WO2019033840A1 - Password authentication method for shared device, shared device, cloud server, and system - Google Patents

Password authentication method for shared device, shared device, cloud server, and system Download PDF

Info

Publication number
WO2019033840A1
WO2019033840A1 PCT/CN2018/090666 CN2018090666W WO2019033840A1 WO 2019033840 A1 WO2019033840 A1 WO 2019033840A1 CN 2018090666 W CN2018090666 W CN 2018090666W WO 2019033840 A1 WO2019033840 A1 WO 2019033840A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
user
cloud
shared device
cipher
Prior art date
Application number
PCT/CN2018/090666
Other languages
French (fr)
Chinese (zh)
Inventor
杨赛赛
苗岑岑
李喜林
Original Assignee
格力电器(武汉)有限公司
珠海格力电器股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 格力电器(武汉)有限公司, 珠海格力电器股份有限公司 filed Critical 格力电器(武汉)有限公司
Publication of WO2019033840A1 publication Critical patent/WO2019033840A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Definitions

  • the present application relates to the field of shared device technologies, and in particular, to a password authentication method, a shared device, a cloud server, and a system for a shared device.
  • shared devices all have one thing in common: they need to connect to the Internet or establish short-range wireless communication with mobile terminals, such as mobile phones, in order to synchronize information with users and implement password verification. Therefore, shared devices usually have Wireless module.
  • the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, so that the shared device and the cloud server can still implement a password between the user and the shared device without connecting to the network. Synchronize the verification process.
  • a password authentication method for a shared device is applied to a cloud server, where the cloud server has a plurality of cloud password databases, and each cloud password database corresponds to a shared device, and the method includes:
  • the shared device that uses the shared device uses the password to find out whether the device and the password are stored.
  • the password with the same password is used, and if yes, the required information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device.
  • the passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
  • the cloud server provides a password to the user after the user completes the payment
  • the password corresponding to the demand information is extracted from the cloud cipher group, and the method includes:
  • the password corresponding to the demand information is extracted from the cloud cipher group.
  • the password corresponding to the demand information is extracted from the cloud cipher group, which specifically includes:
  • the user After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
  • the password with the same password is used to determine the required information of the user by using the found password, and the synchronization verification of the password is completed, which specifically includes:
  • the shared device that uses the shared device uses the password to find out whether the device and the password are stored.
  • the password with the same password is used. If yes, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
  • all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher library use the same cipher classification scheme.
  • a password verification method for a shared device is applied to a shared device to be used, and the method includes:
  • Obtaining a password obtained by the user in the cloud password database where the password is a password obtained by using a preset password generation rule for the requirement information, where the requirement information is demand information of the user to the shared device to be used;
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device.
  • the passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
  • the password is used to search for a password that is the same as the password by using the password of the device, and the password includes:
  • the password is used to search for a password that is the same as the password by using the password of the device, and the password includes:
  • the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  • the level of the device-side cipher group, and the user level are the same, Determining the user's requirement information by using the found password and the preset password generation rule, and completing the synchronization verification of the password, specifically:
  • the method further includes:
  • the method further includes:
  • the password that verified the success is deleted.
  • the method further includes:
  • prompt information is output, and the prompt information is used to prompt the user to re-enter the password.
  • a cloud server has a plurality of cloud cryptographic libraries, and each cloud cryptographic library corresponds to a shared device, and the cloud server includes:
  • a first acquiring unit configured to acquire a device identity of the shared device to be used by the user, and determine a corresponding cloud password database according to the device identity
  • a second acquiring unit configured to acquire user information input by the user and demand information about the shared device to be used
  • a selecting unit configured to select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
  • An extracting unit configured to extract a password corresponding to the requirement information from the cloud cipher group, where the password is a password obtained by using a preset password generating rule in advance for the demand information;
  • a feedback unit configured to feed back the password to the user, so that when the user uses the shared device to be used, the shared device uses the password to search from its own device-side password database. Whether the password with the same password is stored, and if yes, determining the demand information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device.
  • the passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
  • the extracting unit includes:
  • a first extracting subunit configured to extract, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
  • a second extracting subunit configured to: after detecting that the user has paid the fee, extract a password corresponding to the demand information from the cloud cipher group.
  • the second extraction subunit is specifically configured to:
  • the user After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
  • the feedback unit is specifically configured to:
  • the shared device that uses the shared device uses the password to find out whether the device and the password are stored.
  • the password with the same password is used. If yes, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
  • all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher library use the same cipher classification scheme.
  • a shared device including:
  • a third obtaining unit configured to acquire a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, where the demand information is that the user uses the shared device to be used.
  • Demand information
  • a searching unit configured to use, by using the password, to find, from its own device-side password database, whether a password with the same password is stored;
  • the verification unit is configured to determine the user's demand information by using the found password and the preset password generation rule, and complete synchronization verification of the password.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device.
  • the passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
  • the searching unit is specifically configured to:
  • the searching unit is specifically configured to:
  • the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  • the verification unit is specifically configured to:
  • the method further includes:
  • a placing unit configured to: after the synchronization verification of the password is completed, put an unused device-side cipher group of a level higher than the user level into the valid password reservation area;
  • the first deleting unit is configured to delete all device-side cipher groups whose level is lower than the user level.
  • the method further includes:
  • the second deleting unit is configured to delete the password that is successfully verified after determining the user's requirement information and completing the synchronization verification of the password.
  • the method further includes:
  • an output unit configured to output prompt information when the password is the same as the password, and the prompt information is used to prompt the user to re-enter the password.
  • a password authentication system for a shared device comprising the cloud server described above and at least one of the shared devices described above.
  • the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, by using a password of the shared device in the cloud password database corresponding to the cloud server, and the shared device
  • the password in the device-side password database uses the same preset password generation rule.
  • the user can use the demand information of the device to be used before using the shared device.
  • the corresponding password is extracted from the cloud password database.
  • the preset password generation rule is used, and then the password is input to the shared device.
  • the shared device finds the password corresponding to the password from its device-side password database, the used password and the preset password generation rule can be utilized.
  • the user's demand information is determined, thereby completing the synchronous verification of the password.
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • FIG. 1 is a flowchart of a method for verifying a password of a shared device based on a cloud server side according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of correspondence between a fee, a password, a cloud cipher group, and a cloud cipher library according to an embodiment of the present application;
  • FIG. 3 is a schematic diagram of a correspondence between a cloud server and a shared device according to an embodiment of the present disclosure
  • FIG. 4 is a flowchart of a password verification method based on a shared device on a shared device side according to an embodiment of the present disclosure
  • FIG. 5 is a schematic structural diagram of a cloud server according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a shared device according to an embodiment of the present disclosure.
  • the embodiment of the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, so that the shared device and the cloud server can still implement password synchronization between the user and the shared device without connecting to the network. Verification process.
  • FIG. 1 is a flowchart of a method for verifying a password of a shared device according to an embodiment of the present application.
  • the method is applied to a cloud server, where the cloud server is associated with at least one shared device, and the cloud server has multiple cloud password databases.
  • Each cloud password library corresponds to a shared device, and the method includes the steps of:
  • Step S101 Obtain a device identity of the shared device to be used input by the user, and determine a corresponding cloud password database according to the device identity;
  • the user can scan the two-dimensional code of the shared device through a terminal such as a mobile phone or an IPAD to obtain the device identity of the shared device, and the device identity is also the device identifier.
  • a terminal such as a mobile phone or an IPAD
  • the user can also obtain the device identity of the shared device in other ways, such as by inputting the identity code printed on the shared device into the computer to obtain the device identity of the shared device.
  • Each of the shared devices has a unique device identity.
  • Step S102 Obtain user information input by the user and demand information of the shared device to be used;
  • the user information specifically refers to the identity information of the user, such as an identity card number.
  • the user's demand information for the shared washing machine includes: laundry time, number of rinsing, washing temperature, rotation speed, and the like.
  • Step S103 Select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
  • a cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions.
  • a collection of all passwords, that is, each cloud cipher group contains all the conditions that the user needs to use the shared device.
  • the shared device is a shared washing machine
  • the user's demand information for the shared washing machine that is, the shared washing machine
  • the laundry time is 30 minutes
  • the laundry mode is: two rinsing plus one dehydration
  • the clothing type is: shirt
  • a set of all passwords is generated by arranging and combining the shared washing machines according to the preset password generation rules in different working situations, that is, obtaining a cloud cipher group.
  • the cloud cipher group in front of the array can be selected as the cloud cipher group.
  • a cloud cipher group can also be randomly selected.
  • the purpose of recording the cloud cipher group and the user information in the form of a corresponding relationship is to implement a real-name system used by the shared device to avoid providing services to users who do not meet the age requirement, such as users who share the bicycle need to be at least 12 years old. At the same time, it provides conditions for the subsequent purchase of personal accident insurance and third party liability insurance for users.
  • different levels of each cloud cipher group included in the cloud cipher pool can be set, and different levels are set for the user, for example, the user's level is determined according to the total number of times the user has used the shared device, and the number of times the user uses The more users, the higher the level of users, the corresponding level of users and cloud password groups correspond.
  • the execution process of the step is specifically: first determining a plurality of cloud cipher groups corresponding to the shared device to be used, and secondly, determining a user level according to the user information, and determining a corresponding cloud cipher group according to the user level.
  • Step S104 Extract a password corresponding to the demand information from the cloud cipher group
  • the password is a password obtained by using a preset password generation rule in advance for the requirement information, that is, the password is generated according to a preset password generation rule for a shared device in a different combination of working conditions, and therefore, According to the demand information, that is, the working condition of the shared device, the corresponding password can be extracted from the cloud cipher group.
  • Step S105 The password is fed back to the user, so that when the user uses the shared device to be used, the shared device uses the password and its own device-side password database to determine the user's demand information, and completes the synchronous verification of the password.
  • the cloud password database feeds back the found password to the user.
  • the password is input to the shared device to be used, and the shared device uses the password to search for the stored password from the device-side password database.
  • the password that is the same as the password entered by the user. If yes, the password is found and the preset password generation rule is used to determine the user's demand information, and the password verification is completed.
  • the device-side password library includes multiple device-side password groups, and each device-side password group corresponds to one user, and all passwords stored in the device-side password library of each shared device and the cloud password corresponding to the shared device are configured.
  • the passwords in the library are generated by using the same preset password generation rules for the user's demand information.
  • the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
  • the password verification method of the shared device disclosed in the present application adopts the same preset password by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device.
  • a rule is generated, so that the user can use the demand information of the device to be used before using the shared device, first extracting a corresponding password from the cloud password database, and the password is obtained by using a preset password generation rule for the demand information, and then inputting the password to the password.
  • the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password. .
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • the present application since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
  • different sharing devices may have different time requirements for payment, such as sharing a washing machine.
  • the shared washing machine can generate a corresponding fee according to the demand information; for example, sharing the bicycle, due to advance
  • the user's usage time cannot be known, so the user's fee cannot be determined in advance.
  • the user can pay after the user completes the use.
  • the step S104 specifically includes:
  • the password corresponding to the demand information is extracted from the cloud cipher group.
  • the fee and the password are extracted from the cloud cipher group according to the user's requirement, for example, the shared washing machine, and the cloud server can find one from the cloud cipher group according to the laundry duration, the rotation speed, and the washing temperature selected by the user.
  • the user needs to pay the fee.
  • the cloud server After the user pays successfully, the cloud server provides the user with a corresponding password.
  • the cloud cipher library includes multiple cloud cipher groups, such as cloud cipher group 1 and cloud cipher group 2 .
  • Cloud cipher group X each cloud cipher group corresponds to one user, and multiple users correspond to multiple cloud cipher groups.
  • all cloud cipher groups can be grouped into cloud ciphers according to level order.
  • the library, each cloud cipher group is a set of all passwords generated according to a preset password generation rule for a shared device in a different combination of working conditions, that is, each cloud cipher group includes all cases in which the user needs to use the shared device.
  • the different working conditions of the shared device include factors: (1) the usage duration of the shared device, such as 5 minutes, 10 minutes, 20 minutes; (2) the number, taking the shared washing machine as an example.
  • the quantity may refer to the quantity of laundry required by the user, such as 1, 2, 3; (3) the variable (variable 3 in FIG. 2, variable N) refers to the working mode and cost of the shared device.
  • Variable factors, different durations can be considered as an element of a variable under a variable may include various elements, such as element a, element B, element c and the like.
  • the combination of different factors produces a password and a unique fee corresponding to the password. As shown in FIG.
  • the password a corresponds to the fee a
  • the password b corresponds to the fee b
  • the password c corresponds to the fee c
  • the password e corresponds to the fee e.
  • the cloud server and the at least one shared device are in a corresponding relationship, and the cloud server and each shared device can form a system, and the cloud server and the multiple shared devices form a plurality of systems.
  • the same system must ensure
  • the preset password generation rules (including the password generation algorithm and encryption principle) adopted by the device-side password database and the corresponding cloud password database are the same, and the preset password generation rules between different systems may be different.
  • all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher pool can adopt the same password classification and grading scheme, that is, the same demand information for the same user.
  • the corresponding cloud cipher group and the device cipher group have the same level, and the password in the cloud cipher group and the password in the device cipher group use the same preset password generation rule, but the password and the device end in the cloud cipher group
  • the time generated by the password in the cipher group can be the same or different.
  • the user level can be determined according to the order in which the user completes the payment, and when the multiple users need to pay the fee, the user pays the higher time.
  • FIG. 3 is a schematic diagram of a correspondence between a cloud server and a shared device according to an embodiment of the present disclosure.
  • the cloud server corresponds to multiple shared devices, and multiple shared devices are managed separately in the corresponding cloud cryptosystem in the cloud server, which has complementary effects.
  • different passwords can be obtained from the cloud password database, wherein different The user obtains different passwords. For example, user 1 obtains password 1, user 2 obtains password 2, user 3 obtains password 3, user 4 obtains password 4, and user 5 obtains password 5 and so on.
  • the cloud cipher group can be divided into levels. According to the direction of the arrow in FIG. 3, the level of the cloud cipher group gradually increases. Since one cloud cipher group corresponds to one user, each user will correspondingly The cloud cipher group obtains the password. Therefore, in the embodiment shown in FIG. 3, the levels of the passwords 1 to 5 are gradually increased.
  • the device-side password database includes multiple device-side cipher groups, such as device-side cipher groups 1 to 5. Each device-side cipher group corresponds to one user. For example, device-side cipher group 5 corresponds to user 5, and device-side The password in the cipher group and the password in the cloud cipher group are the same as the default password generation rules.
  • the device cipher group can be classified according to the direction indicated by the arrow in FIG. 3, and the level of the device cipher group is gradually increased.
  • the user level, the device-side cipher group level, and the cloud cipher group level are the same.
  • the peer users use the same-level device-side cipher group, and the peer-end device-side cipher group can be rotated normally.
  • the user can also use the device-side cipher group, as shown in Figure 3 Device-side cipher group 2 should be used normally.
  • user 2 can also use device-side cipher group 3.
  • low-level device-side cipher group 1 and device-side cipher group 2 can be placed into valid passwords. Reserved area, used below.
  • the process of extracting the password corresponding to the demand information from the cloud cipher group after detecting the payment of the user's fee may include:
  • the password corresponding to the demand information is extracted from the cloud cipher group, and the user level is marked, wherein when a plurality of users need to pay a fee, the user level is completed according to the user.
  • the order of payment is determined, the higher the time for the user to complete the payment, the higher the corresponding user level.
  • the password provided by the cloud server to the user is extracted from the cloud password group corresponding to the user level according to the user input information, for example, the shared washing machine, and the user's demand information includes: the washing time is 30 minutes. The rinsing is performed twice, and the dehydration is performed once. The cloud server extracts the corresponding password from the cloud cipher group corresponding to the user level according to the demand information.
  • step S105 specifically includes:
  • the user may input the number in the form of a number, or the self-identification of the two-dimensional code certificate generated by the shared device according to the user's payment, or input by a password voice recognition method.
  • the passwords are arranged in the device-side cipher group regardless of the level. Only the password is input to the shared device by the user, and the level is determined after the use, and the level of the password and the corresponding device-side cipher group are determined. The same level.
  • a flow chart of a password verification method for a shared device disclosed in another embodiment of the present application is applied to a shared device to be used, such as a shared bicycle, a shared electric vehicle, a shared washing machine, and the like.
  • the method includes the steps of:
  • Step S201 Acquire a password obtained by the user in the cloud password database
  • the password is a password obtained by using a preset password generation rule in advance for the requirement information, and the demand information is demand information of the user to the shared device to be used.
  • Step S202 Searching, by using a password, from its own device-side password database, whether a password with the same password is stored;
  • the device-side password library includes multiple device-side cipher groups, and each device-side cipher group corresponds to one user, and each shared device stores all passwords in the device-side password store and the cloud cipher library corresponding to the shared device.
  • the passwords are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database and the preset password generation rule.
  • the purpose of using the shared device to determine whether the password of the user-side password store is the same as the password input by the user is to determine whether the password input by the user is a valid password.
  • Step S203 if yes, determining the user's demand information by using the found password and the preset password generation rule, and completing the synchronization verification of the password.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the password verification method of the shared device disclosed in the present application adopts the same preset password by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device.
  • a rule is generated, so that the user can use the demand information of the device to be used before using the shared device, first extracting a corresponding password from the cloud password database, and the password is obtained by using a preset password generation rule for the demand information, and then inputting the password to the password.
  • the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password. .
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • the present application since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
  • prompt information is output, and the prompt information is used to prompt the user to re-enter the password.
  • a valid password reservation area can be set in the device-side password database.
  • the priority can be preferentially searched in the valid password reserved area. If the password reservation area is not found, it is searched from the device-side password group that has been generated by the device-side password library and is not located in the valid password reserved area.
  • the valid password reserved area is mainly used to reserve the password that is to be used but not used by the shared device.
  • step S202 may specifically include:
  • Step S202 may specifically include:
  • the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  • the user level may be determined according to the order in which the user completes the payment. When multiple users need to pay the fee, the user pays the higher the time, and the corresponding user level is higher.
  • the level of the user level, the cloud cipher group, and the level of the device cipher group are the same.
  • the shared device can determine the user level according to the level of the device-side cipher group where the password matching the password provided by the user is located.
  • step S203 in the above embodiment may specifically include:
  • the user level and requirement information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
  • an unused device-side cipher group of a higher level than the user level can be placed in the valid password reservation area, and all device-side cipher groups whose level is lower than the user level can be deleted.
  • the cloud cipher group in the cloud cipher library and the device cipher group in the device cipher library are gradually generated according to a preset rule, and the low level cipher group is gradually eliminated by setting rules to ensure the cloud of the cloud cipher library.
  • the device-side cipher group in the cipher group and the device-side cipher library is within a certain number of ranges and is not repeated.
  • the cloud cipher group can add one or more cloud cipher groups after providing the user password or the user to complete a payment behavior, or increase the cloud cipher group of a certain data by a certain number of days, or according to the frequency of the user.
  • the invalid cloud cipher group can be removed by setting the validity period of the cloud cipher group and automatically deleting it after the expiration. After the user completes the self-service and the feedback is completed, the cloud cipher group used is deleted. ; can also be mixed in a variety of ways.
  • the device-side cipher group needs to be increased, such as the number of times the user uses, the time interval used, the number of existing valid device-side cipher groups, the working characteristics of the shared device, and the password level entered by the user, etc.
  • the hybrid mode is determined, and the elimination of the invalid password is subject to the automatic deletion used by the user.
  • the method further includes:
  • the shared device when an abnormal situation occurs in the working process of the shared device, for example, when the power is turned off, the shared device stores the information before the abnormal situation, and after the normal operation is resumed, the previous work is continued until the completion of the work. Secondary service.
  • the present application also discloses a cloud server and a shared device, and specifically refer to the following description.
  • the cloud server is associated with at least one shared device, where the cloud server has multiple cloud password databases, and each cloud password database corresponds to one shared device.
  • the cloud server includes:
  • the first obtaining unit 301 is configured to acquire a device identity of the shared device to be used input by the user, and determine a corresponding cloud password database according to the device identity;
  • the user can scan the two-dimensional code of the shared device through a terminal such as a mobile phone or an IPAD to obtain the device identity of the shared device, and the device identity is also the device identifier.
  • a terminal such as a mobile phone or an IPAD
  • the user can also obtain the device identity of the shared device in other ways, such as by inputting the identity code printed on the shared device into the computer to obtain the device identity of the shared device.
  • Each of the shared devices has a unique device identity.
  • the second obtaining unit 302 is configured to acquire user information input by the user and demand information about the shared device to be used;
  • the user information specifically refers to the identity information of the user, such as an identity card number.
  • the user's demand information for the shared washing machine includes: laundry time, number of rinsing, washing temperature, rotation speed, and the like.
  • the selecting unit 303 is configured to select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
  • a cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions.
  • a collection of all passwords, that is, each cloud cipher group contains all the conditions that the user needs to use the shared device.
  • the shared device is a shared washing machine
  • the user's demand information for the shared washing machine that is, the shared washing machine
  • the laundry time is 30 minutes
  • the laundry mode is: two rinsing plus one dehydration
  • the clothing type is: shirt
  • a set of all passwords is generated by arranging and combining the shared washing machines according to the preset password generation rules in different working situations, that is, obtaining a cloud cipher group.
  • the cloud cipher group in front of the array can be selected as the cloud cipher group.
  • a cloud cipher group can also be randomly selected.
  • the purpose of recording the cloud cipher group and the user information in the form of a corresponding relationship is to implement a real-name system used by the shared device to avoid providing services to users who do not meet the age requirement, such as users who share the bicycle need to be at least 12 years old. At the same time, it provides conditions for the subsequent purchase of personal accident insurance and third party liability insurance for users.
  • different levels of each cloud cipher group included in the cloud cipher pool can be set, and different levels are set for the user, for example, the user's level is determined according to the total number of times the user has used the shared device, and the number of times the user uses The more users, the higher the level of users, the corresponding level of users and cloud password groups correspond.
  • the selecting unit 303 performs the process specifically: first determining a plurality of cloud cipher groups corresponding to the shared device to be used, and secondly, determining a user level according to the user information, and determining a corresponding cloud cipher group according to the user level.
  • the extracting unit 304 is configured to extract a password corresponding to the requirement information from the cloud cipher group;
  • the password is a password obtained by using a preset password generation rule in advance for the requirement information, that is, the password is generated according to a preset password generation rule for a shared device in a different combination of working conditions, and therefore, According to the demand information, that is, the working condition of the shared device, the corresponding password can be extracted from the cloud cipher group.
  • the feedback unit 305 is configured to feed back the password to the user, so that when the user uses the shared device to be used, the password is used by the shared device to be used, and the password is used from the device-side password library. It is found whether the password with the same password is stored, and if yes, the required information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
  • the cloud password database feeds back the found password to the user.
  • the password is input to the shared device to be used, and the shared device uses the password to search for the stored password from the device-side password database.
  • the password that is the same as the password entered by the user. If yes, the password is found and the preset password generation rule is used to determine the user's demand information, and the password verification is completed.
  • the device-side password library includes multiple device-side password groups, and each device-side password group corresponds to one user, and all passwords stored in the device-side password library of each shared device and the cloud password corresponding to the shared device are configured.
  • the passwords in the library are generated by using the same preset password generation rules for the user's demand information.
  • the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
  • the cloud server disclosed in the present application uses the same preset password generation rule by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device.
  • the user Before using the shared device, the user can use the information about the device to be used.
  • the corresponding password is extracted from the cloud password database.
  • the password is obtained by using the preset password generation rule in advance, and then the password is input to the shared device.
  • the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password.
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • the present application since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
  • different sharing devices may have different time requirements for payment, such as sharing a washing machine.
  • the shared washing machine can generate a corresponding fee according to the demand information; for example, sharing the bicycle, due to advance
  • the user's usage time cannot be known, so the user's fee cannot be determined in advance.
  • the user can pay after the user completes the use.
  • the extracting unit 304 includes:
  • a first extracting subunit configured to extract, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
  • a second extracting subunit configured to: after detecting that the user has paid the fee, extract a password corresponding to the demand information from the cloud cipher group.
  • the fee and the password are extracted from the cloud cipher group according to the user's requirement, for example, the shared washing machine, and the cloud server can find one from the cloud cipher group according to the laundry duration, the rotation speed, and the washing temperature selected by the user.
  • the user needs to pay the fee.
  • the cloud server After the user pays successfully, the cloud server provides the user with a corresponding password.
  • the cloud server and the at least one shared device are in a corresponding relationship, and the cloud server and each shared device can form a system, and the cloud server and the multiple shared devices form a plurality of systems.
  • the same system must ensure
  • the preset password generation rules (including the password generation algorithm and encryption principle) adopted by the device-side password database and the corresponding cloud password database are the same, and the preset password generation rules between different systems may be different.
  • all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher pool can adopt the same password classification and grading scheme, that is, the same demand information for the same user.
  • the corresponding cloud cipher group and the device cipher group have the same level, and the password in the cloud cipher group and the password in the device cipher group use the same preset password generation rule, but the password and the device end in the cloud cipher group
  • the time generated by the password in the cipher group can be the same or different.
  • the user level can be determined according to the order in which the user completes the payment, and when the multiple users need to pay the fee, the user pays the higher time.
  • the second extraction subunit is specifically used to:
  • the user After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
  • the feedback unit 305 is specifically configured to:
  • the user may input the number in the form of a number, or the self-identification of the two-dimensional code certificate generated by the shared device according to the user's payment, or input by a password voice recognition method.
  • the passwords are arranged in the device-side cipher group regardless of the level. Only the password is input to the shared device by the user, and the level is determined after the use, and the level of the password and the corresponding device-side cipher group are determined. The same level.
  • a schematic diagram of a shared device disclosed in an embodiment of the present disclosure such as a shared bicycle, a shared electric vehicle, a shared washing machine, and the like, the shared device includes:
  • the third obtaining unit 401 is configured to obtain a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, and the demand information is that the user shares the to-be-used Equipment demand information;
  • the searching unit 402 is configured to use, by using the password, to search, from its own device-side password database, whether the same password as the password is stored;
  • the device-side password library includes multiple device-side cipher groups, and each device-side cipher group corresponds to one user, and each shared device stores all passwords in the device-side password store and the cloud cipher library corresponding to the shared device.
  • the passwords are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database and the preset password generation rule.
  • the verification unit 403 is configured to determine the requirement information of the user by using the found password and the preset password generation rule, and complete synchronization verification of the password.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is all generated according to a preset password generation rule for a shared device in a different combination of working conditions.
  • a set of passwords the device-side password library includes a plurality of device-side password groups, each device-side password group corresponding to one user, and all passwords stored in the device-side password library of each shared device and corresponding to the shared device
  • the passwords in the cloud password database are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
  • the shared device disclosed in the present application uses the same preset password generation rule by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device.
  • the user Before using the shared device, the user can use the information about the device to be used.
  • the corresponding password is extracted from the cloud password database.
  • the password is obtained by using the preset password generation rule in advance, and then the password is input to the shared device.
  • the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password.
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • the present application since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
  • the method further includes: an output unit, configured to output prompt information when the password is the same as the password, and the prompt information is used to prompt the user to re-enter the password. .
  • a valid password reservation area can be set in the device-side password database.
  • the priority can be preferentially searched in the valid password reserved area. If the password reservation area is not found, it is searched from the device-side password group that has been generated by the device-side password library and is not located in the valid password reserved area.
  • the valid password reserved area is mainly used to reserve the password that is to be used but not used by the shared device.
  • the searching unit 402 can be specifically used to:
  • the searching unit 402 can also be specifically used to:
  • the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  • the user level may be determined according to the order in which the user completes the payment. When multiple users need to pay the fee, the user pays the higher the time, and the corresponding user level is higher.
  • the level of the user level, the cloud cipher group, and the level of the device cipher group are the same.
  • the shared device can determine the user level according to the level of the device-side cipher group where the password matching the password provided by the user is located.
  • the verification unit 403 is specifically configured to:
  • an unused device-side cipher group of a higher level than the user level can be placed in the valid password reservation area, and all device-side cipher groups whose level is lower than the user level can be deleted.
  • the cloud cipher group in the cloud cipher library and the device cipher group in the device cipher library are gradually generated according to a preset rule, and the low level cipher group is gradually eliminated by setting rules to ensure the cloud of the cloud cipher library.
  • the device-side cipher group in the cipher group and the device-side cipher library is within a certain number of ranges and is not repeated.
  • the cloud cipher group can add one or more cloud cipher groups after providing the user password or the user to complete a payment behavior, or increase the cloud cipher group of a certain data by a certain number of days, or according to the frequency of the user.
  • the invalid cloud cipher group can be removed by setting the validity period of the cloud cipher group and automatically deleting it after the expiration. After the user completes the self-service and the feedback is completed, the cloud cipher group used is deleted. ; can also be mixed in a variety of ways.
  • the device-side cipher group needs to be increased, such as the number of times the user uses, the time interval used, the number of existing valid device-side cipher groups, the working characteristics of the shared device, and the password level entered by the user, etc.
  • the hybrid mode is determined, and the elimination of the invalid password is subject to the automatic deletion used by the user.
  • the shared device also includes:
  • a placing unit configured to: after the synchronization verification of the password is completed, put an unused device-side cipher group of a level higher than the user level into the valid password reservation area;
  • the first deleting unit is configured to delete all device-side cipher groups whose level is lower than the user level.
  • the shared device further includes:
  • the second deleting unit is configured to delete the password that is successfully verified after determining the user's requirement information and completing the synchronization verification of the password.
  • the present application further provides a password verification system for a shared device, the system includes the cloud server and the at least one shared device described above, wherein the working principle of the system can be found in the corresponding part of the cloud server and the shared device. I won't go into details here.

Abstract

Disclosed in the present application are a password authentication method for a shared device, a shared device, a cloud server, and a system. By adopting the same preset password generation rule for passwords in a corresponding cloud password database of a shared device in a cloud server and passwords in a device password database of the shared device, before using the shared device, a user can first extract a corresponding password from the cloud password database using requirement information for the device to be used, the password being obtained in advance by using the preset password generation rule for the requirement information, and then input the password into the shared device. When the shared device finds a password corresponding to the password from its own device password database, the requirement information of the user can be determined by using the found password and the preset password generation rule, such that synchronous verification of passwords is completed without the need for connecting the cloud server and the shared device to a network.

Description

共享设备的密码验证方法、共享设备、云端服务器及系统Password authentication method for shared device, shared device, cloud server and system
相关申请Related application
本申请要求2017年08月16日申请的,申请号为201710703147.0,名称为“共享设备的密码验证方法、共享设备、云端服务器及系统”的中国专利申请的优先权,在此将其全文引入作为参考。The present application claims priority to Chinese Patent Application No. 201710703147.0, entitled "Password Verification Method for Shared Device, Shared Device, Cloud Server and System", which is hereby incorporated by reference. reference.
技术领域Technical field
本申请涉及共享设备技术领域,更具体的说,涉及一种共享设备的密码验证方法、共享设备、云端服务器及系统。The present application relates to the field of shared device technologies, and in particular, to a password authentication method, a shared device, a cloud server, and a system for a shared device.
背景技术Background technique
近年来,各种具有自助付费功能的共享设备兴起,如共享单车、共享电动车、共享汽车、共享洗衣机等。这些共享设备的使用非常方便快捷,用户可以根据需要,下载相应的客户端并注册,在需要使用相应共享设备时,登录相应的客户端,输入待使用共享设备的编码获取解锁码,或者通过直接扫描待使用共享设备上的识别码的方式实现开锁。在使用完毕后,通过网上付费即可。In recent years, various shared devices with self-service payment functions have emerged, such as sharing bicycles, sharing electric vehicles, sharing automobiles, and sharing washing machines. The use of these shared devices is very convenient and fast. Users can download the corresponding client and register as needed. When the shared device needs to be used, log in to the corresponding client, enter the code of the shared device to obtain the unlock code, or directly Unlocking is performed by scanning the identification code on the shared device to be used. After using it, you can pay by online.
这些共享设备都有一个共同的特点:需要连接到互联网络或是与移动终端,如手机,建立近程无线通信才能实现与用户之间的信息同步,实现密码验证,因此,共享设备通常都具有无线模块。These shared devices all have one thing in common: they need to connect to the Internet or establish short-range wireless communication with mobile terminals, such as mobile phones, in order to synchronize information with users and implement password verification. Therefore, shared devices usually have Wireless module.
由于共享设备的密码验证过程需基于网络实现,因此使得共享设备的使用受到网络限制,存在互联网不安全攻击的风险,因此,如何提供一种共享设备的密码验证方法,以使共享设备和云端服务器在无需连接网络的情况下,实现用户和共享设备之间密码的同步验证成为了本领域技术人员亟需解决的技术问题。Since the password authentication process of the shared device needs to be implemented based on the network, the use of the shared device is restricted by the network, and there is a risk of insecure attacks on the Internet. Therefore, how to provide a password authentication method for the shared device to enable the shared device and the cloud server Realizing synchronous verification of passwords between users and shared devices without the need to connect to the network has become a technical problem that those skilled in the art need to solve.
发明内容Summary of the invention
有鉴于此,本申请公开一种共享设备的密码验证方法、共享设备、云端服务器及系统,以实现共享设备和云端服务器在无需连接网络的情况下,仍可实现用户和共享设备之间的密码同步验证过程。In view of this, the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, so that the shared device and the cloud server can still implement a password between the user and the shared device without connecting to the network. Synchronize the verification process.
一种共享设备的密码验证方法,应用于云端服务器,所述云端服务器具有多个云端密 码库,每一个云端密码库对应一个共享设备,所述方法包括:A password authentication method for a shared device is applied to a cloud server, where the cloud server has a plurality of cloud password databases, and each cloud password database corresponds to a shared device, and the method includes:
获取用户输入的待使用共享设备的设备身份,根据所述设备身份确定对应的云端密码库;Obtaining a device identity of the shared device to be used input by the user, and determining a corresponding cloud password database according to the device identity;
获取所述用户输入的用户信息以及对所述待使用共享设备的需求信息;Obtaining user information input by the user and demand information about the shared device to be used;
从所述云端密码库中选取一个云端密码群,并将所述云端密码群和所述用户信息以对应关系的形式进行记录;Selecting a cloud cipher group from the cloud cipher library, and recording the cloud cipher group and the user information in a correspondence relationship;
从所述云端密码群中提取出与所述需求信息对应的密码,其中,所述密码为预先对所述需求信息采用预设密码生成规则得到的密码;Extracting a password corresponding to the requirement information from the cloud cipher group, where the password is a password obtained by using a preset password generation rule for the demand information in advance;
将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则利用查找到的密码和所述预设密码生成规则确定所述用户的所述需求信息,完成对所述密码的同步验证。And returning the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to find out whether the device and the password are stored. The password with the same password is used, and if yes, the required information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
优选的,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。Preferably, the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
优选的,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成。Preferably, the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device. The passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
优选的,当所述云端服务器在所述用户完成付费后,提供密码给所述用户时,从所述云端密码群中提取出与所述需求信息对应的密码,具体包括:Preferably, when the cloud server provides a password to the user after the user completes the payment, the password corresponding to the demand information is extracted from the cloud cipher group, and the method includes:
从所述云端密码群中提取出与所述需求信息对应的需要所述用户支付的费用;Extracting, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
当检测到所述用户支付完所述费用后,从所述云端密码群提取出与所述需求信息对应的密码。After detecting that the user has paid the fee, the password corresponding to the demand information is extracted from the cloud cipher group.
优选的,当检测到所述用户支付完所述费用后,从所述云端密码群提取出与所述需求信息对应的密码,具体包括:Preferably, after detecting that the user has paid the fee, the password corresponding to the demand information is extracted from the cloud cipher group, which specifically includes:
当检测到所述用户支付完所述费用后,从所述云端密码群中提取出与所述需求信息对应的密码,并标记用户级别,其中,当多个用户需要支付费用时,所述用户级别根据用户完成支付的先后顺序确定,用户完成支付的时间越靠前,相对应的用户级别越高;After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则利用查找到的密码确定所述用户的所述需求信息,完成对所述密码的同步 验证,具体包括:And returning the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to find out whether the device and the password are stored. The password with the same password is used to determine the required information of the user by using the found password, and the synchronization verification of the password is completed, which specifically includes:
将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。And returning the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to find out whether the device and the password are stored. The password with the same password is used. If yes, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
优选的,所述云端密码库中所有的云端密码群和所述设备端密码库中所有的设备端密码群采用相同的密码分类分级方案。Preferably, all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher library use the same cipher classification scheme.
一种共享设备的密码验证方法,应用于待使用共享设备,所述方法包括:A password verification method for a shared device is applied to a shared device to be used, and the method includes:
获取用户在云端密码库获取的密码,所述密码为预先对需求信息采用预设密码生成规则得到的密码,所述需求信息为所述用户对所述待使用共享设备的需求信息;Obtaining a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, where the requirement information is demand information of the user to the shared device to be used;
利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码;Using the password to find out from its own device side password database whether the same password as the password is stored;
如果是,则利用查找到的密码和所述预设密码生成规则确定所述用户的需求信息,完成对所述密码的同步验证。If yes, determining the demand information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
优选的,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。Preferably, the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
优选的,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成。Preferably, the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device. The passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
优选的,所述利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码,具体包括:Preferably, the password is used to search for a password that is the same as the password by using the password of the device, and the password includes:
利用所述密码从自身的设备端密码库的有效密码保留区放置的设备端密码群中,查找是否存储有与所述密码相同的密码,其中,所述有效密码保留区用于保留所述待使用共享设备已获取但未使用的密码。Searching, by using the password, from the device-side cipher group placed in the valid password reservation area of the device-side cipher library of the device, whether to store the same password as the password, wherein the valid password reservation area is used to reserve the A password that has been obtained but not used by the shared device.
优选的,所述利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码,具体包括:Preferably, the password is used to search for a password that is the same as the password by using the password of the device, and the password includes:
当从自身的设备端密码库的有效密码保留区未查找到与所述密码相同的密码时,则从所述设备端密码库已产生的设备端密码群中,查找是否存储有与所述密码相同的密码。When the same password as the password is not found from the valid password reservation area of the device-side password bank of the device, the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
优选的,当从所述设备端密码库已产生的设备端密码群中查找到与所述密码相同的密码,且云端密码群的级别、设备端密码群的级别和用户级别三者一致时,所述利用查找到的密码和所述预设密码生成规则确定所述用户的需求信息,完成对所述密码的同步验证,具体包括:Preferably, when the same password as the password is found in the device-side cipher group that has been generated by the device-side cipher library, and the level of the cloud cipher group, the level of the device-side cipher group, and the user level are the same, Determining the user's requirement information by using the found password and the preset password generation rule, and completing the synchronization verification of the password, specifically:
利用查找到的密码和所述预设密码生成规则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。Determining the user level and requirement information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
优选的,当完成对所述密码的同步验证之后,还包括:Preferably, after the synchronization verification of the password is completed, the method further includes:
将级别高于所述用户级别的未使用的设备端密码群放到所述有效密码保留区;Putting an unused device-side cipher group of a higher level than the user level into the valid password reservation area;
删除所有级别低于所述用户级别的设备端密码群。Delete all device-side cipher groups whose level is lower than the user level.
优选的,在确定所述用户的需求信息,完成对所述密码的同步验证之后,还包括:Preferably, after determining the user's requirement information and completing the synchronization verification of the password, the method further includes:
将验证成功的所述密码进行删除。The password that verified the success is deleted.
优选的,还包括:Preferably, the method further includes:
当从所述设备端密码库未查找到与所述密码相同的密码时,输出提示信息,所述提示信息用于提示用户重新输入密码。When the same password as the password is not found from the device-side password library, prompt information is output, and the prompt information is used to prompt the user to re-enter the password.
一种云端服务器,所述云端服务器具有多个云端密码库,每一个云端密码库对应一个共享设备,所述云端服务器包括:A cloud server, the cloud server has a plurality of cloud cryptographic libraries, and each cloud cryptographic library corresponds to a shared device, and the cloud server includes:
第一获取单元,用于获取用户输入的待使用共享设备的设备身份,根据所述设备身份确定对应的云端密码库;a first acquiring unit, configured to acquire a device identity of the shared device to be used by the user, and determine a corresponding cloud password database according to the device identity;
第二获取单元,用于获取所述用户输入的用户信息以及对所述待使用共享设备的需求信息;a second acquiring unit, configured to acquire user information input by the user and demand information about the shared device to be used;
选取单元,用于从所述云端密码库中选取一个云端密码群,并将所述云端密码群和所述用户信息以对应关系的形式进行记录;a selecting unit, configured to select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
提取单元,用于从所述云端密码群中提取出与所述需求信息对应的密码,其中,所述密码为预先对所述需求信息采用预设密码生成规则得到的密码;An extracting unit, configured to extract a password corresponding to the requirement information from the cloud cipher group, where the password is a password obtained by using a preset password generating rule in advance for the demand information;
反馈单元,用于将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则利用查找到的密码和所述预设密码生成规则确定所述用户的所述需求信息,完成对所述密码的同步验证。a feedback unit, configured to feed back the password to the user, so that when the user uses the shared device to be used, the shared device uses the password to search from its own device-side password database. Whether the password with the same password is stored, and if yes, determining the demand information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
优选的,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。Preferably, the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
优选的,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成。Preferably, the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device. The passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
优选的,当所述云端服务器在所述用户完成付费后,提供密码给所述用户时,所述提 取单元包括:Preferably, when the cloud server provides a password to the user after the user completes the payment, the extracting unit includes:
第一提取子单元,用于从所述云端密码群中提取出与所述需求信息对应的需要所述用户支付的费用;a first extracting subunit, configured to extract, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
第二提取子单元,用于当检测到所述用户支付完所述费用后,从所述云端密码群提取出与所述需求信息对应的密码。a second extracting subunit, configured to: after detecting that the user has paid the fee, extract a password corresponding to the demand information from the cloud cipher group.
优选的,所述第二提取子单元具体用于:Preferably, the second extraction subunit is specifically configured to:
当检测到所述用户支付完所述费用后,从所述云端密码群中提取出与所述需求信息对应的密码,并标记用户级别,其中,当多个用户需要支付费用时,所述用户级别根据用户完成支付的先后顺序确定,用户完成支付的时间越靠前,相对应的用户级别越高;After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
所述反馈单元具体用于:The feedback unit is specifically configured to:
将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。And returning the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to find out whether the device and the password are stored. The password with the same password is used. If yes, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
优选的,所述云端密码库中所有的云端密码群和所述设备端密码库中所有的设备端密码群采用相同的密码分类分级方案。Preferably, all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher library use the same cipher classification scheme.
一种共享设备,包括:A shared device, including:
第三获取单元,用于获取用户在云端密码库获取的密码,所述密码为预先对需求信息采用预设密码生成规则得到的密码,所述需求信息为所述用户对所述待使用共享设备的需求信息;a third obtaining unit, configured to acquire a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, where the demand information is that the user uses the shared device to be used. Demand information;
查找单元,用于利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码;a searching unit, configured to use, by using the password, to find, from its own device-side password database, whether a password with the same password is stored;
验证单元,用于利用查找到的密码和所述预设密码生成规则确定所述用户的需求信息,完成对所述密码的同步验证。The verification unit is configured to determine the user's demand information by using the found password and the preset password generation rule, and complete synchronization verification of the password.
优选的,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。Preferably, the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
优选的,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成。Preferably, the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device. The passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
优选的,所述查找单元具体用于:Preferably, the searching unit is specifically configured to:
利用所述密码从自身的设备端密码库的有效密码保留区放置的设备端密码群中,查找 是否存储有与所述密码相同的密码,其中,所述有效密码保留区用于保留所述待使用共享设备已获取但未使用的密码。Searching, by using the password, from the device-side cipher group placed in the valid password reservation area of the device-side cipher library of the device, whether to store the same password as the password, wherein the valid password reservation area is used to reserve the A password that has been obtained but not used by the shared device.
优选的,所述查找单元具体用于:Preferably, the searching unit is specifically configured to:
当从自身的设备端密码库的有效密码保留区未查找到与所述密码相同的密码时,则从所述设备端密码库已产生的设备端密码群中,查找是否存储有与所述密码相同的密码。When the same password as the password is not found from the valid password reservation area of the device-side password bank of the device, the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
优选的,当从所述设备端密码库已产生的设备端密码群中查找到与所述密码相同的密码,且云端密码群的级别、设备端密码群的级别和用户级别三者一致时,所述验证单元具体用于:Preferably, when the same password as the password is found in the device-side cipher group that has been generated by the device-side cipher library, and the level of the cloud cipher group, the level of the device-side cipher group, and the user level are the same, The verification unit is specifically configured to:
利用查找到的密码和所述预设密码生成规则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。Determining the user level and requirement information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
优选的,还包括:Preferably, the method further includes:
放置单元,用于当完成对所述密码的同步验证之后,将级别高于所述用户级别的未使用的设备端密码群放到所述有效密码保留区;a placing unit, configured to: after the synchronization verification of the password is completed, put an unused device-side cipher group of a level higher than the user level into the valid password reservation area;
第一删除单元,用于删除所有级别低于所述用户级别的设备端密码群。The first deleting unit is configured to delete all device-side cipher groups whose level is lower than the user level.
优选的,还包括:Preferably, the method further includes:
第二删除单元,用于在确定所述用户的需求信息,完成对所述密码的同步验证之后,将验证成功的所述密码进行删除。The second deleting unit is configured to delete the password that is successfully verified after determining the user's requirement information and completing the synchronization verification of the password.
优选的,还包括:Preferably, the method further includes:
输出单元,用于当从所述设备端密码库未查找到与所述密码相同的密码时,输出提示信息,所述提示信息用于提示用户重新输入密码。And an output unit, configured to output prompt information when the password is the same as the password, and the prompt information is used to prompt the user to re-enter the password.
一种共享设备的密码验证系统,包括上述所述的云端服务器和至少一个上述所述的共享设备。A password authentication system for a shared device, comprising the cloud server described above and at least one of the shared devices described above.
从上述的技术方案可知,本申请公开了一种共享设备的密码验证方法、共享设备、云端服务器及系统,通过将共享设备在云端服务器中对应的云端密码库中的密码,和该共享设备的设备端密码库中的密码,采用相同的预设密码生成规则,使得用户在使用共享设备之前,可以利用对待使用设备的需求信息,首先从云端密码库提取对应的密码,该密码预先对需求信息采用预设密码生成规则得到,然后将该密码输入到共享设备,当共享设备从自身的设备端密码库查找到与该密码对应的密码时,可利用查找到的密码和预设的密码生成规则,确定用户的需求信息,从而完成对密码的同步验证。因此,本申请实现了在云端服务器和共享设备在无需连接网络的情况下,基于相同的密码生成规则,实现了用户和共享设备之间的密码同步验证过程,从而使得共享设备的使用不再受到网络限制,进而有效 避免了互联网不安全攻击的风险。As disclosed in the foregoing technical solution, the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, by using a password of the shared device in the cloud password database corresponding to the cloud server, and the shared device The password in the device-side password database uses the same preset password generation rule. The user can use the demand information of the device to be used before using the shared device. First, the corresponding password is extracted from the cloud password database. The preset password generation rule is used, and then the password is input to the shared device. When the shared device finds the password corresponding to the password from its device-side password database, the used password and the preset password generation rule can be utilized. The user's demand information is determined, thereby completing the synchronous verification of the password. Therefore, the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected. Network restrictions, which effectively avoid the risk of Internet insecure attacks.
附图说明DRAWINGS
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据公开的附图获得其他的附图。In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings to be used in the embodiments or the prior art description will be briefly described below. Obviously, the drawings in the following description are only It is an embodiment of the present application, and other drawings can be obtained according to the disclosed drawings without any creative work for those skilled in the art.
图1为本申请实施例公开的一种基于云端服务器侧的共享设备的密码验证方法流程图;FIG. 1 is a flowchart of a method for verifying a password of a shared device based on a cloud server side according to an embodiment of the present application;
图2为本申请实施例公开的一种费用、密码、云端密码群和云端密码库的对应关系示意图;2 is a schematic diagram of correspondence between a fee, a password, a cloud cipher group, and a cloud cipher library according to an embodiment of the present application;
图3为本申请实施例公开的一种云端服务器和一个共享设备的对应关系示意图;FIG. 3 is a schematic diagram of a correspondence between a cloud server and a shared device according to an embodiment of the present disclosure;
图4为本申请实施例公开的一种基于共享设备侧的共享设备的密码验证方法流程图;4 is a flowchart of a password verification method based on a shared device on a shared device side according to an embodiment of the present disclosure;
图5为本申请实施例公开的一种云端服务器的结构示意图;FIG. 5 is a schematic structural diagram of a cloud server according to an embodiment of the present application;
图6为本申请实施例公开的一种共享设备的结构示意图。FIG. 6 is a schematic structural diagram of a shared device according to an embodiment of the present disclosure.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application are clearly and completely described in the following with reference to the drawings in the embodiments of the present application. It is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope are the scope of the present application.
本申请实施例公开了一种共享设备的密码验证方法、共享设备、云端服务器及系统,以实现共享设备和云端服务器在无需连接网络的情况下,仍可实现用户和共享设备之间的密码同步验证过程。The embodiment of the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, so that the shared device and the cloud server can still implement password synchronization between the user and the shared device without connecting to the network. Verification process.
参见图1,本申请一实施例公开的一种共享设备的密码验证方法流程图,该方法应用于云端服务器,该云端服务器与至少一个共享设备成对应关系,该云端服务器具有多个云端密码库,每一个云端密码库对应一个共享设备,所述方法包括步骤:1 is a flowchart of a method for verifying a password of a shared device according to an embodiment of the present application. The method is applied to a cloud server, where the cloud server is associated with at least one shared device, and the cloud server has multiple cloud password databases. Each cloud password library corresponds to a shared device, and the method includes the steps of:
步骤S101、获取用户输入的待使用共享设备的设备身份,根据所述设备身份确定对应的云端密码库;Step S101: Obtain a device identity of the shared device to be used input by the user, and determine a corresponding cloud password database according to the device identity;
在实际应用中,用户可以通过手机、IPAD等终端扫描共享设备的二维码来获取共享设备的设备身份,该设备身份也即设备标识。当然,用户还可以采用其它的方式获取共享 设备的设备身份,如通过将共享设备上印制的身份码输入电脑来获取共享设备的设备身份。In an actual application, the user can scan the two-dimensional code of the shared device through a terminal such as a mobile phone or an IPAD to obtain the device identity of the shared device, and the device identity is also the device identifier. Of course, the user can also obtain the device identity of the shared device in other ways, such as by inputting the identity code printed on the shared device into the computer to obtain the device identity of the shared device.
其中,每一个共享设备都有与之唯一对应的设备身份。Each of the shared devices has a unique device identity.
步骤S102、获取用户输入的用户信息以及对待使用共享设备的需求信息;Step S102: Obtain user information input by the user and demand information of the shared device to be used;
具体的,用户信息具体指的是用户的身份信息,如身份证号码。Specifically, the user information specifically refers to the identity information of the user, such as an identity card number.
对于共享设备的需求信息,举例说明,假设,共享设备为共享洗衣机,则用户对共享洗衣机的需求信息包括:洗衣时长、漂洗次数、洗涤温度、转速等等。For the demand information of the shared device, for example, if the shared device is a shared washing machine, the user's demand information for the shared washing machine includes: laundry time, number of rinsing, washing temperature, rotation speed, and the like.
步骤S103、从所述云端密码库中选取一个云端密码群,并将所述云端密码群和所述用户信息以对应关系的形式进行记录;Step S103: Select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
本实施例中,一个云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合,也即每一个云端密码群中包含用户所需求使用共享设备的所有情况。举例说明,假设共享设备为共享洗衣机,用户对共享洗衣机的需求信息也即共享洗衣机的工作情况为:洗衣时长为30分钟,洗衣模式为:两次漂洗加一次脱水,衣物类型为:衬衫,根据这些需求信息以及预设密码生成规则如密码生成公式,得到一个与该需求信息唯一对应的一个密码。In this embodiment, a cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords, that is, each cloud cipher group contains all the conditions that the user needs to use the shared device. For example, if the shared device is a shared washing machine, the user's demand information for the shared washing machine, that is, the shared washing machine, is: the laundry time is 30 minutes, the laundry mode is: two rinsing plus one dehydration, and the clothing type is: shirt, according to The demand information and the preset password generation rules, such as the password generation formula, obtain a password uniquely corresponding to the demand information.
通过将共享洗衣机按照预设密码生成规则在不同工作情况下的排列组合产生所有密码的集合,也即得到一个云端密码群。A set of all passwords is generated by arranging and combining the shared washing machines according to the preset password generation rules in different working situations, that is, obtaining a cloud cipher group.
当云端密码群在云端密码库中按顺序排列时,可将排列最前面的云端密码群作为选用的云端密码群,当然,也可以随机选择一个云端密码群。When the cloud cipher group is arranged in order in the cloud cipher library, the cloud cipher group in front of the array can be selected as the cloud cipher group. Of course, a cloud cipher group can also be randomly selected.
其中,将云端密码群和用户信息以对应关系的形式进行记录的目的是:实现共享设备使用的实名制,以避免向未达到年龄要求的用户提供服务,如共享单车的使用用户需年满12周岁,同时为后续为用户购买人身意外伤害险和第三者责任险等提供条件。The purpose of recording the cloud cipher group and the user information in the form of a corresponding relationship is to implement a real-name system used by the shared device to avoid providing services to users who do not meet the age requirement, such as users who share the bicycle need to be at least 12 years old. At the same time, it provides conditions for the subsequent purchase of personal accident insurance and third party liability insurance for users.
在实际应用中,可以对云端密码库中包含的各个云端密码群设置不同的级别,同时,对用户设置不同的等级,如根据用户历次使用共享设备的总次数确定用户的级别,用户使用的次数越多,用户的级别越高,同一级别的用户和云端密码群相对应。In an actual application, different levels of each cloud cipher group included in the cloud cipher pool can be set, and different levels are set for the user, for example, the user's level is determined according to the total number of times the user has used the shared device, and the number of times the user uses The more users, the higher the level of users, the corresponding level of users and cloud password groups correspond.
因此,本步骤的执行过程具体为:首先确定待使用共享设备对应的多个云端密码群,其次,根据用户信息确定用户级别,并根据用户级别确定对应的云端密码群。Therefore, the execution process of the step is specifically: first determining a plurality of cloud cipher groups corresponding to the shared device to be used, and secondly, determining a user level according to the user information, and determining a corresponding cloud cipher group according to the user level.
步骤S104、从云端密码群中提取出与需求信息对应的密码;Step S104: Extract a password corresponding to the demand information from the cloud cipher group;
其中,所述密码为预先对所述需求信息采用预设密码生成规则得到的密码,也即该密码是按照预设密码生成规则针对共享设备在不同的工作情况的排列组合下产生的,因此, 根据需求信息也即共享设备的工作情况,可从云端密码群中提取出对应的密码。The password is a password obtained by using a preset password generation rule in advance for the requirement information, that is, the password is generated according to a preset password generation rule for a shared device in a different combination of working conditions, and therefore, According to the demand information, that is, the working condition of the shared device, the corresponding password can be extracted from the cloud cipher group.
步骤S105、将密码反馈给用户,以使用户在使用待使用共享设备时,由待使用共享设备利用密码和自身的设备端密码库,确定用户的需求信息,完成对密码的同步验证。Step S105: The password is fed back to the user, so that when the user uses the shared device to be used, the shared device uses the password and its own device-side password database to determine the user's demand information, and completes the synchronous verification of the password.
具体的,云端密码库将查找到的密码反馈给用户,用户在使用待使用共享设备时,向待使用共享设备输入该密码,待使用共享设备利用密码从自身的设备端密码库查找是否存储有与用户输入的密码相同的密码,如果是,则利用查找到的密码和所述预设密码生成规则确定用户的需求信息,完成对密码的同步验证。Specifically, the cloud password database feeds back the found password to the user. When the user uses the shared device to be used, the password is input to the shared device to be used, and the shared device uses the password to search for the stored password from the device-side password database. The password that is the same as the password entered by the user. If yes, the password is found and the preset password generation rule is used to determine the user's demand information, and the password verification is completed.
其中,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成,这样,共享设备根据用户从云端密码库获取的密码,即可确定用户的需求信息。The device-side password library includes multiple device-side password groups, and each device-side password group corresponds to one user, and all passwords stored in the device-side password library of each shared device and the cloud password corresponding to the shared device are configured. The passwords in the library are generated by using the same preset password generation rules for the user's demand information. Thus, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
综上,本申请公开的共享设备的密码验证方法,通过将共享设备在云端服务器中对应的云端密码库中的密码,和该共享设备的设备端密码库中的密码,采用相同的预设密码生成规则,使得用户在使用共享设备之前,可以利用对待使用设备的需求信息,首先从云端密码库提取对应的密码,该密码预先对需求信息采用预设密码生成规则得到,然后将该密码输入到共享设备,当共享设备从自身的设备端密码库查找到与该密码对应的密码时,可利用查找到的密码和预设的密码生成规则,确定用户的需求信息,从而完成对密码的同步验证。因此,本申请实现了在云端服务器和共享设备在无需连接网络的情况下,基于相同的密码生成规则,实现了用户和共享设备之间的密码同步验证过程,从而使得共享设备的使用不再受到网络限制,进而有效避免了互联网不安全攻击的风险。In summary, the password verification method of the shared device disclosed in the present application adopts the same preset password by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device. A rule is generated, so that the user can use the demand information of the device to be used before using the shared device, first extracting a corresponding password from the cloud password database, and the password is obtained by using a preset password generation rule for the demand information, and then inputting the password to the password. When the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password. . Therefore, the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected. Network restrictions, which effectively avoid the risk of Internet insecure attacks.
另外,由于本申请公开的方法无需共享设备与云端服务器之间建立网络连接,因此,相比传统方案而言,本申请还省去了设置在共享设备上的无线模块,从而节约了共享设备的硬件成本。In addition, since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
可以理解,不同的共享设备对付费的时间要求可不同,如共享洗衣机,当用户确定对共享洗衣机的需求信息后,共享洗衣机就可以根据这些需求信息生成相应的费用;又比如共享单车,由于提前无法获知用户的使用时间,因此无法提前确定用户的费用,对于这类共享设备,可以在用户使用完成之后再付费。It can be understood that different sharing devices may have different time requirements for payment, such as sharing a washing machine. When the user determines the demand information for the shared washing machine, the shared washing machine can generate a corresponding fee according to the demand information; for example, sharing the bicycle, due to advance The user's usage time cannot be known, so the user's fee cannot be determined in advance. For such shared devices, the user can pay after the user completes the use.
对于用户在使用完共享设备再付费的方案,可参见现有方案,此处不再赘述。For the solution that the user pays for using the shared device, refer to the existing solution, and details are not described herein again.
对于用户先付费再使用共享设备的方案,可参见下述示例。For the scenario where the user pays to use the shared device first, see the example below.
上述实施例中,当云端服务器在用户完成付费后,才提供密码给所述用户时,步骤S104具体包括:In the above embodiment, when the cloud server provides the password to the user after the user completes the payment, the step S104 specifically includes:
从云端密码群中提取出与需求信息对应的需要用户支付的费用;Extracting the fee corresponding to the demand information from the cloud cipher group and requiring the user to pay;
当检测到用户支付完费用后,从云端密码群提取出与需求信息对应的密码。After detecting that the user has paid the fee, the password corresponding to the demand information is extracted from the cloud cipher group.
基于本实施例可以看出,费用和密码都是根据用户需求从云端密码群提取出来的,例如共享洗衣机,云端服务器根据用户选择的洗衣时长、转速、洗涤温度,可以从云端密码群查找到一个相对应的需要用户支付的费用,在用户支付成功后,云端服务器会提供给用户一个相对应的密码。Based on this embodiment, it can be seen that the fee and the password are extracted from the cloud cipher group according to the user's requirement, for example, the shared washing machine, and the cloud server can find one from the cloud cipher group according to the laundry duration, the rotation speed, and the washing temperature selected by the user. Correspondingly, the user needs to pay the fee. After the user pays successfully, the cloud server provides the user with a corresponding password.
其中,费用、密码、云端密码群和云端密码库的对应关系可参见图2所示的示意图,图2中,云端密码库包括多个云端密码群,如云端密码群1、云端密码群2、.......云端密码群X,每一个云端密码群对应一个用户,多个用户对应多个云端密码群,在实际应用中,所有的云端密码群可以按照级别先后排列组合成云端密码库,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合,也即每一个云端密码群中包含用户所需求使用共享设备的所有情况,比如,图2中的云端密码群X,共享设备不同的工作情况包括因素:(1)共享设备的使用时长,如5分钟、10分钟、20分钟;(2)数量,以共享洗衣机为例,该数量可指用户需洗衣物的数量,如1、2、3;(3)变量(如图2中的变量3、变量N)是指影响共享设备工作模式和费用的因素变量,不同的时长可以认为是某个变量下的一个元素,一种变量可以包括多种元素,如元素a、元素b、元素c等。不同因素的排列组合产生一个密码和与该密码相对应的唯一的费用,如图2中,密码a与费用a对应,密码b与费用b对应,密码c与费用c对应,密码d与费用d对应,密码e与费用e对应。The correspondence between the fee, the password, the cloud cipher group and the cloud cipher pool can be seen in the schematic diagram shown in FIG. 2. In FIG. 2, the cloud cipher library includes multiple cloud cipher groups, such as cloud cipher group 1 and cloud cipher group 2 .......Cloud cipher group X, each cloud cipher group corresponds to one user, and multiple users correspond to multiple cloud cipher groups. In actual applications, all cloud cipher groups can be grouped into cloud ciphers according to level order. The library, each cloud cipher group is a set of all passwords generated according to a preset password generation rule for a shared device in a different combination of working conditions, that is, each cloud cipher group includes all cases in which the user needs to use the shared device. For example, in the cloud cipher group X in Figure 2, the different working conditions of the shared device include factors: (1) the usage duration of the shared device, such as 5 minutes, 10 minutes, 20 minutes; (2) the number, taking the shared washing machine as an example. The quantity may refer to the quantity of laundry required by the user, such as 1, 2, 3; (3) the variable (variable 3 in FIG. 2, variable N) refers to the working mode and cost of the shared device. Variable factors, different durations can be considered as an element of a variable under a variable may include various elements, such as element a, element B, element c and the like. The combination of different factors produces a password and a unique fee corresponding to the password. As shown in FIG. 2, the password a corresponds to the fee a, the password b corresponds to the fee b, the password c corresponds to the fee c, and the password d and the fee d Correspondingly, the password e corresponds to the fee e.
需要说明的是,云端服务器与至少一个共享设备成对应关系,云端服务器和每一个共享设备都可以组成一个系统,云端服务器和多个共享设备组成多个系统,在实际应用中,同一系统要保证设备端密码库和相对应的云端密码库所采用的预设密码生成规则(包括密码生成的算法和加密原则)一致,不同的系统之间的预设密码生成规则可以不同。并且,还需保证云端密码库连续产生的一定数量的云端密码群中的密码不能重复。It should be noted that the cloud server and the at least one shared device are in a corresponding relationship, and the cloud server and each shared device can form a system, and the cloud server and the multiple shared devices form a plurality of systems. In actual applications, the same system must ensure The preset password generation rules (including the password generation algorithm and encryption principle) adopted by the device-side password database and the corresponding cloud password database are the same, and the preset password generation rules between different systems may be different. Moreover, it is also necessary to ensure that the passwords in a certain number of cloud cipher groups continuously generated by the cloud cipher pool cannot be duplicated.
较优的,上述实施例中,云端密码库中所有的云端密码群和设备端密码库中所有的设备端密码群可采用相同的密码分类分级方案,也就是说,针对同一用户的同一需求信息,对应的云端密码群和设备端密码群的级别相同,并且云端密码群中的密码和设备端密码群中的密码所采用的预设密码生成规则相同,但云端密码群中的密码和设备端密码群中密码所产生的时间可以相同,也可以不同。Preferably, in the foregoing embodiment, all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher pool can adopt the same password classification and grading scheme, that is, the same demand information for the same user. The corresponding cloud cipher group and the device cipher group have the same level, and the password in the cloud cipher group and the password in the device cipher group use the same preset password generation rule, but the password and the device end in the cloud cipher group The time generated by the password in the cipher group can be the same or different.
为方便查找密码,在实际应用中,对于先付费再使用共享设备的方案,可以根据用户完成支付的先后顺序,确定用户级别,当多个用户需要支付费用时,用户支付的时间越靠 前,对应的用户级别越高,用户级别和相对应的云端密码群的级别、设备端密码群的级别相同。In order to facilitate the search for the password, in the actual application, for the scheme of paying the shared device first, the user level can be determined according to the order in which the user completes the payment, and when the multiple users need to pay the fee, the user pays the higher time. The higher the corresponding user level, the user level and the corresponding level of the cloud cipher group and the level of the device cipher group are the same.
参见图3,本申请一实施例公开的一种云端服务器和一个共享设备的对应关系示意图,其中,图3中仅示出一个云端服务器和一个共享设备的对应关系,在实际应用中,可以一个云端服务器对应多个共享设备,多个共享设备在云端服务器中对应的云端密码库分开管理,互补影响。FIG. 3 is a schematic diagram of a correspondence between a cloud server and a shared device according to an embodiment of the present disclosure. In FIG. 3, only the correspondence between a cloud server and a shared device is shown. In an actual application, one may be used. The cloud server corresponds to multiple shared devices, and multiple shared devices are managed separately in the corresponding cloud cryptosystem in the cloud server, which has complementary effects.
结合图2和图3可知,当用户向云端密码库输入不同的需求信息时,如时间、工作模式、数量、变量三、变量四等,可以从云端密码库获取不同的密码,其中,不同的用户会获取不同的密码,如用户1获取密码1,用户2获取密码2,用户3获取密码3,用户4获取密码4,用户5获取密码5等。As shown in FIG. 2 and FIG. 3, when the user inputs different demand information to the cloud password database, such as time, work mode, quantity, variable 3, variable 4, etc., different passwords can be obtained from the cloud password database, wherein different The user obtains different passwords. For example, user 1 obtains password 1, user 2 obtains password 2, user 3 obtains password 3, user 4 obtains password 4, and user 5 obtains password 5 and so on.
在实际应用中,可以将云端密码群进行级别划分,沿图3中箭头所示方向,云端密码群的等级逐渐升高,由于一个云端密码群对应一位用户,每一位用户都会从相对应的云端密码群获取密码,因此,图3所示实施例中,密码1~密码5的等级逐渐升高。In the actual application, the cloud cipher group can be divided into levels. According to the direction of the arrow in FIG. 3, the level of the cloud cipher group gradually increases. Since one cloud cipher group corresponds to one user, each user will correspondingly The cloud cipher group obtains the password. Therefore, in the embodiment shown in FIG. 3, the levels of the passwords 1 to 5 are gradually increased.
在共享设备侧,设备端密码库包括多个设备端密码群,如设备端密码群1~5,每一个设备端密码群对应一位用户,如设备端密码群5与用户5对应,设备端密码群中的密码和云端密码群中的密码所采用的预设密码生成规则相同。On the shared device side, the device-side password database includes multiple device-side cipher groups, such as device-side cipher groups 1 to 5. Each device-side cipher group corresponds to one user. For example, device-side cipher group 5 corresponds to user 5, and device-side The password in the cipher group and the password in the cloud cipher group are the same as the default password generation rules.
若对云端密码群进行级别划分,那么,相应的,也可对设备端密码群进行级别划分,沿图3中箭头所示方向,设备端密码群的等级逐渐升高。If the cloud cipher group is classified, then the device cipher group can be classified according to the direction indicated by the arrow in FIG. 3, and the level of the device cipher group is gradually increased.
其中,用户等级、设备端密码群等级和云端密码群等级三者的等级相同。Among them, the user level, the device-side cipher group level, and the cloud cipher group level are the same.
在实际应用中,同级用户使用同级设备端密码群,各同级设备端密码群可正常轮换,当然,在一些情况下,用户也可以越级使用设备端密码群,如图3中用户2正常应使用设备端密码群2,然而,在一些情况下,用户2也可以使用设备端密码群3,此时,可将低等级的设备端密码群1和设备端密码群2放置到有效密码保留区,以下次使用。In the actual application, the peer users use the same-level device-side cipher group, and the peer-end device-side cipher group can be rotated normally. Of course, in some cases, the user can also use the device-side cipher group, as shown in Figure 3 Device-side cipher group 2 should be used normally. However, in some cases, user 2 can also use device-side cipher group 3. In this case, low-level device-side cipher group 1 and device-side cipher group 2 can be placed into valid passwords. Reserved area, used below.
为进一步优化上述实施例,当检测到用户支付完费用后,从云端密码群提取出与需求信息对应的密码的过程,具体可以包括:In order to further optimize the foregoing embodiment, the process of extracting the password corresponding to the demand information from the cloud cipher group after detecting the payment of the user's fee may include:
当检测到用户支付完所述费用后,从云端密码群中提取出与所述需求信息对应的密码,并标记用户级别,其中,当多个用户需要支付费用时,所述用户级别根据用户完成支付的先后顺序确定,用户完成支付的时间越靠前,相对应的用户级别越高。After detecting that the user has paid the fee, the password corresponding to the demand information is extracted from the cloud cipher group, and the user level is marked, wherein when a plurality of users need to pay a fee, the user level is completed according to the user. The order of payment is determined, the higher the time for the user to complete the payment, the higher the corresponding user level.
需要说明的是,云端服务器提供给用户的密码,是从与用户级别对应的云端密码群中根据用户输入的需求信息提取出来的,例如,共享洗衣机,用户的需求信息包括:洗涤时间为30分钟,漂洗2次,脱水1次,云端服务器根据这些需求信息,从与用户级别对应 的云端密码群中提取对应的密码。It should be noted that the password provided by the cloud server to the user is extracted from the cloud password group corresponding to the user level according to the user input information, for example, the shared washing machine, and the user's demand information includes: the washing time is 30 minutes. The rinsing is performed twice, and the dehydration is performed once. The cloud server extracts the corresponding password from the cloud cipher group corresponding to the user level according to the demand information.
相应的,步骤S105具体包括:Correspondingly, step S105 specifically includes:
将密码反馈给用户,以使用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。Sending the password to the user, so that when the user uses the shared device to be used, the shared device that uses the use of the password uses the password to find out whether the same password as the password is stored from the device-side password database. If yes, the user level and requirement information of the user is determined, and the verification of the password is completed.
其中,用户在向共享设备输入密码时,可以以数字的形式输入,或由共享设备根据用户支付费用后所产生的二维码凭证自助识别,或是以口令语音识别方式输入等。When the user inputs a password to the shared device, the user may input the number in the form of a number, or the self-identification of the two-dimensional code certificate generated by the shared device according to the user's payment, or input by a password voice recognition method.
需要说明的是,密码在设备端密码群中是不分级别排列的,只有密码被用户输入到共享设备,并确定使用后才有级别之分,且密码的级别和对应的设备端密码群的级别相同。It should be noted that the passwords are arranged in the device-side cipher group regardless of the level. Only the password is input to the shared device by the user, and the level is determined after the use, and the level of the password and the corresponding device-side cipher group are determined. The same level.
参见图4,本申请另一实施例公开的一种共享设备的密码验证方法流程图,该方法应用于待使用共享设备,该待使用共享设备如共享单车、共享电动车、共享洗衣机等,该方法包括步骤:Referring to FIG. 4, a flow chart of a password verification method for a shared device disclosed in another embodiment of the present application is applied to a shared device to be used, such as a shared bicycle, a shared electric vehicle, a shared washing machine, and the like. The method includes the steps of:
步骤S201、获取用户在云端密码库获取的密码;Step S201: Acquire a password obtained by the user in the cloud password database;
其中,所述密码为预先对需求信息采用预设密码生成规则得到的密码,所述需求信息为所述用户对所述待使用共享设备的需求信息。The password is a password obtained by using a preset password generation rule in advance for the requirement information, and the demand information is demand information of the user to the shared device to be used.
用户在云端密码库获取密码的过程可参见图1所示实施例,此处不再赘述。For the process of obtaining a password in the cloud password database, refer to the embodiment shown in FIG. 1 , and details are not described herein again.
步骤S202、利用密码从自身的设备端密码库查找是否存储有与密码相同的密码;Step S202: Searching, by using a password, from its own device-side password database, whether a password with the same password is stored;
其中,设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成,这样,共享设备根据用户从云端密码库获取的密码和预设密码生成规则,即可确定用户的需求信息。The device-side password library includes multiple device-side cipher groups, and each device-side cipher group corresponds to one user, and each shared device stores all passwords in the device-side password store and the cloud cipher library corresponding to the shared device. The passwords are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database and the preset password generation rule.
本步骤中,待使用共享设备确定自身设备端密码库是否存储有与用户输入的密码相同的密码的目的是:判断用户输入的密码是否为有效密码。In this step, the purpose of using the shared device to determine whether the password of the user-side password store is the same as the password input by the user is to determine whether the password input by the user is a valid password.
步骤S203、如果是,则利用查找到的密码和所述预设密码生成规则确定用户的需求信息,完成对密码的同步验证。Step S203, if yes, determining the user's demand information by using the found password and the preset password generation rule, and completing the synchronization verification of the password.
其中,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,且每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。The cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
综上,本申请公开的共享设备的密码验证方法,通过将共享设备在云端服务器中对应的云端密码库中的密码,和该共享设备的设备端密码库中的密码,采用相同的预设密码生成规则,使得用户在使用共享设备之前,可以利用对待使用设备的需求信息,首先从云端 密码库提取对应的密码,该密码预先对需求信息采用预设密码生成规则得到,然后将该密码输入到共享设备,当共享设备从自身的设备端密码库查找到与该密码对应的密码时,可利用查找到的密码和预设的密码生成规则,确定用户的需求信息,从而完成对密码的同步验证。因此,本申请实现了在云端服务器和共享设备在无需连接网络的情况下,基于相同的密码生成规则,实现了用户和共享设备之间的密码同步验证过程,从而使得共享设备的使用不再受到网络限制,进而有效避免了互联网不安全攻击的风险。In summary, the password verification method of the shared device disclosed in the present application adopts the same preset password by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device. A rule is generated, so that the user can use the demand information of the device to be used before using the shared device, first extracting a corresponding password from the cloud password database, and the password is obtained by using a preset password generation rule for the demand information, and then inputting the password to the password. When the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password. . Therefore, the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected. Network restrictions, which effectively avoid the risk of Internet insecure attacks.
另外,由于本申请公开的方法无需共享设备与云端服务器之间建立网络连接,因此,相比传统方案而言,本申请还省去了设置在共享设备上的无线模块,从而节约了共享设备的硬件成本。In addition, since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
其中,当从所述设备端密码库未查找到与所述密码相同的密码时,输出提示信息,所述提示信息用于提示用户重新输入密码。Wherein, when the same password as the password is not found from the device-side password library, prompt information is output, and the prompt information is used to prompt the user to re-enter the password.
如图3所示,在实际应用中,可以在设备端密码库设置有效密码保留区,当待使用共享设备需要确定用户输入的密码是否存储时,可优先在有效密码保留区查找,若在有效密码保留区未查找到,则从设备端密码库已产生的未位于有效密码保留区的设备端密码群中查找。As shown in Figure 3, in the actual application, a valid password reservation area can be set in the device-side password database. When the shared device needs to determine whether the password input by the user is stored, the priority can be preferentially searched in the valid password reserved area. If the password reservation area is not found, it is searched from the device-side password group that has been generated by the device-side password library and is not located in the valid password reserved area.
其中,有效密码保留区主要用于保留待使用共享设备已获取但未使用的密码。The valid password reserved area is mainly used to reserve the password that is to be used but not used by the shared device.
因此,为进一步优化上述实施例,步骤S202具体可以包括:Therefore, in order to further optimize the foregoing embodiment, step S202 may specifically include:
利用密码从自身的设备端密码库的有效密码保留区放置的设备端密码群中,查找是否存储有与所述密码相同的密码。Using the password from the device-side cipher group placed in the valid password reservation area of its own device-side crypto library, it is found whether the same password as the password is stored.
步骤S202具体还可以包括:Step S202 may specifically include:
当从自身的设备端密码库的有效密码保留区未查找到与所述密码相同的密码时,则从所述设备端密码库已产生的设备端密码群中,查找是否存储有与所述密码相同的密码。When the same password as the password is not found from the valid password reservation area of the device-side password bank of the device, the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
在实际应用中,对于先付费再使用共享设备的方案,可以根据用户完成支付的先后顺序,确定用户级别,当多个用户需要支付费用时,用户支付的时间越靠前,对应的用户级别越高,用户级别、云端密码群的级别和设备端密码群的级别三者一致。In an actual application, for a scheme of paying for a shared device first, the user level may be determined according to the order in which the user completes the payment. When multiple users need to pay the fee, the user pays the higher the time, and the corresponding user level is higher. The level of the user level, the cloud cipher group, and the level of the device cipher group are the same.
因此,云端服务器在提取出密码,并且对用户级别进行标记后,那么,待使用共享设备可以根据与用户提供的密码匹配的密码所在的设备端密码群的级别,可以确定用户级别。Therefore, after the cloud server extracts the password and marks the user level, the shared device can determine the user level according to the level of the device-side cipher group where the password matching the password provided by the user is located.
所以,当从所述设备端密码库已产生的设备端密码群中查找到与所述密码相同的密码,上述实施例中的步骤S203具体可以包括:Therefore, when the same password as the password is found in the device-side cipher group that has been generated by the device-side cipher library, step S203 in the above embodiment may specifically include:
利用查找到的密码和所述预设密码生成规则确定所述用户的用户级别和需求信息,完 成对所述密码的同步验证。The user level and requirement information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
需要说明的是,有效密码保留区的密码被使用时,不对正常级别的密码轮换产生影响,有效密码保留区中的密码直到被使用时才会消失。It should be noted that when the password of the valid password reservation area is used, the normal level of password rotation is not affected, and the password in the valid password reservation area will not disappear until it is used.
当完成对密码的同步验证之后,可将级别高于用户级别的未使用的设备端密码群放到所述有效密码保留区,并删除所有级别低于所述用户级别的设备端密码群。After the synchronization verification of the password is completed, an unused device-side cipher group of a higher level than the user level can be placed in the valid password reservation area, and all device-side cipher groups whose level is lower than the user level can be deleted.
其中,云端密码库中的云端密码群和设备端密码库中的设备端密码群是根据预设规则逐渐产生的,并以设定规则逐渐消除低等级的密码群,以保证云端密码库的云端密码群和设备端密码库中的设备端密码群在一定数量范围内,且不重复。The cloud cipher group in the cloud cipher library and the device cipher group in the device cipher library are gradually generated according to a preset rule, and the low level cipher group is gradually eliminated by setting rules to ensure the cloud of the cloud cipher library. The device-side cipher group in the cipher group and the device-side cipher library is within a certain number of ranges and is not repeated.
云端密码群可以在提供给用户密码或用户完成一次支付行为后,增加一个或多个云端密码群,也可以通过日期,一定天数增加一定数据的云端密码群,或是根据用户使用的频繁程度,确定密码产生的数量,无效云端密码群的去除可采用以下方式:设定云端密码群有效期,超期后自动删除;在用户完成自助服务后,并反馈完成后,对所使用的云端密码群进行删除;也可以采用多种方式混合判断。The cloud cipher group can add one or more cloud cipher groups after providing the user password or the user to complete a payment behavior, or increase the cloud cipher group of a certain data by a certain number of days, or according to the frequency of the user. To determine the number of passwords generated, the invalid cloud cipher group can be removed by setting the validity period of the cloud cipher group and automatically deleting it after the expiration. After the user completes the self-service and the feedback is completed, the cloud cipher group used is deleted. ; can also be mixed in a variety of ways.
设备端密码群是否需要增加,以增加的数量以用户使用的次数、使用的时间间隔、现有有效设备端密码群数量、共享设备的工作特点、用户输入的密码等级等中的一种或多种混合方式进行确定,无效密码的消除以用户使用过自动删除为准。Whether the device-side cipher group needs to be increased, such as the number of times the user uses, the time interval used, the number of existing valid device-side cipher groups, the working characteristics of the shared device, and the password level entered by the user, etc. The hybrid mode is determined, and the elimination of the invalid password is subject to the automatic deletion used by the user.
经过一段使用时间后,当共享设备已获取但未用的密码增加时,有效密码保留区中的容量会越来越大,当增加到一定数量后以一定方式进行消除,以共享设备的工作特点,用户使用此次,有效密码保留区中的密码等级综合判断。After a period of use, when the shared device has acquired but the unused password is increased, the capacity in the effective password reserved area will become larger and larger. When it is increased to a certain amount, it will be eliminated in a certain way to share the working characteristics of the device. The user uses this time to comprehensively judge the password level in the valid password reserved area.
上述实施例,当确定用户的需求信息,完成对密码的同步验证后,还包括:In the foregoing embodiment, after determining the user's requirement information and completing the synchronization verification of the password, the method further includes:
将验证成功的密码进行删除。Delete the password that verified the success.
需要说明的是,本申请中,当共享设备在工作过程中出现异常情况,如断电时,共享设备会把异常情况之前的信息进行存储,待恢复正常后,继续之前的工作,直至完成本次服务。It should be noted that, in the present application, when an abnormal situation occurs in the working process of the shared device, for example, when the power is turned off, the shared device stores the information before the abnormal situation, and after the normal operation is resumed, the previous work is continued until the completion of the work. Secondary service.
与上述方法实施例相对应,本申请还公开了一种云端服务器和一种共享设备,具体参见下述描述。Corresponding to the foregoing method embodiments, the present application also discloses a cloud server and a shared device, and specifically refer to the following description.
参见图5,本申请一实施例公开的一种云端服务器的结构示意图,该云端服务器与至少一个共享设备成对应关系,该云端服务器具有多个云端密码库,每一个云端密码库对应一个共享设备,该云端服务器包括:Referring to FIG. 5, a schematic structural diagram of a cloud server disclosed in an embodiment of the present application, the cloud server is associated with at least one shared device, where the cloud server has multiple cloud password databases, and each cloud password database corresponds to one shared device. The cloud server includes:
第一获取单元301,用于获取用户输入的待使用共享设备的设备身份,根据所述设备身份确定对应的云端密码库;The first obtaining unit 301 is configured to acquire a device identity of the shared device to be used input by the user, and determine a corresponding cloud password database according to the device identity;
在实际应用中,用户可以通过手机、IPAD等终端扫描共享设备的二维码来获取共享设备的设备身份,该设备身份也即设备标识。当然,用户还可以采用其它的方式获取共享设备的设备身份,如通过将共享设备上印制的身份码输入电脑来获取共享设备的设备身份。In an actual application, the user can scan the two-dimensional code of the shared device through a terminal such as a mobile phone or an IPAD to obtain the device identity of the shared device, and the device identity is also the device identifier. Of course, the user can also obtain the device identity of the shared device in other ways, such as by inputting the identity code printed on the shared device into the computer to obtain the device identity of the shared device.
其中,每一个共享设备都有与之唯一对应的设备身份。Each of the shared devices has a unique device identity.
第二获取单元302,用于获取所述用户输入的用户信息以及对所述待使用共享设备的需求信息;The second obtaining unit 302 is configured to acquire user information input by the user and demand information about the shared device to be used;
具体的,用户信息具体指的是用户的身份信息,如身份证号码。Specifically, the user information specifically refers to the identity information of the user, such as an identity card number.
对于共享设备的需求信息,举例说明,假设,共享设备为共享洗衣机,则用户对共享洗衣机的需求信息包括:洗衣时长、漂洗次数、洗涤温度、转速等等。For the demand information of the shared device, for example, if the shared device is a shared washing machine, the user's demand information for the shared washing machine includes: laundry time, number of rinsing, washing temperature, rotation speed, and the like.
选取单元303,用于从所述云端密码库中选取一个云端密码群,并将所述云端密码群和所述用户信息以对应关系的形式进行记录;The selecting unit 303 is configured to select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
本实施例中,一个云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合,也即每一个云端密码群中包含用户所需求使用共享设备的所有情况。举例说明,假设共享设备为共享洗衣机,用户对共享洗衣机的需求信息也即共享洗衣机的工作情况为:洗衣时长为30分钟,洗衣模式为:两次漂洗加一次脱水,衣物类型为:衬衫,根据这些需求信息以及预设密码生成规则如密码生成公式,得到一个与该需求信息唯一对应的一个密码。In this embodiment, a cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords, that is, each cloud cipher group contains all the conditions that the user needs to use the shared device. For example, if the shared device is a shared washing machine, the user's demand information for the shared washing machine, that is, the shared washing machine, is: the laundry time is 30 minutes, the laundry mode is: two rinsing plus one dehydration, and the clothing type is: shirt, according to The demand information and the preset password generation rules, such as the password generation formula, obtain a password uniquely corresponding to the demand information.
通过将共享洗衣机按照预设密码生成规则在不同工作情况下的排列组合产生所有密码的集合,也即得到一个云端密码群。A set of all passwords is generated by arranging and combining the shared washing machines according to the preset password generation rules in different working situations, that is, obtaining a cloud cipher group.
当云端密码群在云端密码库中按顺序排列时,可将排列最前面的云端密码群作为选用的云端密码群,当然,也可以随机选择一个云端密码群。When the cloud cipher group is arranged in order in the cloud cipher library, the cloud cipher group in front of the array can be selected as the cloud cipher group. Of course, a cloud cipher group can also be randomly selected.
其中,将云端密码群和用户信息以对应关系的形式进行记录的目的是:实现共享设备使用的实名制,以避免向未达到年龄要求的用户提供服务,如共享单车的使用用户需年满12周岁,同时为后续为用户购买人身意外伤害险和第三者责任险等提供条件。The purpose of recording the cloud cipher group and the user information in the form of a corresponding relationship is to implement a real-name system used by the shared device to avoid providing services to users who do not meet the age requirement, such as users who share the bicycle need to be at least 12 years old. At the same time, it provides conditions for the subsequent purchase of personal accident insurance and third party liability insurance for users.
在实际应用中,可以对云端密码库中包含的各个云端密码群设置不同的级别,同时,对用户设置不同的等级,如根据用户历次使用共享设备的总次数确定用户的级别,用户使用的次数越多,用户的级别越高,同一级别的用户和云端密码群相对应。In an actual application, different levels of each cloud cipher group included in the cloud cipher pool can be set, and different levels are set for the user, for example, the user's level is determined according to the total number of times the user has used the shared device, and the number of times the user uses The more users, the higher the level of users, the corresponding level of users and cloud password groups correspond.
因此,选取单元303执行过程具体为:首先确定待使用共享设备对应的多个云端密码群,其次,根据用户信息确定用户级别,并根据用户级别确定对应的云端密码群。Therefore, the selecting unit 303 performs the process specifically: first determining a plurality of cloud cipher groups corresponding to the shared device to be used, and secondly, determining a user level according to the user information, and determining a corresponding cloud cipher group according to the user level.
提取单元304,用于从所述云端密码群中提取出与所述需求信息对应的密码;The extracting unit 304 is configured to extract a password corresponding to the requirement information from the cloud cipher group;
其中,所述密码为预先对所述需求信息采用预设密码生成规则得到的密码,也即该密码是按照预设密码生成规则针对共享设备在不同的工作情况的排列组合下产生的,因此,根据需求信息也即共享设备的工作情况,可从云端密码群中提取出对应的密码。The password is a password obtained by using a preset password generation rule in advance for the requirement information, that is, the password is generated according to a preset password generation rule for a shared device in a different combination of working conditions, and therefore, According to the demand information, that is, the working condition of the shared device, the corresponding password can be extracted from the cloud cipher group.
反馈单元305,用于将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则利用查找到的密码和所述预设密码生成规则确定所述用户的所述需求信息,完成对所述密码的同步验证。The feedback unit 305 is configured to feed back the password to the user, so that when the user uses the shared device to be used, the password is used by the shared device to be used, and the password is used from the device-side password library. It is found whether the password with the same password is stored, and if yes, the required information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
具体的,云端密码库将查找到的密码反馈给用户,用户在使用待使用共享设备时,向待使用共享设备输入该密码,待使用共享设备利用密码从自身的设备端密码库查找是否存储有与用户输入的密码相同的密码,如果是,则利用查找到的密码和所述预设密码生成规则确定用户的需求信息,完成对密码的同步验证。Specifically, the cloud password database feeds back the found password to the user. When the user uses the shared device to be used, the password is input to the shared device to be used, and the shared device uses the password to search for the stored password from the device-side password database. The password that is the same as the password entered by the user. If yes, the password is found and the preset password generation rule is used to determine the user's demand information, and the password verification is completed.
其中,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成,这样,共享设备根据用户从云端密码库获取的密码,即可确定用户的需求信息。The device-side password library includes multiple device-side password groups, and each device-side password group corresponds to one user, and all passwords stored in the device-side password library of each shared device and the cloud password corresponding to the shared device are configured. The passwords in the library are generated by using the same preset password generation rules for the user's demand information. Thus, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
综上,本申请公开的云端服务器,通过将共享设备在云端服务器中对应的云端密码库中的密码,和该共享设备的设备端密码库中的密码,采用相同的预设密码生成规则,使得用户在使用共享设备之前,可以利用对待使用设备的需求信息,首先从云端密码库提取对应的密码,该密码预先对需求信息采用预设密码生成规则得到,然后将该密码输入到共享设备,当共享设备从自身的设备端密码库查找到与该密码对应的密码时,可利用查找到的密码和预设的密码生成规则,确定用户的需求信息,从而完成对密码的同步验证。因此,本申请实现了在云端服务器和共享设备在无需连接网络的情况下,基于相同的密码生成规则,实现了用户和共享设备之间的密码同步验证过程,从而使得共享设备的使用不再受到网络限制,进而有效避免了互联网不安全攻击的风险。In summary, the cloud server disclosed in the present application uses the same preset password generation rule by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device. Before using the shared device, the user can use the information about the device to be used. First, the corresponding password is extracted from the cloud password database. The password is obtained by using the preset password generation rule in advance, and then the password is input to the shared device. When the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password. Therefore, the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected. Network restrictions, which effectively avoid the risk of Internet insecure attacks.
另外,由于本申请公开的方法无需共享设备与云端服务器之间建立网络连接,因此,相比传统方案而言,本申请还省去了设置在共享设备上的无线模块,从而节约了共享设备的硬件成本。In addition, since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
可以理解,不同的共享设备对付费的时间要求可不同,如共享洗衣机,当用户确定对共享洗衣机的需求信息后,共享洗衣机就可以根据这些需求信息生成相应的费用;又比如共享单车,由于提前无法获知用户的使用时间,因此无法提前确定用户的费用,对于这类 共享设备,可以在用户使用完成之后再付费。It can be understood that different sharing devices may have different time requirements for payment, such as sharing a washing machine. When the user determines the demand information for the shared washing machine, the shared washing machine can generate a corresponding fee according to the demand information; for example, sharing the bicycle, due to advance The user's usage time cannot be known, so the user's fee cannot be determined in advance. For such shared devices, the user can pay after the user completes the use.
对于用户在使用完共享设备再付费的方案,可参见现有方案,此处不再赘述。For the solution that the user pays for using the shared device, refer to the existing solution, and details are not described herein again.
对于用户先付费再使用共享设备的方案,可参见下述示例。For the scenario where the user pays to use the shared device first, see the example below.
上述实施例中,当云端服务器在用户完成付费后,才提供密码给所述用户时,In the above embodiment, when the cloud server provides the password to the user after the user completes the payment,
提取单元304包括:The extracting unit 304 includes:
第一提取子单元,用于从所述云端密码群中提取出与所述需求信息对应的需要所述用户支付的费用;a first extracting subunit, configured to extract, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
第二提取子单元,用于当检测到所述用户支付完所述费用后,从所述云端密码群提取出与所述需求信息对应的密码。a second extracting subunit, configured to: after detecting that the user has paid the fee, extract a password corresponding to the demand information from the cloud cipher group.
基于本实施例可以看出,费用和密码都是根据用户需求从云端密码群提取出来的,例如共享洗衣机,云端服务器根据用户选择的洗衣时长、转速、洗涤温度,可以从云端密码群查找到一个相对应的需要用户支付的费用,在用户支付成功后,云端服务器会提供给用户一个相对应的密码。Based on this embodiment, it can be seen that the fee and the password are extracted from the cloud cipher group according to the user's requirement, for example, the shared washing machine, and the cloud server can find one from the cloud cipher group according to the laundry duration, the rotation speed, and the washing temperature selected by the user. Correspondingly, the user needs to pay the fee. After the user pays successfully, the cloud server provides the user with a corresponding password.
其中,费用、密码、云端密码群和云端密码库的对应关系可参见图2所示的示意图以及相关描述。For the correspondence between the fee, the password, the cloud cipher group and the cloud cipher library, refer to the schematic diagram and related description shown in FIG. 2 .
需要说明的是,云端服务器与至少一个共享设备成对应关系,云端服务器和每一个共享设备都可以组成一个系统,云端服务器和多个共享设备组成多个系统,在实际应用中,同一系统要保证设备端密码库和相对应的云端密码库所采用的预设密码生成规则(包括密码生成的算法和加密原则)一致,不同的系统之间的预设密码生成规则可以不同。并且,还需保证云端密码库连续产生的一定数量的云端密码群中的密码不能重复。It should be noted that the cloud server and the at least one shared device are in a corresponding relationship, and the cloud server and each shared device can form a system, and the cloud server and the multiple shared devices form a plurality of systems. In actual applications, the same system must ensure The preset password generation rules (including the password generation algorithm and encryption principle) adopted by the device-side password database and the corresponding cloud password database are the same, and the preset password generation rules between different systems may be different. Moreover, it is also necessary to ensure that the passwords in a certain number of cloud cipher groups continuously generated by the cloud cipher pool cannot be duplicated.
较优的,上述实施例中,云端密码库中所有的云端密码群和设备端密码库中所有的设备端密码群可采用相同的密码分类分级方案,也就是说,针对同一用户的同一需求信息,对应的云端密码群和设备端密码群的级别相同,并且云端密码群中的密码和设备端密码群中的密码所采用的预设密码生成规则相同,但云端密码群中的密码和设备端密码群中密码所产生的时间可以相同,也可以不同。Preferably, in the foregoing embodiment, all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher pool can adopt the same password classification and grading scheme, that is, the same demand information for the same user. The corresponding cloud cipher group and the device cipher group have the same level, and the password in the cloud cipher group and the password in the device cipher group use the same preset password generation rule, but the password and the device end in the cloud cipher group The time generated by the password in the cipher group can be the same or different.
为方便查找密码,在实际应用中,对于先付费再使用共享设备的方案,可以根据用户完成支付的先后顺序,确定用户级别,当多个用户需要支付费用时,用户支付的时间越靠前,对应的用户级别越高,用户级别和相对应的云端密码群的级别、设备端密码群的级别相同。In order to facilitate the search for the password, in the actual application, for the scheme of paying the shared device first, the user level can be determined according to the order in which the user completes the payment, and when the multiple users need to pay the fee, the user pays the higher time. The higher the corresponding user level, the user level and the corresponding level of the cloud cipher group and the level of the device cipher group are the same.
云端服务器和共享设备的对应关系可参见图3以及相关描述,此处不再追溯。The correspondence between the cloud server and the shared device can be seen in FIG. 3 and related description, and is not traced here.
为进一步优化上述实施例,第二提取子单元具体用于:To further optimize the above embodiment, the second extraction subunit is specifically used to:
当检测到所述用户支付完所述费用后,从所述云端密码群中提取出与所述需求信息对应的密码,并标记用户级别,其中,当多个用户需要支付费用时,所述用户级别根据用户完成支付的先后顺序确定,用户完成支付的时间越靠前,相对应的用户级别越高;After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
反馈单元305具体用于:The feedback unit 305 is specifically configured to:
所述将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。Transmitting the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to search whether it is stored from its own device-side password database. The same password as the password, and if so, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
其中,用户在向共享设备输入密码时,可以以数字的形式输入,或由共享设备根据用户支付费用后所产生的二维码凭证自助识别,或是以口令语音识别方式输入等。When the user inputs a password to the shared device, the user may input the number in the form of a number, or the self-identification of the two-dimensional code certificate generated by the shared device according to the user's payment, or input by a password voice recognition method.
需要说明的是,密码在设备端密码群中是不分级别排列的,只有密码被用户输入到共享设备,并确定使用后才有级别之分,且密码的级别和对应的设备端密码群的级别相同。It should be noted that the passwords are arranged in the device-side cipher group regardless of the level. Only the password is input to the shared device by the user, and the level is determined after the use, and the level of the password and the corresponding device-side cipher group are determined. The same level.
参见图6,本申请一实施例公开的一种共享设备的结构示意图,该共享如共享单车、共享电动车、共享洗衣机等,共享设备包括:Referring to FIG. 6 , a schematic diagram of a shared device disclosed in an embodiment of the present disclosure, such as a shared bicycle, a shared electric vehicle, a shared washing machine, and the like, the shared device includes:
第三获取单元401,用于获取用户在云端密码库获取的密码,所述密码为预先对需求信息采用预设密码生成规则得到的密码,所述需求信息为所述用户对所述待使用共享设备的需求信息;The third obtaining unit 401 is configured to obtain a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, and the demand information is that the user shares the to-be-used Equipment demand information;
查找单元402,用于利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码;The searching unit 402 is configured to use, by using the password, to search, from its own device-side password database, whether the same password as the password is stored;
其中,设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成,这样,共享设备根据用户从云端密码库获取的密码和预设密码生成规则,即可确定用户的需求信息。The device-side password library includes multiple device-side cipher groups, and each device-side cipher group corresponds to one user, and each shared device stores all passwords in the device-side password store and the cloud cipher library corresponding to the shared device. The passwords are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database and the preset password generation rule.
验证单元403,用于利用查找到的密码和所述预设密码生成规则确定所述用户的需求信息,完成对所述密码的同步验证。The verification unit 403 is configured to determine the requirement information of the user by using the found password and the preset password generation rule, and complete synchronization verification of the password.
其中,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合;所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成,这样,共享设备根据用户从云端密码库获取的密码,即可确定用户的需求信息。The cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is all generated according to a preset password generation rule for a shared device in a different combination of working conditions. a set of passwords; the device-side password library includes a plurality of device-side password groups, each device-side password group corresponding to one user, and all passwords stored in the device-side password library of each shared device and corresponding to the shared device The passwords in the cloud password database are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
综上,本申请公开的共享设备,通过将共享设备在云端服务器中对应的云端密码库中 的密码,和该共享设备的设备端密码库中的密码,采用相同的预设密码生成规则,使得用户在使用共享设备之前,可以利用对待使用设备的需求信息,首先从云端密码库提取对应的密码,该密码预先对需求信息采用预设密码生成规则得到,然后将该密码输入到共享设备,当共享设备从自身的设备端密码库查找到与该密码对应的密码时,可利用查找到的密码和预设的密码生成规则,确定用户的需求信息,从而完成对密码的同步验证。因此,本申请实现了在云端服务器和共享设备在无需连接网络的情况下,基于相同的密码生成规则,实现了用户和共享设备之间的密码同步验证过程,从而使得共享设备的使用不再受到网络限制,进而有效避免了互联网不安全攻击的风险。In summary, the shared device disclosed in the present application uses the same preset password generation rule by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device. Before using the shared device, the user can use the information about the device to be used. First, the corresponding password is extracted from the cloud password database. The password is obtained by using the preset password generation rule in advance, and then the password is input to the shared device. When the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password. Therefore, the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected. Network restrictions, which effectively avoid the risk of Internet insecure attacks.
另外,由于本申请公开的方法无需共享设备与云端服务器之间建立网络连接,因此,相比传统方案而言,本申请还省去了设置在共享设备上的无线模块,从而节约了共享设备的硬件成本。In addition, since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
为进一步优化上述实施例,还包括:输出单元,用于当从所述设备端密码库未查找到与所述密码相同的密码时,输出提示信息,所述提示信息用于提示用户重新输入密码。In order to further optimize the foregoing embodiment, the method further includes: an output unit, configured to output prompt information when the password is the same as the password, and the prompt information is used to prompt the user to re-enter the password. .
如图3所示,在实际应用中,可以在设备端密码库设置有效密码保留区,当待使用共享设备需要确定用户输入的密码是否存储时,可优先在有效密码保留区查找,若在有效密码保留区未查找到,则从设备端密码库已产生的未位于有效密码保留区的设备端密码群中查找。As shown in Figure 3, in the actual application, a valid password reservation area can be set in the device-side password database. When the shared device needs to determine whether the password input by the user is stored, the priority can be preferentially searched in the valid password reserved area. If the password reservation area is not found, it is searched from the device-side password group that has been generated by the device-side password library and is not located in the valid password reserved area.
其中,有效密码保留区主要用于保留待使用共享设备已获取但未使用的密码。The valid password reserved area is mainly used to reserve the password that is to be used but not used by the shared device.
因此,为进一步优化上述实施例,查找单元402具体可以用于:Therefore, to further optimize the foregoing embodiment, the searching unit 402 can be specifically used to:
利用所述密码从自身的设备端密码库的有效密码保留区放置的设备端密码群中,查找是否存储有与所述密码相同的密码,其中,所述有效密码保留区用于保留所述待使用共享设备已获取但未使用的密码。Searching, by using the password, from the device-side cipher group placed in the valid password reservation area of the device-side cipher library of the device, whether to store the same password as the password, wherein the valid password reservation area is used to reserve the A password that has been obtained but not used by the shared device.
查找单元402具体还可以用于:The searching unit 402 can also be specifically used to:
当从自身的设备端密码库的有效密码保留区未查找到与所述密码相同的密码时,则从所述设备端密码库已产生的设备端密码群中,查找是否存储有与所述密码相同的密码。When the same password as the password is not found from the valid password reservation area of the device-side password bank of the device, the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
在实际应用中,对于先付费再使用共享设备的方案,可以根据用户完成支付的先后顺序,确定用户级别,当多个用户需要支付费用时,用户支付的时间越靠前,对应的用户级别越高,用户级别、云端密码群的级别和设备端密码群的级别三者一致。In an actual application, for a scheme of paying for a shared device first, the user level may be determined according to the order in which the user completes the payment. When multiple users need to pay the fee, the user pays the higher the time, and the corresponding user level is higher. The level of the user level, the cloud cipher group, and the level of the device cipher group are the same.
因此,云端服务器在提取出密码,并且对用户级别进行标记后,那么,待使用共享设备可以根据与用户提供的密码匹配的密码所在的设备端密码群的级别,可以确定用户级别。Therefore, after the cloud server extracts the password and marks the user level, the shared device can determine the user level according to the level of the device-side cipher group where the password matching the password provided by the user is located.
所以,当从所述设备端密码库已产生的设备端密码群中查找到与所述密码相同的密码,验证单元403具体用于:Therefore, when the same password as the password is found in the device-side cipher group that has been generated by the device-side cipher library, the verification unit 403 is specifically configured to:
利用查找到的密码和所述预设密码生成规则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。Determining the user level and requirement information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
需要说明的是,有效密码保留区的密码被使用时,不对正常级别的密码轮换产生影响,有效密码保留区中的密码直到被使用时才会消失。It should be noted that when the password of the valid password reservation area is used, the normal level of password rotation is not affected, and the password in the valid password reservation area will not disappear until it is used.
当完成对密码的同步验证之后,可将级别高于用户级别的未使用的设备端密码群放到所述有效密码保留区,并删除所有级别低于所述用户级别的设备端密码群。After the synchronization verification of the password is completed, an unused device-side cipher group of a higher level than the user level can be placed in the valid password reservation area, and all device-side cipher groups whose level is lower than the user level can be deleted.
其中,云端密码库中的云端密码群和设备端密码库中的设备端密码群是根据预设规则逐渐产生的,并以设定规则逐渐消除低等级的密码群,以保证云端密码库的云端密码群和设备端密码库中的设备端密码群在一定数量范围内,且不重复。The cloud cipher group in the cloud cipher library and the device cipher group in the device cipher library are gradually generated according to a preset rule, and the low level cipher group is gradually eliminated by setting rules to ensure the cloud of the cloud cipher library. The device-side cipher group in the cipher group and the device-side cipher library is within a certain number of ranges and is not repeated.
云端密码群可以在提供给用户密码或用户完成一次支付行为后,增加一个或多个云端密码群,也可以通过日期,一定天数增加一定数据的云端密码群,或是根据用户使用的频繁程度,确定密码产生的数量,无效云端密码群的去除可采用以下方式:设定云端密码群有效期,超期后自动删除;在用户完成自助服务后,并反馈完成后,对所使用的云端密码群进行删除;也可以采用多种方式混合判断。The cloud cipher group can add one or more cloud cipher groups after providing the user password or the user to complete a payment behavior, or increase the cloud cipher group of a certain data by a certain number of days, or according to the frequency of the user. To determine the number of passwords generated, the invalid cloud cipher group can be removed by setting the validity period of the cloud cipher group and automatically deleting it after the expiration. After the user completes the self-service and the feedback is completed, the cloud cipher group used is deleted. ; can also be mixed in a variety of ways.
设备端密码群是否需要增加,以增加的数量以用户使用的次数、使用的时间间隔、现有有效设备端密码群数量、共享设备的工作特点、用户输入的密码等级等中的一种或多种混合方式进行确定,无效密码的消除以用户使用过自动删除为准。Whether the device-side cipher group needs to be increased, such as the number of times the user uses, the time interval used, the number of existing valid device-side cipher groups, the working characteristics of the shared device, and the password level entered by the user, etc. The hybrid mode is determined, and the elimination of the invalid password is subject to the automatic deletion used by the user.
经过一段使用时间后,当共享设备已获取但未用的密码增加时,有效密码保留区中的容量会越来越大,当增加到一定数量后以一定方式进行消除,以共享设备的工作特点,用户使用此次,有效密码保留区中的密码等级综合判断。After a period of use, when the shared device has acquired but the unused password is increased, the capacity in the effective password reserved area will become larger and larger. When it is increased to a certain amount, it will be eliminated in a certain way to share the working characteristics of the device. The user uses this time to comprehensively judge the password level in the valid password reserved area.
因此,共享设备还包括:Therefore, the shared device also includes:
放置单元,用于当完成对所述密码的同步验证之后,将级别高于所述用户级别的未使用的设备端密码群放到所述有效密码保留区;a placing unit, configured to: after the synchronization verification of the password is completed, put an unused device-side cipher group of a level higher than the user level into the valid password reservation area;
第一删除单元,用于删除所有级别低于所述用户级别的设备端密码群。The first deleting unit is configured to delete all device-side cipher groups whose level is lower than the user level.
为进一步优化上述实施例,共享设备还包括:To further optimize the above embodiment, the shared device further includes:
第二删除单元,用于在确定所述用户的需求信息,完成对所述密码的同步验证之后,将验证成功的所述密码进行删除。The second deleting unit is configured to delete the password that is successfully verified after determining the user's requirement information and completing the synchronization verification of the password.
本申请还提供了一种共享设备的密码验证系统,该系统包括上述所述的云端服务器和至少一个上述所述的共享设备,其中,系统的工作原理请参见云端服务器和共享设备对应 部分,此处不再赘述。The present application further provides a password verification system for a shared device, the system includes the cloud server and the at least one shared device described above, wherein the working principle of the system can be found in the corresponding part of the cloud server and the shared device. I won't go into details here.
需要说明的是,共享设备、云端服务器和密码验证系统中各组成部分的具体工作原理请参见方法实施例对应部分,此处不再赘述。It should be noted that the specific working principles of the components in the shared device, the cloud server, and the password authentication system are described in the corresponding parts of the method embodiment, and are not described here.
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。Finally, it should also be noted that in this context, relational terms such as first and second are used merely to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply these entities. There is any such actual relationship or order between operations. Furthermore, the term "comprises" or "comprises" or "comprises" or any other variations thereof is intended to encompass a non-exclusive inclusion, such that a process, method, article, or device that comprises a plurality of elements includes not only those elements but also Other elements, or elements that are inherent to such a process, method, item, or device. An element that is defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device that comprises the element.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。The various embodiments in the present specification are described in a progressive manner, and each embodiment focuses on differences from other embodiments, and the same similar parts between the various embodiments may be referred to each other.
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本申请。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。The above description of the disclosed embodiments enables those skilled in the art to make or use the application. Various modifications to these embodiments are obvious to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the application. Therefore, the application is not limited to the embodiments shown herein, but is to be accorded the broadest scope of the principles and novel features disclosed herein.

Claims (31)

  1. 一种共享设备的密码验证方法,其特征在于,应用于云端服务器,所述云端服务器具有多个云端密码库,每一个云端密码库对应一个共享设备,所述共享设备的密码验证方法包括:A password verification method for a shared device, which is characterized in that it is applied to a cloud server, and the cloud server has a plurality of cloud cryptographic databases, each of which corresponds to a shared device, and the password verification method of the shared device includes:
    获取用户输入的待使用共享设备的设备身份,根据所述设备身份确定对应的云端密码库;Obtaining a device identity of the shared device to be used input by the user, and determining a corresponding cloud password database according to the device identity;
    获取所述用户输入的用户信息以及对所述待使用共享设备的需求信息;Obtaining user information input by the user and demand information about the shared device to be used;
    从所述云端密码库中选取一个云端密码群,并将所述云端密码群和所述用户信息以对应关系的形式进行记录;Selecting a cloud cipher group from the cloud cipher library, and recording the cloud cipher group and the user information in a correspondence relationship;
    从所述云端密码群中提取出与所述需求信息对应的密码,其中,所述密码为预先对所述需求信息采用预设密码生成规则得到的密码;Extracting a password corresponding to the requirement information from the cloud cipher group, where the password is a password obtained by using a preset password generation rule for the demand information in advance;
    将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则利用查找到的密码和所述预设密码生成规则确定所述用户的所述需求信息,完成对所述密码的同步验证。And returning the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to find out whether the device and the password are stored. The password with the same password is used, and if yes, the required information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
  2. 根据权利要求1所述的共享设备的密码验证方法,其特征在于,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。The password verification method of the shared device according to claim 1, wherein the cloud password database comprises a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is according to a preset password. The generation rule is a collection of all passwords generated by the shared device under the permutation combination of different working conditions.
  3. 根据权利要求1所述的共享设备的密码验证方法,其特征在于,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成。The method for verifying a password of a shared device according to claim 1, wherein the device-side password library comprises a plurality of device-side password groups, each device-side password group corresponds to one user, and each shared device is on the device side. All the passwords stored in the password library and the passwords in the cloud password database corresponding to the shared device are generated by using the same preset password generation rules for the user's demand information.
  4. 根据权利要求1所述的共享设备的密码验证方法,其特征在于,当所述云端服务器在所述用户完成付费后,提供密码给所述用户时,从所述云端密码群中提取出与所述需求信息对应的密码,具体包括:The method for verifying a password of a shared device according to claim 1, wherein when the cloud server provides a password to the user after the user completes the payment, the cloud server extracts the location from the cloud cipher group. The password corresponding to the demand information includes:
    从所述云端密码群中提取出与所述需求信息对应的需要所述用户支付的费用;Extracting, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
    当检测到所述用户支付完所述费用后,从所述云端密码群提取出与所述需求信息对应的密码。After detecting that the user has paid the fee, the password corresponding to the demand information is extracted from the cloud cipher group.
  5. 根据权利要求4所述的共享设备的密码验证方法,其特征在于,当检测到所述用户支付完所述费用后,从所述云端密码群提取出与所述需求信息对应的密码,具体包括:The password verification method of the shared device according to claim 4, wherein after detecting that the user has paid the fee, the password corresponding to the demand information is extracted from the cloud cipher group, specifically including :
    当检测到所述用户支付完所述费用后,从所述云端密码群中提取出与所述需求信息对应的密码,并标记用户级别,其中,当多个用户需要支付费用时,所述用户级别根据用户完成支付的先后顺序确定,用户完成支付的时间越靠前,相对应的用户级别越高;After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
    将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则利用查找到的密码确定所述用户的所述需求信息,完成对所述密码的同步验证,具体包括:And returning the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to find out whether the device and the password are stored. The password with the same password is used to determine the required information of the user by using the found password, and the synchronization verification of the password is completed, which specifically includes:
    将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。And returning the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to find out whether the device and the password are stored. The password with the same password is used. If yes, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
  6. 根据权利要求1所述的共享设备的密码验证方法,其特征在于,所述云端密码库中所有的云端密码群和所述设备端密码库中所有的设备端密码群采用相同的密码分类分级方案。The method for verifying a password of a shared device according to claim 1, wherein all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher pool use the same cipher classification scheme .
  7. 一种共享设备的密码验证方法,其特征在于,应用于待使用共享设备,所述共享设备的密码验证方法包括:A password verification method for a shared device, which is applied to a shared device to be used, and the password verification method of the shared device includes:
    获取用户在云端密码库获取的密码,所述密码为预先对需求信息采用预设密码生成规则得到的密码,所述需求信息为所述用户对所述待使用共享设备的需求信息;Obtaining a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, where the requirement information is demand information of the user to the shared device to be used;
    利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码;Using the password to find out from its own device side password database whether the same password as the password is stored;
    如果是,则利用查找到的密码和所述预设密码生成规则确定所述用户的需求信息,完成对所述密码的同步验证。If yes, determining the demand information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
  8. 根据权利要求7所述的共享设备的密码验证方法,其特征在于,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。The password verification method of the shared device according to claim 7, wherein the cloud password database comprises a plurality of cloud password groups, each cloud password group corresponds to one user, and each cloud password group is according to a preset password. The generation rule is a collection of all passwords generated by the shared device under the permutation combination of different working conditions.
  9. 根据权利要求7所述的共享设备的密码验证方法,其特征在于,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成。The method for verifying a password of a shared device according to claim 7, wherein the device-side password library comprises a plurality of device-side password groups, each device-side password group corresponds to one user, and each shared device is on the device side. All the passwords stored in the password library and the passwords in the cloud password database corresponding to the shared device are generated by using the same preset password generation rules for the user's demand information.
  10. 根据权利要求7所述的共享设备的密码验证方法,其特征在于,所述利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码,具体包括:The method for verifying a password of a shared device according to claim 7, wherein the password is used to search for a password that is the same as the password by using the password of the device, and the password includes:
    利用所述密码从自身的设备端密码库的有效密码保留区放置的设备端密码群中,查找是否存储有与所述密码相同的密码,其中,所述有效密码保留区用于保留所述待使用共享 设备已获取但未使用的密码。Searching, by using the password, from the device-side cipher group placed in the valid password reservation area of the device-side cipher library of the device, whether to store the same password as the password, wherein the valid password reservation area is used to reserve the A password that has been obtained but not used by the shared device.
  11. 根据权利要求7所述的共享设备的密码验证方法,其特征在于,所述利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码,具体包括:The method for verifying a password of a shared device according to claim 7, wherein the password is used to search for a password that is the same as the password by using the password of the device, and the password includes:
    当从自身的设备端密码库的有效密码保留区未查找到与所述密码相同的密码时,则从所述设备端密码库已产生的设备端密码群中,查找是否存储有与所述密码相同的密码。When the same password as the password is not found from the valid password reservation area of the device-side password bank of the device, the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  12. 根据权利要求7所述的共享设备的密码验证方法,其特征在于,当从所述设备端密码库已产生的设备端密码群中查找到与所述密码相同的密码,且云端密码群的级别、设备端密码群的级别和用户级别三者一致时,所述利用查找到的密码和所述预设密码生成规则确定所述用户的需求信息,完成对所述密码的同步验证,具体包括:The method for verifying a password of a shared device according to claim 7, wherein a password equal to the password is found in a device-side cipher group that has been generated from the device-side cipher library, and the level of the cloud cipher group is When the level of the device-side cipher group is the same as the user-level cipher, the queried password and the preset cipher generation rule are used to determine the demand information of the user, and the synchronization verification of the password is completed, which specifically includes:
    利用查找到的密码和所述预设密码生成规则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。Determining the user level and requirement information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
  13. 根据权利要求12所述的共享设备的密码验证方法,其特征在于,当完成对所述密码的同步验证之后,还包括:The password verification method of the shared device according to claim 12, further comprising: after completing the synchronization verification of the password, further comprising:
    将级别高于所述用户级别的未使用的设备端密码群放到所述有效密码保留区;Putting an unused device-side cipher group of a higher level than the user level into the valid password reservation area;
    删除所有级别低于所述用户级别的设备端密码群。Delete all device-side cipher groups whose level is lower than the user level.
  14. 根据权利要求7所述的共享设备的密码验证方法,其特征在于,在确定所述用户的需求信息,完成对所述密码的同步验证之后,还包括:The password authentication method of the shared device according to claim 7, wherein after determining the user's demand information and completing the synchronization verification of the password, the method further includes:
    将验证成功的所述密码进行删除。The password that verified the success is deleted.
  15. 根据权利要求7所述的共享设备的密码验证方法,其特征在于,还包括:The password verification method of the shared device according to claim 7, further comprising:
    当从所述设备端密码库未查找到与所述密码相同的密码时,输出提示信息,所述提示信息用于提示用户重新输入密码。When the same password as the password is not found from the device-side password library, prompt information is output, and the prompt information is used to prompt the user to re-enter the password.
  16. 一种云端服务器,其特征在于,所述云端服务器具有多个云端密码库,每一个云端密码库对应一个共享设备,所述云端服务器包括:A cloud server, wherein the cloud server has a plurality of cloud cryptographic libraries, and each cloud cryptographic library corresponds to a shared device, and the cloud server includes:
    第一获取单元,用于获取用户输入的待使用共享设备的设备身份,根据所述设备身份确定对应的云端密码库;a first acquiring unit, configured to acquire a device identity of the shared device to be used by the user, and determine a corresponding cloud password database according to the device identity;
    第二获取单元,用于获取所述用户输入的用户信息以及对所述待使用共享设备的需求信息;a second acquiring unit, configured to acquire user information input by the user and demand information about the shared device to be used;
    选取单元,用于从所述云端密码库中选取一个云端密码群,并将所述云端密码群和所述用户信息以对应关系的形式进行记录;a selecting unit, configured to select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
    提取单元,用于从所述云端密码群中提取出与所述需求信息对应的密码,其中,所述密码为预先对所述需求信息采用预设密码生成规则得到的密码;An extracting unit, configured to extract a password corresponding to the requirement information from the cloud cipher group, where the password is a password obtained by using a preset password generating rule in advance for the demand information;
    反馈单元,用于将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则利用查找到的密码和所述预设密码生成规则确定所述用户的所述需求信息,完成对所述密码的同步验证。a feedback unit, configured to feed back the password to the user, so that when the user uses the shared device to be used, the shared device uses the password to search from its own device-side password database. Whether the password with the same password is stored, and if yes, determining the demand information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
  17. 根据权利要求16所述的云端服务器,其特征在于,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。The cloud server according to claim 16, wherein the cloud cryptographic library comprises a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is configured to share according to a preset password generation rule. A collection of all passwords generated by the device under a permutation combination of different operating conditions.
  18. 根据权利要求16所述的云端服务器,其特征在于,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成。The cloud server according to claim 16, wherein the device side password library comprises a plurality of device side password groups, each device side password group corresponds to one user, and each shared device is stored in the device side password library. All passwords and passwords in the cloud cryptographic library corresponding to the shared device are generated by using the same preset password generation rules for the user's demand information.
  19. 根据权利要求16所述的云端服务器,其特征在于,当所述云端服务器在所述用户完成付费后,提供密码给所述用户时,所述提取单元包括:The cloud server according to claim 16, wherein when the cloud server provides a password to the user after the user completes the payment, the extracting unit includes:
    第一提取子单元,用于从所述云端密码群中提取出与所述需求信息对应的需要所述用户支付的费用;a first extracting subunit, configured to extract, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
    第二提取子单元,用于当检测到所述用户支付完所述费用后,从所述云端密码群提取出与所述需求信息对应的密码。a second extracting subunit, configured to: after detecting that the user has paid the fee, extract a password corresponding to the demand information from the cloud cipher group.
  20. 根据权利要求19所述的云端服务器,其特征在于,所述第二提取子单元具体用于:The cloud server according to claim 19, wherein the second extraction subunit is specifically configured to:
    当检测到所述用户支付完所述费用后,从所述云端密码群中提取出与所述需求信息对应的密码,并标记用户级别,其中,当多个用户需要支付费用时,所述用户级别根据用户完成支付的先后顺序确定,用户完成支付的时间越靠前,相对应的用户级别越高;After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
    所述反馈单元具体用于:The feedback unit is specifically configured to:
    将所述密码反馈给所述用户,以使所述用户在使用所述待使用共享设备时,由所述待使用共享设备利用所述密码,从自身的设备端密码库查找是否存储有与所述密码相同的密码,如果是,则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。And returning the password to the user, so that when the user uses the shared device to be used, the shared device that uses the shared device uses the password to find out whether the device and the password are stored. The password with the same password is used. If yes, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
  21. 根据权利要求16所述的云端服务器,其特征在于,所述云端密码库中所有的云端密码群和所述设备端密码库中所有的设备端密码群采用相同的密码分类分级方案。The cloud server according to claim 16, wherein all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher library adopt the same cipher classification scheme.
  22. 一种共享设备,其特征在于,包括:A shared device, comprising:
    第三获取单元,用于获取用户在云端密码库获取的密码,所述密码为预先对需求信息采用预设密码生成规则得到的密码,所述需求信息为所述用户对所述待使用共享设备的需 求信息;a third obtaining unit, configured to acquire a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, where the demand information is that the user uses the shared device to be used. Demand information;
    查找单元,用于利用所述密码从自身的设备端密码库查找是否存储有与所述密码相同的密码;a searching unit, configured to use, by using the password, to find, from its own device-side password database, whether a password with the same password is stored;
    验证单元,用于利用查找到的密码和所述预设密码生成规则确定所述用户的需求信息,完成对所述密码的同步验证。The verification unit is configured to determine the user's demand information by using the found password and the preset password generation rule, and complete synchronization verification of the password.
  23. 根据权利要求22所述的共享设备,其特征在于,所述云端密码库包括多个云端密码群,每一个云端密码群对应一位用户,每一个云端密码群为按照预设密码生成规则针对共享设备在不同工作情况的排列组合下产生的所有密码的集合。The sharing device according to claim 22, wherein the cloud cryptographic library comprises a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is configured to share according to a preset password generation rule. A collection of all passwords generated by the device under a permutation combination of different operating conditions.
  24. 根据权利要求22所述的共享设备,其特征在于,所述设备端密码库包括多个设备端密码群,每一个设备端密码群对应一位用户,每一个共享设备在设备端密码库存储的所有密码和与该共享设备相对应的云端密码库中的密码,均是对用户的需求信息采用相同的预设密码生成规则生成。The sharing device according to claim 22, wherein the device-side password library comprises a plurality of device-side password groups, each device-side password group corresponds to one user, and each shared device is stored in the device-side password library. All passwords and passwords in the cloud cryptographic library corresponding to the shared device are generated by using the same preset password generation rules for the user's demand information.
  25. 根据权利要求22所述的共享设备,其特征在于,所述查找单元具体用于:The sharing device according to claim 22, wherein the searching unit is specifically configured to:
    利用所述密码从自身的设备端密码库的有效密码保留区放置的设备端密码群中,查找是否存储有与所述密码相同的密码,其中,所述有效密码保留区用于保留所述待使用共享设备已获取但未使用的密码。Searching, by using the password, from the device-side cipher group placed in the valid password reservation area of the device-side cipher library of the device, whether to store the same password as the password, wherein the valid password reservation area is used to reserve the A password that has been obtained but not used by the shared device.
  26. 根据权利要求22所述的共享设备,其特征在于,所述查找单元具体用于:The sharing device according to claim 22, wherein the searching unit is specifically configured to:
    当从自身的设备端密码库的有效密码保留区未查找到与所述密码相同的密码时,则从所述设备端密码库已产生的设备端密码群中,查找是否存储有与所述密码相同的密码。When the same password as the password is not found from the valid password reservation area of the device-side password bank of the device, the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  27. 根据权利要求22所述的共享设备,其特征在于,当从所述设备端密码库已产生的设备端密码群中查找到与所述密码相同的密码,且云端密码群的级别、设备端密码群的级别和用户级别三者一致时,所述验证单元具体用于:The sharing device according to claim 22, wherein the same password as the password is found in the device-side cipher group that has been generated from the device-side cipher library, and the level of the cloud cipher group and the device-side password are obtained. When the level of the group is consistent with the user level, the verification unit is specifically used to:
    利用查找到的密码和所述预设密码生成规则确定所述用户的用户级别和需求信息,完成对所述密码的同步验证。Determining the user level and requirement information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
  28. 根据权利要求27所述的共享设备,其特征在于,还包括:The sharing device according to claim 27, further comprising:
    放置单元,用于当完成对所述密码的同步验证之后,将级别高于所述用户级别的未使用的设备端密码群放到所述有效密码保留区;a placing unit, configured to: after the synchronization verification of the password is completed, put an unused device-side cipher group of a level higher than the user level into the valid password reservation area;
    第一删除单元,用于删除所有级别低于所述用户级别的设备端密码群。The first deleting unit is configured to delete all device-side cipher groups whose level is lower than the user level.
  29. 根据权利要求22所述的共享设备,其特征在于,还包括:The sharing device according to claim 22, further comprising:
    第二删除单元,用于在确定所述用户的需求信息,完成对所述密码的同步验证之后,将验证成功的所述密码进行删除。The second deleting unit is configured to delete the password that is successfully verified after determining the user's requirement information and completing the synchronization verification of the password.
  30. 根据权利要求22所述的共享设备,其特征在于,还包括:The sharing device according to claim 22, further comprising:
    输出单元,用于当从所述设备端密码库未查找到与所述密码相同的密码时,输出提示信息,所述提示信息用于提示用户重新输入密码。And an output unit, configured to output prompt information when the password is the same as the password, and the prompt information is used to prompt the user to re-enter the password.
  31. 一种共享设备的密码验证系统,其特征在于,包括权利要求16~21任意一项所述的云端服务器和至少一个权利要求22~30所述的共享设备。A password authentication system for a shared device, comprising the cloud server according to any one of claims 16 to 21 and at least one shared device according to claims 22 to 30.
PCT/CN2018/090666 2017-08-16 2018-06-11 Password authentication method for shared device, shared device, cloud server, and system WO2019033840A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710703147.0A CN107483581B (en) 2017-08-16 2017-08-16 Password verification method of sharing device, cloud server and system
CN201710703147.0 2017-08-16

Publications (1)

Publication Number Publication Date
WO2019033840A1 true WO2019033840A1 (en) 2019-02-21

Family

ID=60600611

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/090666 WO2019033840A1 (en) 2017-08-16 2018-06-11 Password authentication method for shared device, shared device, cloud server, and system

Country Status (2)

Country Link
CN (1) CN107483581B (en)
WO (1) WO2019033840A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653701A (en) * 2020-12-24 2021-04-13 北京安信天行科技有限公司 Application password safe use monitoring method and system

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483581B (en) * 2017-08-16 2020-02-14 珠海格力电器股份有限公司 Password verification method of sharing device, cloud server and system
CN109978529B (en) * 2017-12-27 2024-01-23 海尔衣联生态科技(上海)有限公司 Offline payment method
CN108335218A (en) * 2018-02-12 2018-07-27 平安科技(深圳)有限公司 Insurance premium computational methods, device, computer equipment and storage medium
CN109448209A (en) * 2019-01-07 2019-03-08 上海早米网络科技有限公司 A kind of dynamic password massage control system and control method based on off-line mode
CN109887179A (en) * 2019-01-23 2019-06-14 上海早米网络科技有限公司 Charge sharing massage control system and control method based on offline dynamic password
CN110322599B (en) * 2019-05-23 2021-10-26 深圳绿米联创科技有限公司 Door lock management method and device, electronic equipment and storage medium
CN110335394A (en) * 2019-07-05 2019-10-15 深圳市智臻环保能源科技有限公司 A kind of smart lock control method and system based on cipher code set
CN114973518A (en) * 2022-04-21 2022-08-30 杭州小电科技股份有限公司 Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110161141A1 (en) * 2008-03-20 2011-06-30 8D Technologies Inc. Bicycle rental system and station
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106652232A (en) * 2016-12-28 2017-05-10 北京拜克洛克科技有限公司 Bike sharing method and system
CN106780917A (en) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 The control method and system of lock
CN107483581A (en) * 2017-08-16 2017-12-15 珠海格力电器股份有限公司 The method of password authentication of shared equipment, shared equipment, cloud server and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110161141A1 (en) * 2008-03-20 2011-06-30 8D Technologies Inc. Bicycle rental system and station
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106652232A (en) * 2016-12-28 2017-05-10 北京拜克洛克科技有限公司 Bike sharing method and system
CN106780917A (en) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 The control method and system of lock
CN107483581A (en) * 2017-08-16 2017-12-15 珠海格力电器股份有限公司 The method of password authentication of shared equipment, shared equipment, cloud server and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653701A (en) * 2020-12-24 2021-04-13 北京安信天行科技有限公司 Application password safe use monitoring method and system
CN112653701B (en) * 2020-12-24 2023-03-14 北京安信天行科技有限公司 Application password safe use monitoring method and system

Also Published As

Publication number Publication date
CN107483581A (en) 2017-12-15
CN107483581B (en) 2020-02-14

Similar Documents

Publication Publication Date Title
WO2019033840A1 (en) Password authentication method for shared device, shared device, cloud server, and system
CN107079034B (en) Identity authentication method, terminal equipment, authentication server and electronic equipment
US9930040B2 (en) System and method for provisioning a security token
KR102493744B1 (en) Security Verification Method Based on Biometric Characteristics, Client Terminal, and Server
CN111917773B (en) Service data processing method and device and server
TWI612792B (en) Account login method and device
CN105262779B (en) Identity authentication method, device and system
US10630488B2 (en) Method and apparatus for managing application identifier
US20090165107A1 (en) Identification managment system for electronic device authentication
US20140279519A1 (en) Method and system for obtaining and using identification information
CN108876365A (en) A kind of intelligent contract generating block issue mechanism
WO2020215568A1 (en) Communication number changing method, apparatus and system, computer device and storage medium
CN102782694A (en) Transaction auditing for data security devices
WO2013184267A1 (en) Enhanced 2chk authentication security with query transactions
US10439809B2 (en) Method and apparatus for managing application identifier
CN102217280A (en) Method, system, and server for user service authentication
CN110163658A (en) Virtual resource data processing method, device, computer equipment and storage medium
CN101944216A (en) Two-factor online transaction safety authentication method and system
CN104125230A (en) Short message authentication service system and authentication method
CN106487758B (en) data security signature method, service terminal and private key backup server
KR20120030092A (en) Method and device for enabling portable user reputation
CN113474804A (en) Transaction and account verification method, device and storage medium of digital currency
CN103428176A (en) Mobile user accessing mobile Internet application method and system and application server
KR20200041631A (en) Apparatus and method for providing a simple settlement service of a corporation account
CN111242613B (en) Wallet information management method and device based on online banking system and electronic equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18846118

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07.10.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18846118

Country of ref document: EP

Kind code of ref document: A1