CN113863786B - Safe password processing method and device - Google Patents

Safe password processing method and device Download PDF

Info

Publication number
CN113863786B
CN113863786B CN202111138653.2A CN202111138653A CN113863786B CN 113863786 B CN113863786 B CN 113863786B CN 202111138653 A CN202111138653 A CN 202111138653A CN 113863786 B CN113863786 B CN 113863786B
Authority
CN
China
Prior art keywords
user
password
level
safe
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111138653.2A
Other languages
Chinese (zh)
Other versions
CN113863786A (en
Inventor
申亚坤
赵辉
丁锐
刘烨敏
谭莹坤
周慧婷
陶威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202111138653.2A priority Critical patent/CN113863786B/en
Publication of CN113863786A publication Critical patent/CN113863786A/en
Application granted granted Critical
Publication of CN113863786B publication Critical patent/CN113863786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B49/00Electric permutation locks; Circuits therefor ; Mechanical aspects of electronic locks; Mechanical keys therefor
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B65/00Locks or fastenings for special use
    • E05B65/0075Locks or fastenings for special use for safes, strongrooms, vaults, fire-resisting cabinets or the like
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/10Safes or strong-rooms for valuables with alarm, signal or indicator
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00912Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for safes, strong-rooms, vaults or the like

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application discloses a safe password processing method and device, which can be applied to the field of artificial intelligence or the field of finance, and can be used for acquiring the operation permission level of a user for a safe aiming at any user using the safe and determining the password level according to the operation permission level. Wherein, the higher the operation authority level is, the higher the password level is. Namely, the password level is positively correlated with the operation authority level. The higher the operation authority level, the greater the operation authority of the user for the safe, for example, the higher the money amount can be withdrawn. And after the password grade is determined, determining a password setting rule according to the password grade so as to prompt a user to set a password for opening the safe according to the password setting rule. The higher the password level is, the more complicated the password setting rule is, so that the security guarantee is improved. Therefore, the user is allowed to define the password through the operation permission level of the user, and the security of password management is improved.

Description

Safe password processing method and device
Technical Field
The application relates to the technical field of computers, in particular to a safe password processing method and device.
Background
The bank safe is an important tool for the function of the network, and the safety of the safe directly concerns the fund safety of the bank. At present, the passwords of the safety box are fixed, and although a regular replacement mechanism exists, the safety box still has great potential safety hazards.
Disclosure of Invention
In view of this, embodiments of the present application provide a method and an apparatus for processing a password of a safe so as to configure corresponding passwords for different user permission levels, improve the security of the password of the safe, and reduce security risks.
In order to achieve the above object, the embodiments of the present application provide the following technical solutions:
in a first aspect of an embodiment of the present application, a method for processing passwords of a safe is provided, where the method includes:
acquiring an operation authority level of a user, wherein the operation authority level is used for indicating the operation level of the user for the safety box;
determining a password level according to the operation permission level of the user, wherein the operation permission level is positively correlated with the password level;
determining a password setting rule according to the password grade to prompt the user to set a password for opening the safe according to the password setting rule;
and saving the password set by the user.
In a specific implementation, the method further includes:
responding to the use of the safe case by a user, and acquiring user information which is used for uniquely indicating the user using the safe case;
determining whether the passwords input by the user are matched or not according to the user information;
when the passwords input by the user are matched, triggering an image acquisition device in the safety box to be started;
and acquiring the operation information of the user in the safety box through the image acquisition device.
In a specific implementation, the method further includes:
and when the user withdraws money from the safe, the money withdrawing amount is determined through the operation information collected by the image collecting device.
In a specific implementation, the method further includes:
and recording the corresponding relation between the user information and the withdrawal amount.
In a specific implementation, the method further includes:
and sending the corresponding relation to a reconciliation system so that the reconciliation system can automatically reconcile the account according to the initial amount of the safe case and the corresponding relation.
In a specific implementation manner, the obtaining user information in response to the user using the safe includes:
and responding to the use of the safe by a user, and carrying out face recognition on the user through an image acquisition device outside the safe body to obtain user information.
In a specific implementation, the operation authority level includes a withdrawal authority of a user and a pre-configured withdrawal amount threshold.
In a specific implementation, the method further includes:
when a user carries out a withdrawal operation from the safety box, determining whether a withdrawal amount is smaller than or equal to the withdrawal amount threshold value;
and when the withdrawal amount is larger than the withdrawal amount threshold value, performing exception prompting.
In a specific implementation manner, the operation permission level is pre-configured according to the position information of the user.
In a second aspect of the embodiments of the present application, there is provided a safe password processing apparatus, including:
the safety box comprises a first acquisition unit, a second acquisition unit and a control unit, wherein the first acquisition unit is used for acquiring the operation permission level of a user, and the operation permission level is used for indicating the operation level of the user for the safety box;
the first determining unit is used for determining a password level according to an operation permission level of the user, wherein the operation permission level is positively correlated with the password level;
the second determining unit is used for determining a password setting rule according to the password grade so as to prompt the user to set a password for opening the safe according to the password setting rule;
and the storage unit is used for storing the password set by the user.
In a third aspect of embodiments of the present application, there is provided an electronic device, including: a processor, a memory;
the memory for storing computer readable instructions or a computer program;
the processor is configured to read the computer readable instructions or the computer program to enable the apparatus to implement the safe password processing method according to the first aspect.
In a fourth aspect of embodiments of the present application, there is provided a computer-readable storage medium comprising instructions or a computer program which, when run on a computer, cause the computer to perform the safe password processing method described above.
Therefore, the embodiment of the application has the following beneficial effects:
in the embodiment of the application, aiming at any user using the safe case, the operation permission level of the user for the safe case is obtained, and the password level is determined according to the operation permission level. Wherein, the higher the operation authority level is, the higher the password level is. Namely, the password level is positively correlated with the operation authority level. The higher the operation authority level, the greater the operation authority of the user for the safe, for example, the higher the money amount can be withdrawn. And after the password grade is determined, determining a password setting rule according to the password grade so as to prompt a user to set a password for opening the safe according to the password setting rule. The higher the password level is, the more complicated the password setting rule is, so that the security guarantee is improved. For example, for a very high code level, the corresponding code setting rule is a combination requiring 15 digits of letters, numbers and special compliance. Therefore, the user is allowed to customize the password through the operation permission level of the user, and the security of password management is improved.
Drawings
Fig. 1 is a flowchart of a password processing method for a safe according to an embodiment of the present disclosure;
fig. 2 is a diagram of another password processing framework of the safe provided in the embodiment of the present application;
fig. 3 is a structural diagram of a password processing device of a safe according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, embodiments accompanying figures and detailed description thereof are described in further detail below.
The embodiment of the application provides a safe password processing method, which is used for solving the problem that the password of the traditional safe is the same and fixed for any user who can use the safe so that a larger security risk exists. Specifically, the user can customize the password for opening the safe based on the operation permission levels of different users, so that the self-adaptive adjustment of the password of the safe is realized. Meanwhile, when the user opens the safety box, the user can be snapshot in time to realize trace leaving in the whole process, fund safety is improved, and safety risk is reduced.
It should be noted that the safe password processing method and device provided by the invention can be used in the field of artificial intelligence or finance. The above description is only an example, and does not limit the application field of the method and the apparatus for processing passwords of the safe provided by the present invention.
From the above description, the scheme provided in the embodiment of the present application includes setting a password and using a safe, which will be described below with reference to the accompanying drawings.
Referring to fig. 1, which is a flowchart of a password processing method for a safe provided in an embodiment of the present application, as shown in fig. 1, the method may include:
s101: and acquiring the operation authority level of the user, wherein the operation authority level is used for indicating the operation level of the user for the safety box.
In this embodiment, in order to realize that a user customizes an opening password of the safe, an operation permission level of the user is obtained, where the operation permission level is used to indicate an operation capability level of the user for the safe. The higher the operation authority level is, the greater the operation authority of the user for the safe box is. The operation authority level may include a withdrawal authority of a user and a pre-configured withdrawal amount threshold, and a higher operation authority level indicates that the withdrawal amount threshold corresponding to the user is larger.
The operation authority level of the user is determined according to the position information of the user, and the higher the position of the user is, the higher the corresponding operation authority level is. Specifically, the withdrawal authority and the withdrawal amount of the user are preset and configured according to the position information of the user. For example, the job of the user a is a general teller, and the withdrawal amount set by the general teller is 10 ten thousand. And when the operation authority level of the user is determined, storing the corresponding relation between the user information and the operation authority level of the user. And when the user needs to set the password of the safe, acquiring the operation permission level of the user according to the user information and the corresponding relation.
S102: and determining the password level according to the operation authority level of the user.
In this embodiment, after the operation permission level of the user is obtained, the password level is determined according to the operation permission level of the user. The higher the operation permission level is, the stronger the operation capacity of the user on the safety box is, the larger the money amount which can be withdrawn is, the larger the risk of the safety box is, and in order to reduce the risk, the higher the corresponding password level is, so that the password level and the operation permission level are positively correlated. For example, if the operation authority level of the user B is 5 levels, the corresponding withdrawal amount threshold value is 10 ten thousand, the operation authority level of the user C is 1 level, and the corresponding withdrawal amount threshold value is 100 ten thousand, the password level corresponding to the user B is lower than the password level corresponding to the user C.
Specifically, the corresponding relationship between the operation permission level and the password level may be preset, and after the operation permission level is obtained, the password level is determined according to the corresponding relationship.
S103: and determining a password setting rule according to the password grade, and prompting a user to set a password for opening the safe according to the password setting rule.
After the password level is determined, a password setting rule is determined according to the password level, the password setting rule is used for indicating the condition which the set password must meet, and prompting a user to set the password for opening the safe according to the password setting rule. Namely, after the password setting rule is determined, the password setting page can be displayed, and the corresponding password setting rule is displayed on the setting page so as to guide the user to set the password matched with the password setting rule.
The higher the password level is, the more complicated the password setting rule is, thereby improving the security of the password. For example, when the password level is 1, the corresponding password setting rule is a combination of 15-digit letters, numbers and special symbols; when the password level is 2, the corresponding password setting rule is a combination of letters, numbers and special symbols which need 8 bits. Further, to improve the security of the password, the password setting rule may further include that the currently set password is not used within a certain time.
Specifically, a corresponding relationship between the password level and the password setting rule may be preset, and after the password level is determined, the password setting rule is determined according to the corresponding relationship.
S104: and responding to the setting operation triggered by the user, and saving the password set by the user.
After the user sets the password according to the password setting rule, the set password is stored. Because different users can set different passwords, when the passwords set by the users are saved, the user information and the passwords corresponding to the users are saved.
Therefore, aiming at any user using the safe case, the operation permission level of the user for the safe case is obtained, and the password level is determined according to the operation permission level. Wherein, the higher the operation authority level is, the higher the password level is. Namely, the password level is positively correlated with the operation authority level. The higher the operation authority level, the greater the operation authority of the user to the safe, for example, the higher the amount of money that can be withdrawn. And after the password grade is determined, determining a password setting rule according to the password grade so as to prompt a user to set a password for opening the safe according to the password setting rule. The higher the password level is, the more complicated the password setting rule is, so that the security guarantee is improved. For example, for a very high password level, the corresponding password setting rule is a combination requiring 15 digits of letters, numbers and special compliance. Therefore, the user is allowed to customize the password through the operation permission level of the user, and the security of password management is improved.
Referring to fig. 2, which is a flowchart of another password processing method for a safe provided in an embodiment of the present application, as shown in fig. 2, the method may include:
s201: and responding to the use of the safe case by the user, and acquiring user information.
In this embodiment, when the user completes the password setting and uses the safe, the user information of the user is used for uniquely indicating the user who uses the safe at present. The user information may include identity information of the user, such as an identification number of the user, and may also include job information of the user, such as a job number of the user.
In a specific implementation mode, the user information can be acquired in such a way that when the user approaches the safe, the image acquisition device outside the safe carries out face recognition on the user, and the user information is matched according to the face recognition result. Specifically, the correspondence between the face information of the user and the user information may be stored in advance, and after the face recognition result is obtained, the user information is determined according to the correspondence.
S202: and determining whether the passwords input by the user are matched or not according to the user information.
When the user uses the safe case, the password input by the user is received, and whether the password input by the user is matched or not is determined according to the user information. Specifically, the password set by the user is inquired according to the user information, whether the passwords input by the user are the same or not is compared according to the inquired password, and if the passwords are the same, the login success is determined. If the input times are different, the user can be prompted to input again, and if the input times reach the upper limit, an alarm can be given or locking can be carried out.
S203: and when the passwords input by the user are matched, triggering the image acquisition device in the safety box to be started.
S204: and the operation information of the user in the safe is collected through the image collecting device.
When the passwords input by the user are matched, the user can open the safety box, the image acquisition device in the safety box can be triggered to start, the image acquisition device can record the operation of the user in the safety box, and the acquired image information is stored. Specifically, when a user withdraws money from the safe, the image acquisition device can record the money withdrawing operation for monitoring and recording, and the money withdrawing amount is determined through the operation information acquired by the image acquisition device. For example, the image processing device may perform image processing to determine the amount of money taken out by the user after acquiring the operation information acquired by the image acquisition device. When the user carries out a plurality of withdrawing operations, the withdrawing times and the withdrawing amount corresponding to each withdrawing operation can be recorded. Note that, in the bank safe, cash is stored in bundles, and the amount of money of each bundle is identical to the thickness of each bundle, for example, the amount of money of one bundle is 1 ten thousand yuan, so that the number of bundles taken by the user can be determined by image processing, and the withdrawal amount can be determined.
In a specific implementation manner, after the withdrawal amount of the user is determined, the withdrawal amount can be compared with a withdrawal amount threshold corresponding to the user to determine whether the withdrawal amount is less than or equal to the corresponding withdrawal amount threshold, and if the withdrawal amount is greater than the withdrawal amount threshold, an abnormal prompt is performed, so that the fund safety is improved.
In a specific implementation mode, when the withdrawal amount of the user is determined, the corresponding relation between the user information and the withdrawal amount can be recorded, so that the operation of the safety box is recorded in the whole process. Further, the corresponding relation can be sent to a reconciliation system, so that the object system can automatically reconcile according to the initial amount of money of the safe and the corresponding relation.
In a specific implementation manner, when a user deposits money in the safe, the corresponding relation between the user information and the deposit money amount can be recorded, so that the operation of the safe is comprehensively recorded. Meanwhile, the corresponding relation can be sent to the object system.
For example, in one-day business, the safe system can automatically record withdrawal information and deposit information of different users from the safe in the same day and upload the withdrawal information and the deposit information to the reconciliation system, and after the business is finished at a branch, the reconciliation system can perform reconciliation according to the initial amount, the current amount, the withdrawal information of staff and the deposit information of the safe, so that the fund security of a bank is improved.
Therefore, when the user uses the safe, the using process can be automatically monitored and recorded, the safety of the using process is ensured, the fund safety is improved, and the safety risk is reduced. Further, when the account checking result is deviated, the checking can be carried out through the monitoring and the recording, and the working efficiency is improved.
Based on the above method embodiments, the present application provides a safe password processing apparatus, which will be described below with reference to the accompanying drawings.
Referring to fig. 3, which is a diagram of a password processing apparatus for a safe according to an embodiment of the present application, the apparatus 300 may include: a first acquisition unit 301, a first determination unit 302, a second determination unit 303, and a storage unit 304.
A first obtaining unit 301, configured to obtain an operation permission level of a user, where the operation permission level is used to indicate an operation level of the user for the safe;
a first determining unit 302, configured to determine a password level according to an operation permission level of the user, where the operation permission level is positively correlated with the password level;
a second determining unit 303, configured to determine a password setting rule according to the password level, so as to prompt the user to set a password for opening the safe according to the password setting rule;
a storage unit 304, configured to store the password set by the user.
In a specific implementation manner, the apparatus further includes:
a second acquisition unit configured to acquire user information in response to use of the safe by a user, the user information being used to uniquely indicate the user who is currently using the safe;
a third determining unit, configured to determine whether the password input by the user matches according to the user information;
the triggering unit is used for triggering the image acquisition device in the safety box to be started when the passwords input by the user are matched;
and the acquisition unit is used for acquiring the operation information of the user in the safety box through the image acquisition device.
In a specific implementation manner, the apparatus further includes:
and the fourth determining unit is used for determining the withdrawal amount through the operation information acquired by the image acquisition device when the user withdraws from the safe.
In a specific implementation manner, the apparatus further includes:
and the recording unit is used for recording the corresponding relation between the user information and the withdrawal amount.
In a specific implementation manner, the apparatus further includes:
and the sending unit is used for sending the corresponding relation to an account checking system so that the account checking system can automatically check the account according to the initial amount of money of the safety box and the corresponding relation.
In a specific implementation manner, the second obtaining unit is specifically configured to respond to that a user uses a safe, and perform face recognition on the user through an image acquisition device outside the safe, so as to obtain user information.
In a specific implementation manner, the operation authority level includes a withdrawal authority of a user and a pre-configured withdrawal amount threshold.
In a specific implementation manner, the apparatus further includes:
a fifth determining unit, configured to determine whether a withdrawal amount is less than or equal to the withdrawal amount threshold when a user performs a withdrawal operation from the safe;
and the prompting unit is used for performing abnormal prompting when the withdrawal amount is larger than the withdrawal amount threshold value.
In a specific implementation manner, the operation permission level is pre-configured according to the position information of the user.
It should be noted that, for specific implementation of each unit in this embodiment, reference may be made to related description of the method illustrated in fig. 1 or fig. 2, and details of this embodiment are not repeated herein.
In addition, an embodiment of the present application further provides an electronic device, including: a processor, a memory;
the memory for storing computer readable instructions or a computer program;
the processor is configured to read the computer readable instructions or the computer program, so that the device implements the safe password processing method.
Embodiments of the present application provide a computer-readable storage medium, which includes instructions or a computer program, when the computer-readable storage medium runs on a computer, the computer is caused to execute the safe password processing method described above.
It should be noted that, in the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the system or the device disclosed by the embodiment, the description is simple because the system or the device corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
It should be understood that, in this application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A safe password processing method, characterized in that the method comprises:
acquiring an operation authority level of a user, wherein the operation authority level is used for indicating the operation level of the user on the safety box;
determining a password level according to the operation permission level of the user, wherein the password level is positively correlated with the operation permission level;
determining a password setting rule according to the password grade, and prompting the user to set a password for opening the safe according to the password setting rule;
responding to the setting operation triggered by the user, and saving the password set by the user;
responding to the use of the safe case by a user, and acquiring user information which is used for uniquely indicating the user using the safe case;
determining whether the passwords input by the user are matched or not according to the user information;
when the passwords input by the user are matched, triggering an image acquisition device in the safety box to be started;
and acquiring the operation information of the user in the safety box through the image acquisition device.
2. The method of claim 1, further comprising:
and when the user withdraws money from the safe, the money withdrawing amount is determined through the operation information collected by the image collecting device.
3. The method of claim 2, further comprising:
and recording the corresponding relation between the user information and the withdrawal amount.
4. The method of claim 3, further comprising:
and sending the corresponding relation to an account checking system so that the account checking system can automatically check the account according to the initial amount of money of the safety box and the corresponding relation.
5. The method of any one of claims 1 to 4, wherein said obtaining user information in response to the user using the safe comprises:
and responding to the use of the safe by a user, and carrying out face recognition on the user through an image acquisition device outside the safe body to obtain user information.
6. The method of claim 1, wherein the operational privilege level comprises a withdrawal privilege of a user and a preconfigured withdrawal amount threshold.
7. The method of claim 6, further comprising:
when a user carries out a withdrawal operation from the safety box, determining whether a withdrawal amount is smaller than or equal to the withdrawal amount threshold value;
and when the withdrawal amount is larger than the withdrawal amount threshold value, performing exception prompting.
8. The method of claim 6, wherein the operation permission level is pre-configured according to position information of the user.
9. A safe password processing apparatus, comprising:
the safety box comprises a first acquisition unit, a second acquisition unit and a control unit, wherein the first acquisition unit is used for acquiring the operation authority level of a user, and the operation authority level is used for indicating the operation level of the user for the safety box;
the first determining unit is used for determining a password level according to an operation permission level of the user, wherein the operation permission level is positively correlated with the password level;
the second determining unit is used for determining a password setting rule according to the password grade so as to prompt the user to set a password for opening the safe according to the password setting rule;
the storage unit is used for storing the password set by the user;
the device further comprises:
a second acquisition unit configured to acquire user information in response to use of the safe by a user, the user information being used to uniquely indicate the user who is currently using the safe;
a third determining unit, configured to determine whether the password input by the user matches according to the user information;
the triggering unit is used for triggering the image acquisition device in the safety box to be started when the passwords input by the user are matched;
and the acquisition unit is used for acquiring the operation information of the user in the safety box through the image acquisition device.
CN202111138653.2A 2021-09-27 2021-09-27 Safe password processing method and device Active CN113863786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111138653.2A CN113863786B (en) 2021-09-27 2021-09-27 Safe password processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111138653.2A CN113863786B (en) 2021-09-27 2021-09-27 Safe password processing method and device

Publications (2)

Publication Number Publication Date
CN113863786A CN113863786A (en) 2021-12-31
CN113863786B true CN113863786B (en) 2022-10-21

Family

ID=78991637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111138653.2A Active CN113863786B (en) 2021-09-27 2021-09-27 Safe password processing method and device

Country Status (1)

Country Link
CN (1) CN113863786B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101550783A (en) * 2009-05-13 2009-10-07 广东科信实业有限公司 Electronic coded lock and coded key
US9178876B1 (en) * 2011-10-20 2015-11-03 Amazon Technologies, Inc. Strength-based password expiration
CN106683286A (en) * 2016-12-26 2017-05-17 上海传英信息技术有限公司 Intelligent article storage method and intelligent storage system
CN110374453A (en) * 2019-07-31 2019-10-25 江苏金海湾智能制造有限公司 A kind of intelligent safe, system and management method
CN110719298A (en) * 2019-11-05 2020-01-21 广州海颐信息安全技术有限公司 Method and device for supporting user-defined change of privileged account password

Also Published As

Publication number Publication date
CN113863786A (en) 2021-12-31

Similar Documents

Publication Publication Date Title
CN104408341B (en) Smart phone user identity identifying method based on gyroscope behavioural characteristic
US7506171B2 (en) Method and systems for securely supporting password change
CN104023133B (en) Anti-theft method and device for mobile terminal
CN107633573A (en) The method for unlocking and intelligent door lock of a kind of intelligent door lock
JP5069457B2 (en) Authentication system, authentication method, and program
CN105205451A (en) Fingerprint verification method, fingerprint verification device and terminal
CN113505394A (en) Data security processing method based on big data and cloud server
CN101629843A (en) Weight-detecting device and method
CN113863786B (en) Safe password processing method and device
CN105427480A (en) Teller machine based on image analysis
CN102034034B (en) Biological authentication device
CN103295053A (en) Multi-code early-warning type memory lock bank card
CN111080233A (en) Method, device and storage medium for generating subscription information
CN107918869A (en) One kind is transferred accounts control method, device and terminal
JP5356584B2 (en) Authentication system, authentication method, and program
CN108491712B (en) Method and device for safely reading and writing hospital confidential documents
CN108270735A (en) A kind of data leakage prevention method and equipment
US8140433B2 (en) Method for making secure transactions carried out with cards provided with an owner identification number
CN110688645A (en) Big data analysis system based on computer verification code technology
CN111612470A (en) Mobile banking transaction method and system
CN116862517A (en) Resource management cloud multi-account transaction method and system based on blockchain
CN111400680B (en) Mobile phone unlocking password prediction method based on sensor and related device
CN107403082A (en) Unlocking processing method and related product
CN116071072A (en) Funds management method and device
CN108197446A (en) Using control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant