CN114821860B - Password generation method, device and system and electronic equipment - Google Patents

Password generation method, device and system and electronic equipment Download PDF

Info

Publication number
CN114821860B
CN114821860B CN202210327000.7A CN202210327000A CN114821860B CN 114821860 B CN114821860 B CN 114821860B CN 202210327000 A CN202210327000 A CN 202210327000A CN 114821860 B CN114821860 B CN 114821860B
Authority
CN
China
Prior art keywords
password
target object
request
generation instruction
password generation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210327000.7A
Other languages
Chinese (zh)
Other versions
CN114821860A (en
Inventor
孔维志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lumi United Technology Co Ltd
Original Assignee
Lumi United Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lumi United Technology Co Ltd filed Critical Lumi United Technology Co Ltd
Priority to CN202210327000.7A priority Critical patent/CN114821860B/en
Publication of CN114821860A publication Critical patent/CN114821860A/en
Application granted granted Critical
Publication of CN114821860B publication Critical patent/CN114821860B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00238Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
    • G07C2009/00253Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed dynamically, e.g. variable code - rolling code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a password generation method, a device, a system and electronic equipment, wherein the password generation method is used for directly generating a dynamic password for an unlocking request in a local mode based on a password generation instruction after responding to the unlocking request for a target object in a target range, displaying the dynamic password to instruct the target object to unlock according to the dynamic password, and the password generation method is used for avoiding the risk of leakage of the dynamic password in the communication process and improving the safety of the password generation method on the basis of realizing the unlocking function based on the dynamic password without the communication mode such as a network.

Description

Password generation method, device and system and electronic equipment
Technical Field
The present invention relates to the field of computer application technologies, and in particular, to a method, an apparatus, a system, and an electronic device for generating a password.
Background
With the continuous development of intelligent home technology, the intelligent equipment unlocked by means of setting dynamic passwords and the like is arranged, so that the use convenience of users is greatly improved.
Taking an intelligent door lock as an example, a user can set a dynamic password for the intelligent door lock through terminal equipment bound with the intelligent door lock, and a visitor can unlock the intelligent door lock through the dynamic password, but the current unlocking function based on the dynamic password has the risk of password leakage, and has certain potential safety hazard.
Disclosure of Invention
In view of the above, the embodiments of the present invention are directed to providing a method, an apparatus, a system, and an electronic device for generating a password, so as to solve the problem in the prior art that the unlocking method based on a dynamic password has a risk of password leakage.
In a first aspect, a method for generating a password is provided, including:
Responding to an unlocking request aiming at a target object in a target range, and acquiring a password generation instruction;
and generating a dynamic password aiming at the unlocking request locally based on the password generation instruction, and displaying the dynamic password to instruct the target object to unlock according to the dynamic password.
In a second aspect, a method for generating a password is provided, including:
Responding to an identity verification request, and displaying an identity verification interface, wherein the identity verification request is triggered by target equipment based on an unlocking request of the target object in a target range;
and responding to the authentication passing operation on the authentication interface, triggering a password generation instruction, and sending the password generation instruction to the target equipment, so that the target equipment generates a dynamic password aiming at the unlocking request locally on the basis of the password generation instruction, and displays the dynamic password to instruct the target object to unlock according to the dynamic password.
In a third aspect, there is provided a password generation apparatus including:
The instruction acquisition module is used for responding to an unlocking request aiming at a target object in a target range and acquiring a password generation instruction;
and the password generation module is used for locally generating a dynamic password aiming at the unlocking request based on the password generation instruction, and displaying the dynamic password so as to instruct the target object to unlock according to the dynamic password.
Optionally, the instruction obtaining module is specifically configured to generate an authentication request in response to an unlocking request for a target object in a target range;
The identity verification request is sent to a target terminal, and multimedia communication connection is established with the target terminal, so that identity verification is carried out on the target object based on the transmitted multimedia information;
And if the password generation instruction triggered by the target terminal in response to the authentication is received, executing the step of generating a dynamic password aiming at the unlocking request locally based on the password generation instruction and displaying the dynamic password.
Optionally, the instruction obtaining module responds to an unlocking request for a target object in a target range, and generates an identity verification request which is specifically used for obtaining a picture corresponding to the target range;
and if the target object is detected in the picture, triggering an unlocking request, and generating an identity verification request aiming at the target object based on the unlocking request.
Optionally, the instruction obtaining module is specifically configured to obtain identity information of a target object in a target range in response to an unlocking request for the target object;
And carrying out identity verification on the identity information of the target object based on a local pre-stored identity database, and generating the password generation instruction after the identity verification of the target object is passed.
Optionally, the password generating module is configured to locally generate a dynamic password for the unlocking request based on the password generating instruction, and execute a local preset password generating algorithm according to a time parameter corresponding to the password generating instruction, so as to locally generate the dynamic password for the unlocking request; the time parameter includes a generation time of the password generation instruction or a time at which the password generation instruction is received locally.
Optionally, the method further comprises: the password verification module is used for acquiring a verification password input by the target object, and executing unlocking operation if the verification password meets unlocking conditions; wherein, the unlocking condition includes: the verification password is consistent with the dynamic password, and the acquisition time of the verification password is within the effective time corresponding to the dynamic password; if the verification password is inconsistent with the dynamic password and the current time is within the effective time corresponding to the dynamic password, performing error prompt, and displaying the dynamic password again.
In a fourth aspect, there is provided a password generating apparatus including:
The interface display module is used for responding to an identity verification request, and displaying an identity verification interface, wherein the identity verification request is triggered by target equipment based on an unlocking request of the target object in a target range;
The instruction sending module is used for responding to the authentication passing operation on the authentication interface, triggering a password generating instruction, and sending the password generating instruction to the target equipment, so that the target equipment generates a dynamic password aiming at the unlocking request on the basis of the password generating instruction, and performs display processing on the dynamic password to instruct the target object to unlock according to the dynamic password.
Optionally, the interface display module responds to the authentication request, displays an authentication interface specifically for responding to the authentication request, establishes a multimedia communication connection with the target device, and displays the authentication interface; the identity verification interface is used for displaying the multimedia information which is transmitted by the target equipment and is aimed at the target object; the multimedia communication is used for carrying out identity verification on the target object.
In a fifth aspect, a password generation system is provided, including: target equipment and target terminals; wherein,
The target terminal is used for responding to the identity verification request, displaying an identity verification interface, responding to the identity verification passing operation on the identity verification interface, triggering a password generation instruction, and sending the password generation instruction to the target equipment;
The target device is configured to trigger the authentication request based on an unlocking request of the target object within a target range, generate a dynamic password for the unlocking request locally based on the password generation instruction after the password generation instruction is acquired, and display the dynamic password to instruct the target object to unlock according to the dynamic password.
In a sixth aspect, there is provided an electronic device comprising: a memory storing a computer program and a processor implementing the password generation method of any one of the above when the processor executes the computer program.
In a seventh aspect, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the password generation method of any of the above.
In an eighth aspect, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium; the processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor implements the steps of the above-described password generation method when executing the computer instructions.
The embodiment of the invention provides a password generation method, a device, a system and electronic equipment, wherein the password generation method is used for directly generating a dynamic password for an unlocking request locally based on a password generation instruction after responding to the unlocking request for a target object in a target range, displaying and processing the dynamic password to instruct the target object to unlock according to the dynamic password, and the method avoids the risk of leakage of the dynamic password in the communication process and improves the safety of the password generation method on the basis of realizing the unlocking function based on the dynamic password without the communication mode such as a network.
Drawings
FIG. 1 is an application environment diagram of a control method of a target device in one embodiment;
FIG. 2 is a block diagram of the hardware architecture of a gateway in one embodiment;
FIG. 3 is a flow diagram of a method of password generation in one embodiment;
FIG. 4 is a schematic diagram of an authentication interface in one embodiment;
FIG. 5 is a signaling flow diagram of a method of controlling a target device in one embodiment;
Fig. 6 is an application scenario diagram of a control method of a target device in an embodiment;
fig. 7 is a schematic structural diagram of an electronic device in one embodiment.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Exemplary implementation Environment
Referring to fig. 1, fig. 1 is a schematic diagram of an implementation environment that may be involved in accordance with the present invention. The implementation environment is an internet of things platform, which includes a terminal device 100, a gateway 200, an intelligent device 300 deployed in the gateway 200, a cloud server 400, and a router 500.
The terminal device 100 may be any device having communication and storage functions, for example: desktop computers, notebook computers, tablet computers, smart phones, or other intelligent communication devices that may implement network connections are not limited herein.
The intelligent device 300 may be a smart light, a smart printer, a smart fax, a smart camera, a smart air conditioner, a smart television, a smart refrigerator, or a human body sensor, a door and window sensor, a temperature and humidity sensor, a water sensor, a natural gas alarm, a smoke alarm, a wall switch, a wall socket, a wireless switch, a wireless wall switch, a magic cube controller, a curtain motor, etc. equipped with a communication module (e.g., a ZIGBEE module, a WIFI module, a bluetooth communication module, etc.).
A network connection is established between the terminal device 100 and the gateway 200, and in one embodiment, the network connection is established between the terminal device 100 and the gateway 200 by 2G/3G/4G/5G, wi-Fi or the like. Interact with gateway 200 through the network connection, thereby enabling a user to control the internet of things device accessing gateway 200 to perform a corresponding action by means of this terminal device 100.
Optionally, a client capable of managing the smart device is installed in the terminal device 100, where the client may be an application client (such as a mobile phone APP), a web client or an applet, and the like, which is not limited herein.
The intelligent device 300 communicates with the gateway 200 through a communication module configured by itself, and is further controlled by the cloud server 400. In one embodiment, the smart device 300 accesses the gateway 200 through a local area network, thereby being deployed in the gateway 200. The process of the intelligent device 300 accessing the gateway 200 through the local area network includes that the gateway 200 first establishes a local area network, and the intelligent device 300 accesses the local area network established by the gateway 200 by connecting the gateway 200. The local area network comprises: zigBee or bluetooth. Accordingly, the intelligent device 300 has a communication module (e.g., ZIGBEE module, wi-Fi module, bluetooth communication module, etc.) built therein, so as to have a function of implementing communication with the gateway 200 and the terminal device.
The gateway 200 and the terminal device 100 may be connected to the router 500, and connected to the network through the router 500, and the router 500 may be connected to the server 500 through a wired or wireless communication connection. For example, the gateway 200 and the terminal device 100 may store the acquired information in the cloud server 400. Optionally, the terminal device 100 may also establish a network connection with the cloud server 400 through 2G/3G/4G/5G, wi-Fi or the like, so as to obtain data issued by the cloud server 400.
Alternatively, as shown in fig. 1, the terminal device 100, the router 500, and the gateway 200 are in the same local area network, and a path established in the local area network may be referred to as a local area network path. When the terminal device 100, the router 500, and the gateway 200 are in the same local area network, the terminal device 100 may interact with the gateway 200 and the smart device 300 connected to the gateway 200 through a local area network path. The interaction may also be via a wide area network path when the terminal device 100 is not in the same local area network as the gateway 200 and the smart device 300. The wide area network path is a path formed by connecting a terminal device with the cloud server 400 through a mobile network such as 2G/3G/4G/5G, and connecting the intelligent device 300 with the cloud server 400 through the gateway 200 and the router 500.
Fig. 2 is a block diagram of a hardware architecture of a gateway, according to an example embodiment. This gateway is suitable for the implementation environment shown in fig. 1.
It should be noted that this gateway is only an example adapted to the present invention and should not be construed as providing any limitation to the scope of use of the present invention. Nor should the gateway be construed as necessarily relying on or necessarily having one or more of the components of the exemplary gateway 200 shown in fig. 2.
The hardware structure of the gateway 200 may vary greatly depending on the configuration or performance, as shown in fig. 2, the gateway 200 includes: a power supply 210, an interface 230, at least one memory 250, and at least one central processing unit (CPU, central Processing Units) 270.
Wherein the power supply 210 is configured to provide an operating voltage for each hardware device on the gateway 200.
The interface 230 includes at least one wired or wireless network interface 231, at least one serial-to-parallel interface 233, at least one input-output interface 235, and at least one USB interface 237, etc., for communicating with external devices.
The memory 250 may be a read-only memory, a random access memory, a magnetic disk, an optical disk, or the like as a carrier for storing resources, where the resources stored include an operating system 251, an application 253, data 255, or the like, and the storage manner may be transient storage or permanent storage. The operating system 251 is used for managing and controlling various hardware devices and application programs 253 on the gateway 200, so as to implement calculation and processing of the mass data 255 by the central processor 270, which may be Windows server, mac OS XTM, unixTM, linuxTM, freeBSDTM, freeRTOS, etc. The application 253 is a computer program that performs at least one specific task based on the operating system 251, and may include at least one module (not shown in fig. 2), each of which may respectively include a series of computer readable instructions for the gateway 200. The data 255 may be photographs, pictures, etc. stored on disk.
The central processor 270 may include one or more of the above processors and is configured to communicate with the memory 250 via a bus for computing and processing the mass data 255 in the memory 250.
As described in detail above, the gateway 200 to which the present invention is applied will perform the device linkage control method by the cpu 270 reading a series of computer readable instructions stored in the memory 250.
Furthermore, the present invention may also be implemented in hardware circuitry or in combination with software instructions, and thus, the implementation of the present invention is not limited to any specific hardware circuitry, software, or combination of hardware and software.
Exemplary method
An exemplary embodiment of the present disclosure provides a password generating method, which is described by taking an intelligent device in an exemplary embodiment environment as an example, where the intelligent device may specifically be an intelligent door lock, an intelligent safe, or other devices that need password unlocking. Referring to fig. 3, the password generation method may include the steps of:
Step S101: and responding to an unlocking request for a target object in the target range, and acquiring a password generation instruction.
The target range generally refers to a specific spatial range, and may be an indoor space or an outdoor space, and in this embodiment of the present disclosure, the target range refers to a spatial range within a space where the smart device is disposed, and more specifically, the target range may be a spatial range that is sensed by a sensing device (e.g., an infrared sensor or a distance sensor) installed in the smart device or a spatial range that is set within a spatial range that is sensed by the sensing device.
For example, when the smart device is a smart door lock, the target range may be a certain spatial range of the door outer side of the door where the smart door lock is installed, and the spatial range may be less than or equal to the sensing range of the sensing device of the smart door lock.
The target object refers to an object having an unlocking requirement on the intelligent device, and the target object can be a human body. For example, the target object may be an owner of the smart device (hereinafter referred to as a user), or may be a visitor or friend of the user. The unlocking request of the target object refers to a request, which is sent by the target object to the intelligent device and is hoped to unlock the intelligent device, and the request can be triggered by touching a button, sending a voice request or sending a video request and the like, or can be triggered by the intelligent device recognizing that the target object passes through the target range. The present specification is not limited thereto.
When the intelligent equipment receives the unlocking request, the intelligent equipment responds to the unlocking request, and obtains a corresponding password generation instruction based on the unlocking request, wherein the password generation instruction is used for indicating the intelligent equipment to locally generate a dynamic password. The password production instruction can be a password generation instruction generated by the cloud device and/or the user terminal based on an unlocking request sent by the intelligent device, and then the password generation instruction is sent to the intelligent device; the password generation instruction can also be generated by the intelligent equipment, for example, after the intelligent equipment passes the verification of the unlocking request, the password generation instruction is directly generated locally.
Step S102: and generating a dynamic password aiming at the unlocking request locally based on the password generation instruction, and displaying the dynamic password to instruct the target object to unlock according to the dynamic password.
The dynamic password is a password which changes with time and/or the number of unlocking times and other variables, for example, the dynamic password can be a password which is valid for a certain time (for example, 15 minutes), and if the distance from the generation of the dynamic password exceeds 15 minutes, the dynamic password is invalid. The dynamic password can also be a password which is valid within a certain unlocking time (for example, 1 time), and if the dynamic password is successfully unlocked for 1 time, the dynamic password is invalid. The dynamic password can be a password which is effective in a certain unlocking time (1 time) and a certain time (15 minutes), if the dynamic password is in 15 minutes after generation and is not successfully unlocked, the dynamic password is kept effective, and if the time for generating the dynamic password exceeds 15 minutes or the dynamic password is successfully unlocked for 1 time, the dynamic password is invalid.
Local (local) refers to a device that is under direct control of a user as opposed to a cloud device (e.g., cloud server). In this embodiment, the local refers to a direct transmission object of an unlocking request of a target object, such as an intelligent door lock or an intelligent safe.
After the intelligent device acquires the password generation instruction, the intelligent device directly generates a dynamic password aiming at the unlocking request locally and displays the dynamic password. And the target object can unlock the intelligent device according to the displayed dynamic password.
Specifically, the manner in which the intelligent device displays the dynamic password may include directly displaying the dynamic password on a display interface of the intelligent device; if the intelligent device includes a character display area, characters corresponding to the dynamic password can be prominently displayed in the character display area of the intelligent device so as to display the dynamic password. In other embodiments, the smart device may also broadcast the dynamic password via voice to display the dynamic password.
In one embodiment, as shown in fig. 5, taking an intelligent device as an example of an intelligent door lock, a user terminal and the intelligent door lock are connected and bound through a network, and the user terminal
In the embodiment, after the intelligent device acquires the password generation instruction, the dynamic password for the unlocking request is directly generated locally and displayed, and the dynamic password is not required to be transmitted in a communication mode such as a network, so that the risk of leakage of the dynamic password in the communication process is avoided, and the safety of the password generation method is improved. In addition, by the password generation method, the dynamic password can be directly displayed to the target object at the intelligent equipment end, and a user does not need to inform the target object of the dynamic password, so that the use flow of the dynamic password is simplified, and the user experience is improved.
In an exemplary embodiment of the present disclosure, the obtaining, in response to an unlock request for a target object within a target range, a password generation instruction includes:
Generating an identity verification request in response to an unlocking request for a target object in a target range;
The identity verification request is sent to a target terminal, and multimedia communication connection is established with the target terminal, so that identity verification is carried out on the target object based on the transmitted multimedia information;
And if the password generation instruction triggered by the target terminal in response to the authentication is received, executing the step of generating a dynamic password aiming at the unlocking request locally based on the password generation instruction and displaying the dynamic password.
The target terminal is a terminal device having a certain corresponding relation with the intelligent device, and the corresponding relation can be a binding relation of the intelligent device and identity marks such as ID, serial number and the like of the target terminal. The terminal device may be an intelligent device with communication functions, such as a mobile phone, a tablet computer, etc.
Multimedia communication refers to a communication mode capable of simultaneously providing various media information such as sound, image, graphic, data, text, etc. during a call. In this embodiment, the multimedia communication connection refers to a communication connection channel capable of transmitting at least one type of information in multiple media information, through which a user of a target terminal can perform identity verification on a target object, and when the identity verification of the target object by the user of the target terminal is passed, a password generation instruction can be triggered by a triggering operation on the target terminal and sent to an intelligent device, so that the intelligent device generates a dynamic password for an unlocking request of the target object locally based on the password generation instruction.
In this embodiment, the target object may perform the operation of identity verification based on the multimedia communication connection established between the intelligent device and the target terminal, so that the target object does not need to establish a connection with the target terminal through other devices, thereby improving the convenience of use of the target object.
Specifically, in one exemplary embodiment of the present specification, the generating the authentication request in response to the unlocking request for the target object within the target range includes:
and acquiring a picture corresponding to the target range, triggering an unlocking request if the target object is detected in the picture, and generating an identity verification request aiming at the target object based on the unlocking request.
The picture corresponding to the target range refers to a photo and/or a video corresponding to the target range shot by the intelligent equipment, and when the intelligent equipment detects the target object in the picture based on the image analysis method, the unlocking request is automatically triggered, the unlocking request is not required to be triggered by the target object through manual operation, and the use convenience of the target object is improved.
Of course, in other embodiments of the present disclosure, the generating the authentication request in response to the unlocking request for the target object within the target range may further include other implementations, for example: and acquiring an unlocking request triggered by a target object, and generating an identity verification request aiming at the target object based on the unlocking request. The specific mode of triggering the unlocking request by the target object may include a mode that the target object presses an unlocking request triggering button provided on the intelligent device, or a mode that the target object inputs a voice command corresponding to the unlocking request to the intelligent device, and the like. The present specification is not limited thereto.
In an exemplary embodiment of the present disclosure, the obtaining, in response to an unlock request for a target object within a target range, a password generation instruction includes:
And responding to an unlocking request for a target object in a target range, acquiring the identity information of the target object, carrying out identity verification on the identity information of the target object based on a local prestored identity database, and generating the password generation instruction after the identity verification of the target object is passed.
In this embodiment, an identity database may also be stored in the smart device in advance, where the identity database may include biometric information (e.g., face information, fingerprint information, etc.) of the licensed target object. When the licensed target object sends an unlocking request to the intelligent device, the intelligent device can acquire the corresponding identity information of the target object in advance, and perform local identity verification in an identity database, and after the verification is passed, a password generation instruction is directly generated locally, and a dynamic password is generated based on the password generation instruction, so that the use flow of the password generation method is simplified, the use efficiency is improved, and the user experience is improved.
Of course, when the target object is a new access object or the corresponding biological identification information is not stored in the identity database, the intelligent device can still generate a dynamic password based on the password generation instruction when acquiring the password generation instruction sent by the target terminal when verification based on the identity database fails. The password generation method provided by the embodiment provides a plurality of password generation instruction acquisition methods, which is beneficial to improving the applicability of the password generation method.
In one exemplary embodiment of the present disclosure, the generating, locally, based on the password generation instruction, a dynamic password for the unlocking request includes: and executing a local preset password generation algorithm according to the time parameter corresponding to the password generation instruction, and locally generating a dynamic password aiming at the unlocking request.
The time parameter comprises the generation time of the password generation instruction or the time of locally receiving the password generation instruction.
The intelligent device is locally pre-deployed with a preset password generation algorithm, and the preset password generation algorithm can locally generate a dynamic password in real time. In the process of generating the dynamic password by the intelligent device, a preset password generation algorithm can be locally executed according to a time parameter corresponding to the password generation instruction, so that the dynamic password corresponding to the unlocking request is locally generated.
In this embodiment, since the preset password generation algorithm running on the server side and the intelligent device side do not need to be kept synchronous, the intelligent device does not need to keep running of the preset password generation algorithm at any time, and can call to execute the local preset password generation algorithm after receiving the password generation instruction, so that the operation resource and the running power consumption required by the intelligent device to run the preset password generation algorithm at any time are reduced.
In addition, in this embodiment, since the preset password generation algorithm running on the intelligent device side does not need to be synchronized with the server side, the time parameter input into the preset password generation algorithm may also have multiple choices, for example, the generation time of the password generation instruction or the time of locally receiving the password generation instruction, which increases the flexibility and adaptability of the password generation algorithm.
In an exemplary embodiment of the present disclosure, the generating, based on the password generating instruction, a dynamic password for the unlocking request locally, and performing a presentation process on the dynamic password further includes:
And acquiring the verification password input by the target object.
If the verification password meets the unlocking condition, executing unlocking operation; wherein, the unlocking condition includes: the verification password is consistent with the dynamic password, and the acquisition time of the verification password is within the effective time corresponding to the dynamic password.
If the verification password is inconsistent with the dynamic password and the current time is within the effective time corresponding to the dynamic password, performing error prompt, and displaying the dynamic password again.
The verification password is a password which is input by the target object through input equipment such as a password disc of the intelligent equipment and used for unlocking verification. In the unlocking condition, the acquisition time of the verification password is the time when the target object completely inputs the verification password, and the acquisition time in the effective time corresponding to the dynamic password may be that the acquisition time is within a certain time (for example, 15 minutes) after the dynamic password is generated.
When the verification password is inconsistent with the dynamic password and is in the effective time corresponding to the dynamic password, error prompt is carried out, the dynamic password is displayed again, the situation that the target user forgets the dynamic password after the last dynamic password display and needs to verify with the target terminal again is avoided, and unlocking efficiency is improved.
The display mode of the dynamic password can be one-time or dynamic display of the dynamic password on a screen by the intelligent device, or the intelligent device can sequentially lighten corresponding numbers on a password disc, or the intelligent device can broadcast the dynamic password through a voice component, and the description is not limited to the dynamic password, and is specific according to actual conditions.
Correspondingly, the embodiment of the specification also provides a password generation method, which is described by taking terminal equipment in the environment of the exemplary embodiment as an example, wherein the terminal equipment can be a smart phone, and the method comprises the following steps:
And responding to an authentication request, and displaying an authentication interface, wherein the authentication request is triggered by target equipment based on an unlocking request of the target object in a target range.
And responding to the authentication passing operation on the authentication interface, triggering a password generation instruction, and sending the password generation instruction to the target equipment, so that the target equipment generates a dynamic password aiming at the unlocking request locally on the basis of the password generation instruction, and displays the dynamic password to instruct the target object to unlock according to the dynamic password.
The authentication interface may be an interface for displaying multimedia information sent by the smart device, and in addition, the authentication interface may further include corresponding buttons for passing or failing authentication, for example, as shown in fig. 4, the authentication interface is mostly used for displaying the identity information of the target object transmitted by the smart device, and the bottom includes two buttons for characterizing passing and failing authentication, so that the user can trigger corresponding instructions for passing and failing authentication through triggering the corresponding buttons. After the user performs authentication passing operation (for example, triggers an authentication passing button), the terminal device triggers a password generation instruction to send to the intelligent device. After the user performs the authentication failure operation (for example, triggers an authentication failure button), the terminal device can trigger the warning command to send to the intelligent device, so that the intelligent device sends out warning information according to the warning command to drive the target object to leave.
In an exemplary embodiment of the present specification, the presenting an authentication interface in response to an authentication request includes:
Responding to the identity verification request, establishing multimedia communication connection with the target equipment, and displaying the identity verification interface; the identity verification interface is used for displaying the multimedia information which is transmitted by the target equipment and is aimed at the target object; the multimedia communication is used for carrying out identity verification on the target object.
For specific limitations of the method, reference may be made to the above limitation of the password generation method, and no further description is given here.
The specification also provides an application scene, and the application scene applies the password generation method. Specifically, the password generation method is applied to the application scene as follows:
Referring to fig. 5, a flow chart is shown in one embodiment. Specifically, the smart device (e.g., a smart door lock) may automatically trigger an unlock request if a guest stay is detected by detecting whether a target object (e.g., a guest) stays in a target range. Or the intelligent door lock can also detect whether someone triggers an unlocking request on the intelligent door lock. After the intelligent device receives the unlocking request of the target object, a picture corresponding to the target range is acquired through a camera in the intelligent device or a camera (such as a visual doorbell) bound with the intelligent device.
In one embodiment, the intelligent device may directly acquire a frame corresponding to the target range, acquire a face image of the target object from the frame as identity information, and perform identity verification on the face image of the target object based on a locally pre-stored identity database. If the verification is passed, a preset password generation algorithm is locally executed, and a dynamic password aiming at the unlocking request is locally generated and displayed.
In one embodiment, after the local authentication of the face image of the target object fails, an authentication request is generated and sent to the target terminal (for example, a smart phone), the smart device establishes a multimedia communication connection with the target terminal, so that a user performs authentication on the target object based on the transmitted multimedia information, when the user performs authentication, the target terminal can display an authentication interface, perform authentication based on the multimedia information displayed on the interface, after the authentication passes, the user can perform authentication on the interface to trigger a password generation instruction and send the password generation instruction to the smart device, and the smart device performs a local preset password generation algorithm according to a time parameter (for example, the time generated by the password generation instruction) corresponding to the password generation instruction, generates a dynamic password and performs display.
After the target object obtains the displayed dynamic password, the verification password is input. And the intelligent equipment verifies the unlocking condition of the verification password, if the verification password meets the unlocking condition, the intelligent equipment executes unlocking operation, stores the unlocking prompt message and sends the unlocking prompt message to the target terminal so as to inform the user of successful unlocking. If the verification password does not meet the unlocking condition and the current time (such as the local system time) is within the effective time corresponding to the dynamic password, error prompt is carried out, and the dynamic password is displayed again.
In another application scenario, as shown in fig. 6, the above-described password generation method may be specifically applied to the smart door lock 601. The intelligent door lock 601 is connected with a user terminal 602 of a user through a network.
Specifically, a smart door lock 601 is installed in a user's home, and the smart door lock 601 is connected and bound to a user terminal 602 of the user through a network.
When a visitor visits the home of a user (i.e. a host), the intelligent door lock can actively trigger an access request by detecting whether a target object (visitor) stays in a target range or not when the visitor is positioned in front of the intelligent door lock, and if the visitor stays in the target range, the intelligent door lock actively triggers the access request; or the visitor directly triggers the doorbell bound with the intelligent door lock, and the communication module of the intelligent door lock automatically sends an access request to the user terminal of the host bound with the intelligent door lock. The access request may be an unlocking request, where the access request may carry user information of the visitor, for example, image or video information including the visitor collected by a camera of the intelligent door lock or a camera bound to the intelligent door lock.
After receiving the visitor visit information, the user terminal can enter an identity verification interface through an application program deployed in the user terminal, and the identity verification interface can be a live broadcast intercom interface.
The user terminal is connected to the audio and video live intercom function of the intelligent door lock through the triggered live intercom page by a wireless communication technology, and performs audio and video real-time communication and live intercom with the visitor.
After the identity of the visitor is confirmed through live broadcast pictures and sounds displayed by the user terminal, if the owner needs to unlock the visitor and enter home, a password generation instruction can be sent to the intelligent door lock through the user terminal, and the password generation instruction is used for instructing the intelligent door lock to locally generate a one-time password and display and/or broadcast.
After the intelligent door receives the password generation instruction, a pre-deployed password generation algorithm is operated locally to generate a disposable password. Meanwhile, the intelligent door lock can start timing. The intelligent door lock repeatedly broadcasts the one-time password through the voice broadcasting module, reminds a visitor to input the one-time password for unlocking, and wakes up a door lock password input keyboard;
The duration of the voice repeated broadcasting may be preset in advance, for example, may be T0; the timing duration of the timing module is T. After the visitor hears the voice broadcast, the one-time password of repeated broadcast can be input on the password input keyboard of the intelligent door lock.
When the timing duration T < T0:
(1) If the visitor does not input any password on the intelligent door lock, continuing repeating broadcasting;
(2) If the visitor inputs correctly, unlocking normally, and resetting the timing module;
(3) If the visitor inputs the error once or a plurality of times, the intelligent door lock inputs the error through voice prompt, and then the one-time password is continuously rebroadcast and the password input keyboard is kept in a wake-up state.
When the time period T > =t0:
① The intelligent door lock prompts the visitor to overtime without inputting a password through voice broadcasting;
② The password keyboard of the intelligent door lock is closed to input the state;
③ The timing module of the intelligent door lock is reset and begins timing again.
If the visitor wants to unlock again, the above steps are resumed if the visitor allows.
After the visitor is successfully unlocked, the unlocking success can be prompted through voice broadcasting, then the intelligent door lock reports information of the successful unlocking of the visitor to the user terminal, and meanwhile the intelligent door lock also stores the unlocking information.
After receiving the information that the visitor is successfully unlocked, the user terminal can display the unlocking information in a log mode. After unlocking is completed, the visitor can also send a piece of information for stopping the audio/video live intercom module of the intelligent door lock to the intelligent door lock through the live intercom interface of the user terminal. After the intelligent door lock receives the information, the audio and video live intercom module of the intelligent door lock stops working, and the unlocking process is finished.
Exemplary apparatus
The embodiment of the specification also provides a password generating device, which comprises:
The instruction acquisition module is used for responding to an unlocking request aiming at a target object in a target range and acquiring a password generation instruction;
and the password generation module is used for locally generating a dynamic password aiming at the unlocking request based on the password generation instruction, and displaying the dynamic password so as to instruct the target object to unlock according to the dynamic password.
Optionally, the instruction obtaining module is specifically configured to generate an authentication request in response to an unlocking request for a target object in a target range;
The identity verification request is sent to a target terminal, and multimedia communication connection is established with the target terminal, so that identity verification is carried out on the target object based on the transmitted multimedia information;
And if the password generation instruction triggered by the target terminal in response to the authentication is received, executing the step of generating a dynamic password aiming at the unlocking request locally based on the password generation instruction and displaying the dynamic password.
Optionally, the instruction obtaining module responds to an unlocking request for a target object in a target range, and generates an identity verification request which is specifically used for obtaining a picture corresponding to the target range;
and if the target object is detected in the picture, triggering an unlocking request, and generating an identity verification request aiming at the target object based on the unlocking request.
Optionally, the instruction obtaining module is specifically configured to obtain identity information of a target object in a target range in response to an unlocking request for the target object;
And carrying out identity verification on the identity information of the target object based on a local pre-stored identity database, and generating the password generation instruction after the identity verification of the target object is passed.
Optionally, the password generating module is configured to locally generate a dynamic password for the unlocking request based on the password generating instruction, and execute a local preset password generating algorithm according to a time parameter corresponding to the password generating instruction, so as to locally generate the dynamic password for the unlocking request; the time parameter includes a generation time of the password generation instruction or a time at which the password generation instruction is received locally.
Optionally, the method further comprises: the password verification module is used for acquiring a verification password input by the target object, and executing unlocking operation if the verification password meets unlocking conditions; wherein, the unlocking condition includes: the verification password is consistent with the dynamic password, and the acquisition time of the verification password is within the effective time corresponding to the dynamic password; if the verification password is inconsistent with the dynamic password and the current time is within the effective time corresponding to the dynamic password, performing error prompt, and displaying the dynamic password again.
Another exemplary embodiment of the present specification also provides a password generating apparatus, including:
The interface display module is used for responding to an identity verification request, and displaying an identity verification interface, wherein the identity verification request is triggered by target equipment based on an unlocking request of the target object in a target range;
The instruction sending module is used for responding to the authentication passing operation on the authentication interface, triggering a password generating instruction, and sending the password generating instruction to the target equipment, so that the target equipment generates a dynamic password aiming at the unlocking request on the basis of the password generating instruction, and performs display processing on the dynamic password to instruct the target object to unlock according to the dynamic password.
Optionally, the interface display module responds to the authentication request, displays an authentication interface specifically for responding to the authentication request, establishes a multimedia communication connection with the target device, and displays the authentication interface; the identity verification interface is used for displaying the multimedia information which is transmitted by the target equipment and is aimed at the target object; the multimedia communication is used for carrying out identity verification on the target object.
Exemplary System
The embodiment of the specification also provides a password generation system, which comprises: target equipment and target terminals; wherein,
The target terminal is used for responding to the identity verification request, displaying an identity verification interface, responding to the identity verification passing operation on the identity verification interface, triggering a password generation instruction, and sending the password generation instruction to the target equipment;
The target device is configured to trigger the authentication request based on an unlocking request of the target object within a target range, generate a dynamic password for the unlocking request locally based on the password generation instruction after the password generation instruction is acquired, and display the dynamic password to instruct the target object to unlock according to the dynamic password.
Exemplary electronic device
An exemplary embodiment of the present specification also provides an electronic device including: a memory storing a computer program, and a processor that when executed performs the steps in the password generation method according to various embodiments of the present specification described in the "exemplary method" section of the present specification above.
The internal structure of the electronic device may be as shown in fig. 7, and the electronic device includes a processor, a memory, a network interface, and an input device connected through a system bus. Wherein the processor of the electronic device is configured to provide computing and control capabilities. The memory of the central control device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the electronic device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, performs the steps in the password generation method according to various embodiments of the present specification as described in the "exemplary method" section of the present specification above.
The electronic equipment can also comprise a display component and a voice component, wherein the display component can be a liquid crystal display screen or an electronic ink display screen, an input device of the electronic equipment can be a touch layer covered on the display component, can also be a key, a track ball or a touch pad arranged on a shell of the electronic equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
In one embodiment, the electronic device may also be a smart door lock, including a memory, a processor for providing computing and control capabilities. The memory of the central control device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The computer program, when executed by a processor, performs the steps in the password generation method according to various embodiments of the present specification as described in the "exemplary method" section of the present specification above.
It will be appreciated by those skilled in the art that the structure shown in fig. 7 is merely a block diagram of a portion of the structure associated with the present description and does not constitute a limitation of the electronic device to which the present description is applied, and that a particular electronic device may include more or less components than those shown, or may combine some components, or have a different arrangement of components.
Exemplary computer program product and computer readable storage Medium
In addition to the methods and apparatus described above, embodiments of the present description may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform the steps in a password generation method according to the various embodiments of the present description described in the "exemplary methods" section of the present description.
The computer program product may write program code for performing the operations of embodiments of the present description in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present specification may also be a storage medium having stored thereon a computer program that is executed by a processor to perform the steps in the password generation method according to the various embodiments of the present specification described in the above-described "exemplary method" section of the present specification.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present specification, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the present description, which is within the scope of the present description. Accordingly, the protection scope of the patent should be determined by the appended claims.

Claims (13)

1. A method of generating a password, comprising:
the method comprises the steps that an intelligent device responds to an unlocking request aiming at a target object in a target range, and a password generation instruction generated after the unlocking request is checked is obtained; the password generation instruction is used for indicating the intelligent equipment to locally generate a dynamic password;
and generating a dynamic password aiming at the unlocking request on the basis of the password generation instruction locally of the intelligent equipment, and displaying the dynamic password to instruct the target object to unlock the intelligent equipment according to the dynamic password.
2. The method of claim 1, wherein the obtaining, in response to an unlock request for a target object within a target range, a password generation instruction generated after the unlock request is verified includes:
Generating an identity verification request in response to an unlocking request for a target object in a target range;
The identity verification request is sent to a target terminal, and multimedia communication connection is established with the target terminal, so that identity verification is carried out on the target object based on the transmitted multimedia information;
And if the password generation instruction triggered by the target terminal in response to the authentication is received, executing the step of generating a dynamic password aiming at the unlocking request locally based on the password generation instruction and displaying the dynamic password.
3. The method of claim 2, wherein generating an authentication request in response to an unlock request for a target object within a target range comprises:
Acquiring a picture corresponding to the target range;
and if the target object is detected in the picture, triggering an unlocking request, and generating an identity verification request aiming at the target object based on the unlocking request.
4. The method of claim 1, wherein the obtaining, in response to an unlock request for a target object within a target range, a password generation instruction generated after the unlock request is verified includes:
Responding to an unlocking request for a target object in a target range, and acquiring identity information of the target object;
And carrying out identity verification on the identity information of the target object based on a local pre-stored identity database, and generating the password generation instruction after the identity verification of the target object is passed.
5. The method of any of claims 1-4, wherein the generating, locally at the smart device, a dynamic password for the unlock request based on the password generation instruction comprises:
Executing a local preset password generation algorithm of the intelligent equipment according to the time parameter corresponding to the password generation instruction, and locally generating a dynamic password aiming at the unlocking request on the intelligent equipment; the time parameter includes a generation time of the password generation instruction or a time at which the password generation instruction is received locally.
6. The method according to any one of claims 1-4, wherein the generating, based on the password generation instruction, a dynamic password for the unlocking request locally on the smart device, and performing a presentation process on the dynamic password further comprises:
acquiring an authentication password input by the target object;
If the verification password meets the unlocking condition, executing unlocking operation; wherein, the unlocking condition includes: the verification password is consistent with the dynamic password, and the acquisition time of the verification password is within the effective time corresponding to the dynamic password;
If the verification password is inconsistent with the dynamic password and the current time is within the effective time corresponding to the dynamic password, performing error prompt, and displaying the dynamic password again.
7. A method of generating a password, comprising:
the method comprises the steps that a target terminal responds to an identity verification request, and an identity verification interface is displayed, wherein the identity verification request is triggered by intelligent equipment based on an unlocking request of a target object in a target range;
Responding to authentication passing operation on an authentication interface, triggering a password generation instruction, and sending the password generation instruction to the intelligent device, so that the intelligent terminal generates a dynamic password for the unlocking request locally on the basis of the password generation instruction, and displays the dynamic password to instruct the target object to unlock according to the dynamic password; the password generation instruction is used for indicating the intelligent device to locally generate the dynamic password.
8. The method of claim 7, wherein the exposing the authentication interface in response to the authentication request comprises:
Responding to the identity verification request, establishing multimedia communication connection with the target equipment, and displaying the identity verification interface; the identity verification interface is used for displaying the multimedia information which is transmitted by the target equipment and is aimed at the target object; the multimedia communication is used for carrying out identity verification on the target object.
9. A password generation apparatus, comprising:
The instruction acquisition module is used for responding to an unlocking request aiming at a target object in a target range and acquiring a password generation instruction generated after the unlocking request is checked; the password generation instruction is used for indicating the intelligent equipment to locally generate a dynamic password;
The password generation module is used for generating a dynamic password aiming at the unlocking request on the basis of the password generation instruction locally of the intelligent equipment, and displaying the dynamic password so as to instruct the target object to unlock the intelligent equipment according to the dynamic password.
10. A password generation apparatus, comprising:
the interface display module is used for responding to an identity verification request, and displaying an identity verification interface, wherein the identity verification request is triggered by the intelligent equipment based on an unlocking request of the target object in a target range;
The instruction sending module is used for responding to the authentication passing operation on the authentication interface, triggering a password generation instruction, and sending the password generation instruction to the intelligent equipment, so that the intelligent equipment generates a dynamic password aiming at the unlocking request on the basis of the password generation instruction, and performs display processing on the dynamic password to instruct the target object to unlock according to the dynamic password; the password generation instruction is used for indicating the intelligent device to locally generate the dynamic password.
11. A password generation system, comprising: the intelligent equipment and the target terminal; wherein,
The target terminal is used for responding to the identity verification request, displaying an identity verification interface, responding to the identity verification passing operation on the identity verification interface, triggering a password generation instruction, and sending the password generation instruction to the intelligent equipment;
The intelligent device is used for responding to an unlocking request for the target object in a target range to trigger the identity verification request, generating a dynamic password for the unlocking request on the local side of the intelligent device based on the password generation instruction after the password generation instruction is acquired, and displaying the dynamic password to instruct the target object to unlock according to the dynamic password; the password generation instruction is used for indicating the intelligent device to locally generate a dynamic password.
12. An electronic device, comprising: a memory storing a computer program and a processor implementing the password generation method of any of claims 1-8 when the computer program is executed by the processor.
13. A computer readable storage medium having stored thereon a computer program, characterized in that the computer program when executed by a processor realizes the steps of the password generation method of any of claims 1-8.
CN202210327000.7A 2022-03-30 2022-03-30 Password generation method, device and system and electronic equipment Active CN114821860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210327000.7A CN114821860B (en) 2022-03-30 2022-03-30 Password generation method, device and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210327000.7A CN114821860B (en) 2022-03-30 2022-03-30 Password generation method, device and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN114821860A CN114821860A (en) 2022-07-29
CN114821860B true CN114821860B (en) 2024-06-07

Family

ID=82533483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210327000.7A Active CN114821860B (en) 2022-03-30 2022-03-30 Password generation method, device and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN114821860B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407788A (en) * 2016-08-31 2017-02-15 深圳天珑无线科技有限公司 Unlocking method, unlocking apparatus, and terminal
CN106529235A (en) * 2016-10-24 2017-03-22 深圳市金立通信设备有限公司 Unlocking method and terminal
CN106887064A (en) * 2017-03-04 2017-06-23 浙江天地人科技有限公司 A kind of access controller and gate control system based on dynamic password
CN107170085A (en) * 2017-05-11 2017-09-15 广东汇泰龙科技有限公司 A kind of temporary password method for unlocking and system
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN110415414A (en) * 2019-07-31 2019-11-05 中国工商银行股份有限公司 The unlocking method and device of dynamic puzzle-lock based on both sides' verifying
CN110443925A (en) * 2019-08-06 2019-11-12 深圳市沃特沃德股份有限公司 Generation method, device, storage medium and the computer equipment of temporary password
CN111080845A (en) * 2019-10-29 2020-04-28 深圳市汇顶科技股份有限公司 Temporary unlocking method, system, door lock, administrator terminal and readable storage medium
CN111951455A (en) * 2020-08-24 2020-11-17 上海茂声智能科技有限公司 Method, system, equipment and storage medium for remotely authorizing visitor to pass
CN109472904B (en) * 2018-11-20 2021-04-06 北京千丁互联科技有限公司 Door lock password management system and method
CN112750242A (en) * 2021-01-25 2021-05-04 广州畅联信息科技有限公司 Unlocking method and system of dynamic coded lock and dynamic coded lock circuit
CN112750240A (en) * 2021-01-14 2021-05-04 深圳市凯迪仕智能科技有限公司 Remote control intelligent door lock system and unlocking method
CN112750238A (en) * 2021-01-07 2021-05-04 湖南晨晫智能科技有限公司 Authorization management method of intelligent iris lock
CN113554793A (en) * 2021-07-29 2021-10-26 西交利物浦大学 Temporary access method, equipment, storage medium and system of intelligent access control system
CN113593095A (en) * 2021-08-19 2021-11-02 广东好太太智能家居有限公司 Intelligent lock and off-line verification method and system for temporary password of intelligent lock
CN214846861U (en) * 2021-01-14 2021-11-23 深圳市凯迪仕智能科技有限公司 Remote control's intelligent lock system
CN113961904A (en) * 2021-11-01 2022-01-21 中国电信股份有限公司 Screen unlocking method and device, electronic equipment and readable medium

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407788A (en) * 2016-08-31 2017-02-15 深圳天珑无线科技有限公司 Unlocking method, unlocking apparatus, and terminal
CN106529235A (en) * 2016-10-24 2017-03-22 深圳市金立通信设备有限公司 Unlocking method and terminal
CN106887064A (en) * 2017-03-04 2017-06-23 浙江天地人科技有限公司 A kind of access controller and gate control system based on dynamic password
CN107170085A (en) * 2017-05-11 2017-09-15 广东汇泰龙科技有限公司 A kind of temporary password method for unlocking and system
CN109472904B (en) * 2018-11-20 2021-04-06 北京千丁互联科技有限公司 Door lock password management system and method
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN110415414A (en) * 2019-07-31 2019-11-05 中国工商银行股份有限公司 The unlocking method and device of dynamic puzzle-lock based on both sides' verifying
CN110443925A (en) * 2019-08-06 2019-11-12 深圳市沃特沃德股份有限公司 Generation method, device, storage medium and the computer equipment of temporary password
CN111080845A (en) * 2019-10-29 2020-04-28 深圳市汇顶科技股份有限公司 Temporary unlocking method, system, door lock, administrator terminal and readable storage medium
CN111951455A (en) * 2020-08-24 2020-11-17 上海茂声智能科技有限公司 Method, system, equipment and storage medium for remotely authorizing visitor to pass
CN112750238A (en) * 2021-01-07 2021-05-04 湖南晨晫智能科技有限公司 Authorization management method of intelligent iris lock
CN112750240A (en) * 2021-01-14 2021-05-04 深圳市凯迪仕智能科技有限公司 Remote control intelligent door lock system and unlocking method
CN214846861U (en) * 2021-01-14 2021-11-23 深圳市凯迪仕智能科技有限公司 Remote control's intelligent lock system
CN112750242A (en) * 2021-01-25 2021-05-04 广州畅联信息科技有限公司 Unlocking method and system of dynamic coded lock and dynamic coded lock circuit
CN113554793A (en) * 2021-07-29 2021-10-26 西交利物浦大学 Temporary access method, equipment, storage medium and system of intelligent access control system
CN113593095A (en) * 2021-08-19 2021-11-02 广东好太太智能家居有限公司 Intelligent lock and off-line verification method and system for temporary password of intelligent lock
CN113961904A (en) * 2021-11-01 2022-01-21 中国电信股份有限公司 Screen unlocking method and device, electronic equipment and readable medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于CORTEX M3的智能电子锁的设计与实现;孙翌晨;许海雨;朱贤平;;数码设计;20180108(01) *

Also Published As

Publication number Publication date
CN114821860A (en) 2022-07-29

Similar Documents

Publication Publication Date Title
US10867026B1 (en) Authentication and control interface of a security system
CN110535732B (en) Equipment control method and device, electronic equipment and storage medium
US20210232983A1 (en) Scheduled temporary rental property access
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
US11743336B2 (en) Method and system for operating an electronic device
CN109388532A (en) Test method, device, electronic equipment and computer-readable storage medium
CN103167149A (en) System and method of safety of mobile phone based on face recognition
CN104656885B (en) Handheld eye-controlled eye contact device, password input device and method thereof, and computer readable recording medium
CN109219036A (en) Unbind method and device, the electronic equipment of equipment
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
WO2018040045A1 (en) Monitoring method, apparatus and electronic device
CN108811179A (en) Connection method, device and the storage medium of wireless network
CN109254661A (en) Image display method, device, storage medium and electronic equipment
WO2022227528A1 (en) Air conditioner control method and system, and air conditioner
CN107231338B (en) Network connection method, device and device for network connection
CN114821860B (en) Password generation method, device and system and electronic equipment
CN105740677B (en) A kind of method for start-up and shutdown, system and intelligent mobile terminal
CN111553243A (en) Alarm control method and device, terminal equipment and computer readable storage medium
CN115862196A (en) Identity verification method and device based on intelligent lock and intelligent lock
CN114999030A (en) Unlocking method, system, electronic equipment and storage medium
CN107529635A (en) Terminal control method, device, electronic equipment and storage medium
CN108804892A (en) Electronic device
CN111899394A (en) Data processing method, device, equipment and computer readable storage medium
CN112541994A (en) Pre-door real-name authentication system, method, equipment and storage medium
CN107222465B (en) Network access control system of intelligent gateway

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant