts the user to input identity data on the interactive interface. For example, a user may enter an identification number via a touch screen, a keypad, take a photograph of the face, or collect a fingerprint, etc.
After the intelligent mobile phone acquires the identity data, the intelligent mobile phone transmits the identity data to the server through the verification module. The server performs identity data comparison and verification in the background, and returns an activation code to the smart phone after the verification is successful.
It should be noted that, the electronic cigarette communication module may also send its own feature data to the server through the smart phone, so that the server returns an activation code corresponding to the feature data. The feature data may include an ID, a lot, and the like of the electronic cigarette.
The activation code is sent to a verification module of the electronic cigarette through the terminal equipment. When the verification module passes the verification of the activation code, the unlocking action is executed, so that the electronic cigarette working module can work normally.
If the authentication of the identity data by the server fails, the activation code is not returned. If the illegal user tries to crack the verification, the wrong activation code is returned, and the verification of the electronic cigarette verification module cannot be passed, so that the electronic cigarette working module cannot work.
The reasons for the failure of the authentication of the identity data may include: age of the user does not reach legal age, biometric data of the user does not match, etc.
In the second scenario, the verification may be performed only for the first use of the electronic cigarette, or may be required every time the electronic cigarette is used. The former has better convenience, and the latter has better safety. When the used electronic cigarette is bound, the power supply of the electronic cigarette is started every time, and the terminal equipment can be automatically connected with the electronic cigarette and synchronize the use data of the electronic cigarette, so that the electronic cigarette is very convenient. In addition, the user can establish an account for himself in the application program of the terminal equipment or adopt an associated account of a third party application program (such as WeChat and payment treasury) so as to better maintain own use data.
It should be noted that, when the identity data includes biometric data of the user, verifying the identity of the user of the electronic cigarette according to the identity data may include:
the biometric data of the user is compared to the locally stored biometric data to determine if the identity data is verified.
That is, the terminal device may store the biometric data locally. Therefore, communication with the cloud end is not needed when the identity is verified every time, verification efficiency can be remarkably improved, and use experience of the electronic cigarette is improved. Particularly, for a scheme that needs verification every time the electronic cigarette is used, a more friendly use environment can be provided.
Accordingly, we present another application scenario:
scene three
The user has authenticated the electronic cigarette at hand and its biometric data, such as a fingerprint, has been stored in the user's handheld mobile device.
The user suddenly wants to smoke. After the electronic cigarette is taken out and the power supply is turned on, the handheld mobile device prompts a user that the fingerprint is required to be unlocked.
The user inputs the fingerprint, can accomplish the unblock action, and the electron cigarette is usable.
Therefore, the fingerprint of the user is required to be identified before smoking, so that the electronic cigarette can be prevented from being taken by children and teenagers around the user. The safety is better improved.
It is particularly worth mentioning that the terminal device may not only verify with the help of the locally stored biometric data, but also optionally the step of verifying the identity of the user of the electronic cigarette according to the identity data, further comprises:
and sending the identity data and the information of the electronic cigarette to an associated application program so that the associated application program can verify the identity of the user of the electronic cigarette based on the identity data.
That is, the aforementioned authentication module may include:
and the association module is used for sending the identity data and the information of the electronic cigarette to an associated application program so that the associated application program can verify the identity of the user of the electronic cigarette based on the identity data.
The related application referred to herein generally refers to an application that has collected and verified user identity data for payment, security, and the like. In the prior art, there are some "national-level" applications where the installed amount is large, such as payment treasures, weChat, etc. Such applications often have identified and verified the user's identity data in order to provide secure payment functionality. Therefore, when the electronic cigarette needs to verify the identity of the user, the electronic cigarette can directly make a request to the public API interface of the application programs, and the identity verification of the user can be obtained through the authorization of the application programs.
The identity verification is performed by using the associated application program, so that the safety of the user identity data is better ensured, and verification resources are saved.
The terminal device mentioned in the present application may also be a vending machine connected to the server via a remote communication module for vending electronic cigarettes.
Next, a specific explanation will be made for the case where the terminal device is a vending machine.
When the terminal device is a vending machine, the electronic cigarette is arranged in the vending machine, and the electronic cigarette can be in communication connection with the vending machine in various manners. The specific connection manner is already referred to in the foregoing, and will not be described in detail here.
The electronic cigarette can verify whether the identity of the user meets the requirement of using the electronic cigarette before and after being purchased. Accordingly, we take the example before purchase as another application scenario:
scene four
The electronic cigarette is disposed within the vending machine.
After the user selects the electronic cigarette to be purchased before the vending machine, the vending machine gives a prompt, and the identity data of the user is required to be collected and verified.
Specifically, the vending machine may be provided with: an identification card verification device, a camera, a fingerprint identification element, etc. The user can correspondingly verify the identity of the user by brushing an identity card, facial recognition, fingerprint recognition and the like.
After the user completes the verification of the identity and payment, the vending machine releases the electronic cigarettes purchased by the user to complete the transaction. The step of unlocking the electronic cigarette is the same as the foregoing scenario, and is not repeated.
Through set up identification on automatic vending machine, can just filter the user in purchasing the link, can prevent more effectively that the minors from purchasing the electron cigarette.
Taking post-purchase verification as an example, the application also provides an application scenario:
scene five
The electronic cigarette is disposed within the vending machine. The user may take out the purchased e-cigarettes after payment. Of course, the user may also obtain the purchased electronic cigarette through other channels.
And the user is in communication connection with the vending machine through operating the interactive interface of the vending machine, and a request for activating the electronic cigarette is provided. The vending machine gives prompts requesting the collection and verification of the user's identity data.
The server background performs identity data comparison and verification through the identity data sent by the vending machine, and returns an activation code to the vending machine after verification is successful. The vending machine transmits the activation code to the electronic cigarette by utilizing communication connection with the electronic cigarette so as to be checked by the electronic cigarette checking module. After the verification is successful, the working module of the electronic cigarette can work.
In addition, the electronic cigarette can acquire the identity data of the user by the electronic cigarette without using external equipment. That is, the interactive element may also be disposed on the electronic cigarette to obtain the identity data of the user.
Thus, optionally, the foregoing method may further comprise:
responding to a data input event triggered by a user on an interaction element of the electronic cigarette, and acquiring identity data input by the user;
the identity data is sent to the external device over a communication link established with the external device for verification of the identity data by the external device.
Wherein the interaction element may equally be: fingerprint recognition elements, microphones, cameras, etc. Accordingly, the identity data may also include: user fingerprints, user voices, user avatars, and the like. And will not be described in detail.
It is worth noting that in the prior art, electronic cigarettes often include a tobacco rod and a cartridge. These two components may be purchased separately. In the foregoing, the tobacco rod and cartridge are not distinguished, and only "e-cigarette" or "e-cigarette chip" is mentioned generically. Those of ordinary skill in the art will appreciate that the above-described techniques may be applicable whether a tobacco rod or cartridge is purchased for use, or a complete electronic cigarette. That is, the tobacco rod chip and the cartridge chip can be respectively arranged on the tobacco rod and the cartridge of the electronic cigarette. The cigarette stem and the cigarette bullet of the electronic cigarette can be respectively subjected to anti-counterfeiting and identity verification.
However, the battery, data interface or wireless chip is provided on the cartridge, which is costly. Accordingly, the inventors herein contemplate that a cartridge may be configured to be authenticated by a tobacco rod.
That is, each new cartridge is mounted to the stem, the aforementioned communication may be accomplished between the stem and the server to effect the aforementioned verification process.
Furthermore, alternatively, the cartridge may be authenticated only with the stem by means of local authentication. Referring specifically to fig. 6, optionally, the performing the unlocking action of the foregoing method may further include:
unlocking a tobacco rod of the electronic cigarette;
and, the foregoing method may further include:
the tobacco stem sends an agreement password to a tobacco cartridge connected with the tobacco stem in the electronic cigarette;
when the cigarette bullet judges that the agreement password meets the first requirement, the cigarette stem receives the dynamic password sent by the cigarette bullet;
when the tobacco stem judges that the dynamic password meets the second requirement, the tobacco stem sends out a driving signal so as to enable the electronic cigarette to enter a working state.
Wherein, the agreement password is a preset password before the tobacco stem and the tobacco cartridge leave the factory. Which may be generated from a dynamic one of the crypto intervals, thereby preventing cracking. The password interval in the tobacco stem chip can be updated through connection with a server. Therefore, every time a new batch of cartridges is marketed, the updated tobacco rod chip can realize the bidirectional password authentication of the batch of cartridges, and further has better safety.
It is worth mentioning that data may be written in the cartridge chip after the first pass of the verification, binding the cartridge with the stem. In this way, the same cartridge can be prevented from being abused to other tobacco stems after being refilled, and the safety is further improved. Optionally, as a cooperation, the method may further comprise the steps of:
counting the sucking times of a user and sending a counting writing signal to the cartridge chip;
and stopping heating the cartridge in response to a stop signal fed back by the cartridge chip according to the counting result.
By counting the number of times the user draws in the cartridge chip, the progress of use of the cartridge can be clarified. Further, when the count exceeds a preset threshold, the cartridge can be locked, so that illegal users can be prevented from refilling the cartridge, and potential safety hazards caused by recycling the cartridge chip are avoided.
Further, optionally, if the dynamic password meets the second requirement, the electronic cigarette enters a working state until the cartridge is taken out. Therefore, the cartridge is not required to be repeatedly verified on the premise that the cartridge is not taken out, the verification cost is saved, and the convenience is improved. And because the verification frequency is reduced, the battery use of the tobacco stems can be saved, and the endurance time is prolonged.
In addition, optionally, if the agreement password does not meet the first requirement or the dynamic password does not meet the second requirement, counting the number of times of the non-compliance. Further optionally, if the counted number of times that does not meet the requirement is greater than or equal to the preset failure number, sending a locking signal to a chip of the cartridge to lock the cartridge; or,
if the interval time of two adjacent events which do not meet the requirement is smaller than or equal to the preset failure time, a locking signal is sent to the chip of the cartridge so as to lock the cartridge.
Aiming at the chips of the cartridge and the tobacco stem, an illegal user can try to crack the activation code, the agreement password and the dynamic password by adopting a violent cracking means. When the password is cracked by violence, a large number of random numbers are often tried to be input to the chip in a short time, and the numbers which are successfully cracked are recorded as corresponding cracked passwords.
In the present application, however, by means of counting the number and frequency of unsatisfactory situations, the cartridge can be targeted for the user taking the cracking action. And once the cartridge is locked, the cartridge will not respond to any input signal, so that the cracking behavior of an illegal user can be effectively prevented.
Yet another embodiment of the present application further provides a computing device, as shown in fig. 7, comprising: a memory 51, and a processor 52, wherein,
a memory 51 for storing a program;
a processor 52 coupled to the memory 51 for executing programs stored in the memory 51 for:
under the condition that the user of the electronic cigarette passes the authentication, receiving an activation code sent by external equipment;
checking the activation code;
and under the condition that the activation code passes the verification, executing the unlocking action.
Still another embodiment of the present application provides a computing device, including: a memory 51, and a processor 52, wherein,
a memory 51 for storing a program;
a processor 52 coupled to the memory 51 for executing programs stored in the memory 51 for:
establishing communication connection with the electronic cigarette;
responding to a data input event triggered by a user through an interactive interface, and acquiring identity data input by the user in the data input event;
verifying the identity of the user of the electronic cigarette according to the identity data;
under the condition that the identity data passes the verification, acquiring an activation code;
and sending the activation code to the electronic cigarette to activate the electronic cigarette.
The memory 51 described above may be configured to store various other data to support operations on the computing device. Examples of such data include instructions for any application or method operating on a computing device. The memory 51 may be implemented by any type of volatile or non-volatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The processor 52 may realize other functions in addition to the above functions when executing the program in the memory 51, and specific reference is made to the description of the foregoing embodiments.
Further, as shown in fig. 7, the computing device may further include: communication component 43, display 44, power component 45, audio component 46, and other components. Only some of the components are schematically shown in fig. 7, which does not mean that the computing device only includes the components shown in fig. 7.
Accordingly, another embodiment of the present application further provides a computer readable storage medium storing a computer program, where the computer program stored in the computer readable storage medium can implement steps or functions in the foregoing methods when executed by a processor.
In summary, the embodiment of the application can provide a better anti-counterfeiting verification function, prevent illegal users from purchasing and using the electronic cigarette by verifying the identity of the user, and have good convenience.
Finally, it should be noted that those skilled in the art will understand that many technical details are presented in the embodiments of the present application in order to better understand the present application. However, the technical solutions claimed in the claims of the present application can be basically implemented without these technical details and various changes and modifications based on the above embodiments. Accordingly, in actual practice, various changes may be made in the form and details of the above-described embodiments without departing from the spirit and scope of the present application.

Claims (6)

1. An electronic cigarette verification method is characterized by comprising the following steps:
receiving an activation code sent by external equipment;
checking the activation code;
under the condition that the activation code passes the verification, unlocking action is executed;
under the condition that the user of the electronic cigarette passes the authentication, receiving an activation code sent by external equipment;
the external device is a terminal device, and the method further comprises:
establishing communication connection with the terminal equipment;
sending an electronic cigarette activation request through the terminal equipment so that the terminal equipment sends identity data of the electronic cigarette user to a server, and the server performs identity verification on the electronic cigarette user based on the identity verification data;
the receiving the activation code sent by the external device includes:
receiving the activation code fed back by the server through the terminal equipment; or alternatively
Acquiring the activation code fed back by the external equipment through a communication link established with the external equipment;
the performing an unlocking action includes:
unlocking a tobacco stem of the electronic cigarette;
the method further comprises the steps of:
the tobacco stem sends an agreement password to a tobacco cartridge connected with the tobacco stem in the electronic cigarette;
when the cigarette bullet judges that the agreement password meets the first requirement, the cigarette stem receives a dynamic password sent by the cigarette bullet;
when the tobacco stem judges that the dynamic password meets the second requirement, the tobacco stem sends out a driving signal so as to enable the electronic cigarette to enter a working state.
2. The method of claim 1, wherein if the dynamic password meets a second requirement, the e-cigarette enters an operable state until the cartridge is removed.
3. The method of claim 1, wherein if the agreement password does not meet the first requirement or the dynamic password does not meet the second requirement, counting the number of times of the non-compliance.
4. A method according to claim 3, wherein if the counted number of unsatisfactory times is greater than or equal to a preset number of failures, a locking signal is sent to the chip of the cartridge to lock the cartridge; or,
if the interval time of two adjacent events which do not meet the requirement is smaller than or equal to the preset failure time, a locking signal is sent to the chip of the cartridge so as to lock the cartridge.
5. A computer-readable storage medium storing a computer program, wherein the computer program is stored, and when executed by a computer, the computer program implements the electronic cigarette verification method according to any one of claims 1 to 4.
6. A computing device, comprising: a memory and a processor, the memory storing one or more computer instructions; the one or more computer instructions are configured to be invoked and executed by the processor to implement the e-cigarette authentication method of any one of claims 1-4.
CN201911023663.4A 2019-10-25 2019-10-25 Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal equipment and storage medium Active CN112712373B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201911023663.4A CN112712373B (en) 2019-10-25 2019-10-25 Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal equipment and storage medium
PCT/CN2020/121150 WO2021078057A1 (en) 2019-10-25 2020-10-15 Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911023663.4A CN112712373B (en) 2019-10-25 2019-10-25 Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112712373A CN112712373A (en) 2021-04-27
CN112712373B true CN112712373B (en) 2024-02-20

Family

ID=75540712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911023663.4A Active CN112712373B (en) 2019-10-25 2019-10-25 Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal equipment and storage medium

Country Status (2)

Country Link
CN (1) CN112712373B (en)
WO (1) WO2021078057A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115299639A (en) * 2021-05-07 2022-11-08 常州市派腾电子技术服务有限公司 Cigarette cartridge and verification method, device and system of cigarette cartridge
GB202111129D0 (en) * 2021-08-02 2021-09-15 Nicoventures Trading Ltd Aerosol provision arrangement

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105453598A (en) * 2013-05-20 2016-03-30 Sis资源有限公司 Application development for a network with an electronic cigarette
CN107205477A (en) * 2014-10-14 2017-09-26 方特慕控股第私人有限公司 electrical smoking device and capsule
CN107822208A (en) * 2017-12-11 2018-03-23 深圳市海派特光伏科技有限公司 Electronic cigarette and electronic cigarette activation system
CN109525571A (en) * 2018-11-07 2019-03-26 紫光测控有限公司 A kind of registration activation method and system of intelligent electronic device
CN109711142A (en) * 2018-11-28 2019-05-03 广东思格雷电子科技股份有限公司 A kind of electronic cigarette, electronic cigarette managing device and electronic cigarette management system
CN109717519A (en) * 2019-03-13 2019-05-07 常州市派腾电子技术服务有限公司 Electronic cigarette
CN109963606A (en) * 2016-05-25 2019-07-02 尤尔实验室有限公司 The control of electronic anesthetic vaporizer
CN109965354A (en) * 2017-11-22 2019-07-05 尤尔实验室有限公司 Electronic anesthetic vaporizer cross-correlation
CN110226778A (en) * 2019-06-27 2019-09-13 深圳雾芯科技有限公司 Electronic atomizer, electronic atomizer apparatus main body and electronic atomizer device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170093960A1 (en) * 2015-09-24 2017-03-30 Lunatech, Llc Vapor Device Ecosystem
CN105353653A (en) * 2015-09-28 2016-02-24 卓尔悦欧洲控股有限公司 Electronic cigarette control method, electronic cigarette control device, electronic cigarette control system and electronic cigarette
CN109581937A (en) * 2019-01-04 2019-04-05 惠州市新泓威科技有限公司 The electronic cigarette and its control method controlled by cell phone software
CN212260467U (en) * 2019-06-27 2021-01-01 深圳雾芯科技有限公司 Electronic atomizer device
CN110675167A (en) * 2019-09-24 2020-01-10 深圳市太美亚电子科技有限公司 Anti-counterfeiting system and method for electronic cigarette cartridge and background server

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105453598A (en) * 2013-05-20 2016-03-30 Sis资源有限公司 Application development for a network with an electronic cigarette
CN107205477A (en) * 2014-10-14 2017-09-26 方特慕控股第私人有限公司 electrical smoking device and capsule
CN109963606A (en) * 2016-05-25 2019-07-02 尤尔实验室有限公司 The control of electronic anesthetic vaporizer
CN109965354A (en) * 2017-11-22 2019-07-05 尤尔实验室有限公司 Electronic anesthetic vaporizer cross-correlation
CN107822208A (en) * 2017-12-11 2018-03-23 深圳市海派特光伏科技有限公司 Electronic cigarette and electronic cigarette activation system
CN109525571A (en) * 2018-11-07 2019-03-26 紫光测控有限公司 A kind of registration activation method and system of intelligent electronic device
CN109711142A (en) * 2018-11-28 2019-05-03 广东思格雷电子科技股份有限公司 A kind of electronic cigarette, electronic cigarette managing device and electronic cigarette management system
CN109717519A (en) * 2019-03-13 2019-05-07 常州市派腾电子技术服务有限公司 Electronic cigarette
CN110226778A (en) * 2019-06-27 2019-09-13 深圳雾芯科技有限公司 Electronic atomizer, electronic atomizer apparatus main body and electronic atomizer device

Also Published As

Publication number Publication date
WO2021078057A1 (en) 2021-04-29
CN112712373A (en) 2021-04-27

Similar Documents

Publication Publication Date Title
US10715520B2 (en) Systems and methods for decentralized biometric enrollment
US20210037892A1 (en) Smoking substitute device
CN110754702B (en) Method, smoking set and system for preventing minors from using electronic cigarette
US9892576B2 (en) Biometrics identification module and personal wearable electronics network based authentication and transaction processing
US9450939B2 (en) Method and apparatus for service login based on third party's information
US8380637B2 (en) Variable fractions of multiple biometrics with multi-layer authentication of mobile transactions
CN112712373B (en) Electronic cigarette verification method, electronic cigarette chip, electronic cigarette, terminal equipment and storage medium
US9516010B1 (en) Authenticating a user while the user operates a client apparatus and possesses an electronic card
US20030159051A1 (en) Method for generating electronic signatures
CN206312224U (en) Payment system
WO2012158262A1 (en) Method for authorizing the activation of a spending card
CN105554741A (en) Communication information transmission method and system, and apparatus
CN109711847A (en) Method, apparatus, electronic equipment and the computer storage medium of near-field information certification
US20140122627A1 (en) Triggered Message System
CN115715394A (en) Age and identity verification system
CN112714141B (en) Verification method, chip, electronic cigarette, selling device, storage medium and computing device
CN105868975A (en) Electronic finance account management method and system, and mobile terminal
CN110326011B (en) Determining legal conditions at a computing device
US20120102565A1 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
WO2021078053A1 (en) Electronic cigarette recycling method, sale and recycle machine, recycling system, storage medium and device
CN103310335A (en) Payment method and system based on network
CN108900525A (en) The processing method and device of identifying code request
CN113287791A (en) Unlocking method, device and system of electronic atomization device, authentication end and battery rod
WO2016029413A1 (en) Terminal, and anti-theft tracking method and apparatus therefor
EP3751878A1 (en) A method for managing a system with a smoking substitute device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240124

Address after: 518057, 5A, Xinlikang Building, No. 3044 Xinghai Avenue, Nanshan Street, Qianhai Shenzhen Hong Kong Cooperation Zone, Shenzhen, Guangdong Province

Applicant after: SHENZHEN SOTROWIN TECHNOLOGY CO.,LTD.

Country or region after: China

Address before: 518000 room 1510, building 2, Fangda Plaza, No.2, Longzhu 4th Road, Taoyuan Street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen guokeruixin Technology Co.,Ltd.

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant