WO2019033840A1 - Procédé d'authentification de mot de passe pour dispositif partagé, dispositif partagé, serveur en nuage et système - Google Patents

Procédé d'authentification de mot de passe pour dispositif partagé, dispositif partagé, serveur en nuage et système Download PDF

Info

Publication number
WO2019033840A1
WO2019033840A1 PCT/CN2018/090666 CN2018090666W WO2019033840A1 WO 2019033840 A1 WO2019033840 A1 WO 2019033840A1 CN 2018090666 W CN2018090666 W CN 2018090666W WO 2019033840 A1 WO2019033840 A1 WO 2019033840A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
user
cloud
shared device
cipher
Prior art date
Application number
PCT/CN2018/090666
Other languages
English (en)
Chinese (zh)
Inventor
杨赛赛
苗岑岑
李喜林
Original Assignee
格力电器(武汉)有限公司
珠海格力电器股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 格力电器(武汉)有限公司, 珠海格力电器股份有限公司 filed Critical 格力电器(武汉)有限公司
Publication of WO2019033840A1 publication Critical patent/WO2019033840A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Definitions

  • the present application relates to the field of shared device technologies, and in particular, to a password authentication method, a shared device, a cloud server, and a system for a shared device.
  • shared devices all have one thing in common: they need to connect to the Internet or establish short-range wireless communication with mobile terminals, such as mobile phones, in order to synchronize information with users and implement password verification. Therefore, shared devices usually have Wireless module.
  • the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, so that the shared device and the cloud server can still implement a password between the user and the shared device without connecting to the network. Synchronize the verification process.
  • a password authentication method for a shared device is applied to a cloud server, where the cloud server has a plurality of cloud password databases, and each cloud password database corresponds to a shared device, and the method includes:
  • the shared device that uses the shared device uses the password to find out whether the device and the password are stored.
  • the password with the same password is used, and if yes, the required information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device.
  • the passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
  • the cloud server provides a password to the user after the user completes the payment
  • the password corresponding to the demand information is extracted from the cloud cipher group, and the method includes:
  • the password corresponding to the demand information is extracted from the cloud cipher group.
  • the password corresponding to the demand information is extracted from the cloud cipher group, which specifically includes:
  • the user After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
  • the password with the same password is used to determine the required information of the user by using the found password, and the synchronization verification of the password is completed, which specifically includes:
  • the shared device that uses the shared device uses the password to find out whether the device and the password are stored.
  • the password with the same password is used. If yes, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
  • all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher library use the same cipher classification scheme.
  • a password verification method for a shared device is applied to a shared device to be used, and the method includes:
  • Obtaining a password obtained by the user in the cloud password database where the password is a password obtained by using a preset password generation rule for the requirement information, where the requirement information is demand information of the user to the shared device to be used;
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device.
  • the passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
  • the password is used to search for a password that is the same as the password by using the password of the device, and the password includes:
  • the password is used to search for a password that is the same as the password by using the password of the device, and the password includes:
  • the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  • the level of the device-side cipher group, and the user level are the same, Determining the user's requirement information by using the found password and the preset password generation rule, and completing the synchronization verification of the password, specifically:
  • the method further includes:
  • the method further includes:
  • the password that verified the success is deleted.
  • the method further includes:
  • prompt information is output, and the prompt information is used to prompt the user to re-enter the password.
  • a cloud server has a plurality of cloud cryptographic libraries, and each cloud cryptographic library corresponds to a shared device, and the cloud server includes:
  • a first acquiring unit configured to acquire a device identity of the shared device to be used by the user, and determine a corresponding cloud password database according to the device identity
  • a second acquiring unit configured to acquire user information input by the user and demand information about the shared device to be used
  • a selecting unit configured to select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
  • An extracting unit configured to extract a password corresponding to the requirement information from the cloud cipher group, where the password is a password obtained by using a preset password generating rule in advance for the demand information;
  • a feedback unit configured to feed back the password to the user, so that when the user uses the shared device to be used, the shared device uses the password to search from its own device-side password database. Whether the password with the same password is stored, and if yes, determining the demand information of the user by using the found password and the preset password generation rule, and completing synchronization verification of the password.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device.
  • the passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
  • the extracting unit includes:
  • a first extracting subunit configured to extract, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
  • a second extracting subunit configured to: after detecting that the user has paid the fee, extract a password corresponding to the demand information from the cloud cipher group.
  • the second extraction subunit is specifically configured to:
  • the user After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
  • the feedback unit is specifically configured to:
  • the shared device that uses the shared device uses the password to find out whether the device and the password are stored.
  • the password with the same password is used. If yes, the user level and requirement information of the user is determined, and the synchronization verification of the password is completed.
  • all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher library use the same cipher classification scheme.
  • a shared device including:
  • a third obtaining unit configured to acquire a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, where the demand information is that the user uses the shared device to be used.
  • Demand information
  • a searching unit configured to use, by using the password, to find, from its own device-side password database, whether a password with the same password is stored;
  • the verification unit is configured to determine the user's demand information by using the found password and the preset password generation rule, and complete synchronization verification of the password.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the device-side crypto library includes a plurality of device-side cipher groups, each device-side cipher group corresponding to one user, and each shared device stores all passwords in the device-side password store and a cloud corresponding to the shared device.
  • the passwords in the password database are generated by using the same preset password generation rules for the user's demand information.
  • the searching unit is specifically configured to:
  • the searching unit is specifically configured to:
  • the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  • the verification unit is specifically configured to:
  • the method further includes:
  • a placing unit configured to: after the synchronization verification of the password is completed, put an unused device-side cipher group of a level higher than the user level into the valid password reservation area;
  • the first deleting unit is configured to delete all device-side cipher groups whose level is lower than the user level.
  • the method further includes:
  • the second deleting unit is configured to delete the password that is successfully verified after determining the user's requirement information and completing the synchronization verification of the password.
  • the method further includes:
  • an output unit configured to output prompt information when the password is the same as the password, and the prompt information is used to prompt the user to re-enter the password.
  • a password authentication system for a shared device comprising the cloud server described above and at least one of the shared devices described above.
  • the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, by using a password of the shared device in the cloud password database corresponding to the cloud server, and the shared device
  • the password in the device-side password database uses the same preset password generation rule.
  • the user can use the demand information of the device to be used before using the shared device.
  • the corresponding password is extracted from the cloud password database.
  • the preset password generation rule is used, and then the password is input to the shared device.
  • the shared device finds the password corresponding to the password from its device-side password database, the used password and the preset password generation rule can be utilized.
  • the user's demand information is determined, thereby completing the synchronous verification of the password.
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • FIG. 1 is a flowchart of a method for verifying a password of a shared device based on a cloud server side according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of correspondence between a fee, a password, a cloud cipher group, and a cloud cipher library according to an embodiment of the present application;
  • FIG. 3 is a schematic diagram of a correspondence between a cloud server and a shared device according to an embodiment of the present disclosure
  • FIG. 4 is a flowchart of a password verification method based on a shared device on a shared device side according to an embodiment of the present disclosure
  • FIG. 5 is a schematic structural diagram of a cloud server according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a shared device according to an embodiment of the present disclosure.
  • the embodiment of the present application discloses a password authentication method, a shared device, a cloud server, and a system for a shared device, so that the shared device and the cloud server can still implement password synchronization between the user and the shared device without connecting to the network. Verification process.
  • FIG. 1 is a flowchart of a method for verifying a password of a shared device according to an embodiment of the present application.
  • the method is applied to a cloud server, where the cloud server is associated with at least one shared device, and the cloud server has multiple cloud password databases.
  • Each cloud password library corresponds to a shared device, and the method includes the steps of:
  • Step S101 Obtain a device identity of the shared device to be used input by the user, and determine a corresponding cloud password database according to the device identity;
  • the user can scan the two-dimensional code of the shared device through a terminal such as a mobile phone or an IPAD to obtain the device identity of the shared device, and the device identity is also the device identifier.
  • a terminal such as a mobile phone or an IPAD
  • the user can also obtain the device identity of the shared device in other ways, such as by inputting the identity code printed on the shared device into the computer to obtain the device identity of the shared device.
  • Each of the shared devices has a unique device identity.
  • Step S102 Obtain user information input by the user and demand information of the shared device to be used;
  • the user information specifically refers to the identity information of the user, such as an identity card number.
  • the user's demand information for the shared washing machine includes: laundry time, number of rinsing, washing temperature, rotation speed, and the like.
  • Step S103 Select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
  • a cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions.
  • a collection of all passwords, that is, each cloud cipher group contains all the conditions that the user needs to use the shared device.
  • the shared device is a shared washing machine
  • the user's demand information for the shared washing machine that is, the shared washing machine
  • the laundry time is 30 minutes
  • the laundry mode is: two rinsing plus one dehydration
  • the clothing type is: shirt
  • a set of all passwords is generated by arranging and combining the shared washing machines according to the preset password generation rules in different working situations, that is, obtaining a cloud cipher group.
  • the cloud cipher group in front of the array can be selected as the cloud cipher group.
  • a cloud cipher group can also be randomly selected.
  • the purpose of recording the cloud cipher group and the user information in the form of a corresponding relationship is to implement a real-name system used by the shared device to avoid providing services to users who do not meet the age requirement, such as users who share the bicycle need to be at least 12 years old. At the same time, it provides conditions for the subsequent purchase of personal accident insurance and third party liability insurance for users.
  • different levels of each cloud cipher group included in the cloud cipher pool can be set, and different levels are set for the user, for example, the user's level is determined according to the total number of times the user has used the shared device, and the number of times the user uses The more users, the higher the level of users, the corresponding level of users and cloud password groups correspond.
  • the execution process of the step is specifically: first determining a plurality of cloud cipher groups corresponding to the shared device to be used, and secondly, determining a user level according to the user information, and determining a corresponding cloud cipher group according to the user level.
  • Step S104 Extract a password corresponding to the demand information from the cloud cipher group
  • the password is a password obtained by using a preset password generation rule in advance for the requirement information, that is, the password is generated according to a preset password generation rule for a shared device in a different combination of working conditions, and therefore, According to the demand information, that is, the working condition of the shared device, the corresponding password can be extracted from the cloud cipher group.
  • Step S105 The password is fed back to the user, so that when the user uses the shared device to be used, the shared device uses the password and its own device-side password database to determine the user's demand information, and completes the synchronous verification of the password.
  • the cloud password database feeds back the found password to the user.
  • the password is input to the shared device to be used, and the shared device uses the password to search for the stored password from the device-side password database.
  • the password that is the same as the password entered by the user. If yes, the password is found and the preset password generation rule is used to determine the user's demand information, and the password verification is completed.
  • the device-side password library includes multiple device-side password groups, and each device-side password group corresponds to one user, and all passwords stored in the device-side password library of each shared device and the cloud password corresponding to the shared device are configured.
  • the passwords in the library are generated by using the same preset password generation rules for the user's demand information.
  • the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
  • the password verification method of the shared device disclosed in the present application adopts the same preset password by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device.
  • a rule is generated, so that the user can use the demand information of the device to be used before using the shared device, first extracting a corresponding password from the cloud password database, and the password is obtained by using a preset password generation rule for the demand information, and then inputting the password to the password.
  • the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password. .
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • the present application since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
  • different sharing devices may have different time requirements for payment, such as sharing a washing machine.
  • the shared washing machine can generate a corresponding fee according to the demand information; for example, sharing the bicycle, due to advance
  • the user's usage time cannot be known, so the user's fee cannot be determined in advance.
  • the user can pay after the user completes the use.
  • the step S104 specifically includes:
  • the password corresponding to the demand information is extracted from the cloud cipher group.
  • the fee and the password are extracted from the cloud cipher group according to the user's requirement, for example, the shared washing machine, and the cloud server can find one from the cloud cipher group according to the laundry duration, the rotation speed, and the washing temperature selected by the user.
  • the user needs to pay the fee.
  • the cloud server After the user pays successfully, the cloud server provides the user with a corresponding password.
  • the cloud cipher library includes multiple cloud cipher groups, such as cloud cipher group 1 and cloud cipher group 2 .
  • Cloud cipher group X each cloud cipher group corresponds to one user, and multiple users correspond to multiple cloud cipher groups.
  • all cloud cipher groups can be grouped into cloud ciphers according to level order.
  • the library, each cloud cipher group is a set of all passwords generated according to a preset password generation rule for a shared device in a different combination of working conditions, that is, each cloud cipher group includes all cases in which the user needs to use the shared device.
  • the different working conditions of the shared device include factors: (1) the usage duration of the shared device, such as 5 minutes, 10 minutes, 20 minutes; (2) the number, taking the shared washing machine as an example.
  • the quantity may refer to the quantity of laundry required by the user, such as 1, 2, 3; (3) the variable (variable 3 in FIG. 2, variable N) refers to the working mode and cost of the shared device.
  • Variable factors, different durations can be considered as an element of a variable under a variable may include various elements, such as element a, element B, element c and the like.
  • the combination of different factors produces a password and a unique fee corresponding to the password. As shown in FIG.
  • the password a corresponds to the fee a
  • the password b corresponds to the fee b
  • the password c corresponds to the fee c
  • the password e corresponds to the fee e.
  • the cloud server and the at least one shared device are in a corresponding relationship, and the cloud server and each shared device can form a system, and the cloud server and the multiple shared devices form a plurality of systems.
  • the same system must ensure
  • the preset password generation rules (including the password generation algorithm and encryption principle) adopted by the device-side password database and the corresponding cloud password database are the same, and the preset password generation rules between different systems may be different.
  • all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher pool can adopt the same password classification and grading scheme, that is, the same demand information for the same user.
  • the corresponding cloud cipher group and the device cipher group have the same level, and the password in the cloud cipher group and the password in the device cipher group use the same preset password generation rule, but the password and the device end in the cloud cipher group
  • the time generated by the password in the cipher group can be the same or different.
  • the user level can be determined according to the order in which the user completes the payment, and when the multiple users need to pay the fee, the user pays the higher time.
  • FIG. 3 is a schematic diagram of a correspondence between a cloud server and a shared device according to an embodiment of the present disclosure.
  • the cloud server corresponds to multiple shared devices, and multiple shared devices are managed separately in the corresponding cloud cryptosystem in the cloud server, which has complementary effects.
  • different passwords can be obtained from the cloud password database, wherein different The user obtains different passwords. For example, user 1 obtains password 1, user 2 obtains password 2, user 3 obtains password 3, user 4 obtains password 4, and user 5 obtains password 5 and so on.
  • the cloud cipher group can be divided into levels. According to the direction of the arrow in FIG. 3, the level of the cloud cipher group gradually increases. Since one cloud cipher group corresponds to one user, each user will correspondingly The cloud cipher group obtains the password. Therefore, in the embodiment shown in FIG. 3, the levels of the passwords 1 to 5 are gradually increased.
  • the device-side password database includes multiple device-side cipher groups, such as device-side cipher groups 1 to 5. Each device-side cipher group corresponds to one user. For example, device-side cipher group 5 corresponds to user 5, and device-side The password in the cipher group and the password in the cloud cipher group are the same as the default password generation rules.
  • the device cipher group can be classified according to the direction indicated by the arrow in FIG. 3, and the level of the device cipher group is gradually increased.
  • the user level, the device-side cipher group level, and the cloud cipher group level are the same.
  • the peer users use the same-level device-side cipher group, and the peer-end device-side cipher group can be rotated normally.
  • the user can also use the device-side cipher group, as shown in Figure 3 Device-side cipher group 2 should be used normally.
  • user 2 can also use device-side cipher group 3.
  • low-level device-side cipher group 1 and device-side cipher group 2 can be placed into valid passwords. Reserved area, used below.
  • the process of extracting the password corresponding to the demand information from the cloud cipher group after detecting the payment of the user's fee may include:
  • the password corresponding to the demand information is extracted from the cloud cipher group, and the user level is marked, wherein when a plurality of users need to pay a fee, the user level is completed according to the user.
  • the order of payment is determined, the higher the time for the user to complete the payment, the higher the corresponding user level.
  • the password provided by the cloud server to the user is extracted from the cloud password group corresponding to the user level according to the user input information, for example, the shared washing machine, and the user's demand information includes: the washing time is 30 minutes. The rinsing is performed twice, and the dehydration is performed once. The cloud server extracts the corresponding password from the cloud cipher group corresponding to the user level according to the demand information.
  • step S105 specifically includes:
  • the user may input the number in the form of a number, or the self-identification of the two-dimensional code certificate generated by the shared device according to the user's payment, or input by a password voice recognition method.
  • the passwords are arranged in the device-side cipher group regardless of the level. Only the password is input to the shared device by the user, and the level is determined after the use, and the level of the password and the corresponding device-side cipher group are determined. The same level.
  • a flow chart of a password verification method for a shared device disclosed in another embodiment of the present application is applied to a shared device to be used, such as a shared bicycle, a shared electric vehicle, a shared washing machine, and the like.
  • the method includes the steps of:
  • Step S201 Acquire a password obtained by the user in the cloud password database
  • the password is a password obtained by using a preset password generation rule in advance for the requirement information, and the demand information is demand information of the user to the shared device to be used.
  • Step S202 Searching, by using a password, from its own device-side password database, whether a password with the same password is stored;
  • the device-side password library includes multiple device-side cipher groups, and each device-side cipher group corresponds to one user, and each shared device stores all passwords in the device-side password store and the cloud cipher library corresponding to the shared device.
  • the passwords are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database and the preset password generation rule.
  • the purpose of using the shared device to determine whether the password of the user-side password store is the same as the password input by the user is to determine whether the password input by the user is a valid password.
  • Step S203 if yes, determining the user's demand information by using the found password and the preset password generation rule, and completing the synchronization verification of the password.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, each cloud cipher group corresponding to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions. A collection of all passwords.
  • the password verification method of the shared device disclosed in the present application adopts the same preset password by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device.
  • a rule is generated, so that the user can use the demand information of the device to be used before using the shared device, first extracting a corresponding password from the cloud password database, and the password is obtained by using a preset password generation rule for the demand information, and then inputting the password to the password.
  • the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password. .
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • the present application since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
  • prompt information is output, and the prompt information is used to prompt the user to re-enter the password.
  • a valid password reservation area can be set in the device-side password database.
  • the priority can be preferentially searched in the valid password reserved area. If the password reservation area is not found, it is searched from the device-side password group that has been generated by the device-side password library and is not located in the valid password reserved area.
  • the valid password reserved area is mainly used to reserve the password that is to be used but not used by the shared device.
  • step S202 may specifically include:
  • Step S202 may specifically include:
  • the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  • the user level may be determined according to the order in which the user completes the payment. When multiple users need to pay the fee, the user pays the higher the time, and the corresponding user level is higher.
  • the level of the user level, the cloud cipher group, and the level of the device cipher group are the same.
  • the shared device can determine the user level according to the level of the device-side cipher group where the password matching the password provided by the user is located.
  • step S203 in the above embodiment may specifically include:
  • the user level and requirement information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
  • an unused device-side cipher group of a higher level than the user level can be placed in the valid password reservation area, and all device-side cipher groups whose level is lower than the user level can be deleted.
  • the cloud cipher group in the cloud cipher library and the device cipher group in the device cipher library are gradually generated according to a preset rule, and the low level cipher group is gradually eliminated by setting rules to ensure the cloud of the cloud cipher library.
  • the device-side cipher group in the cipher group and the device-side cipher library is within a certain number of ranges and is not repeated.
  • the cloud cipher group can add one or more cloud cipher groups after providing the user password or the user to complete a payment behavior, or increase the cloud cipher group of a certain data by a certain number of days, or according to the frequency of the user.
  • the invalid cloud cipher group can be removed by setting the validity period of the cloud cipher group and automatically deleting it after the expiration. After the user completes the self-service and the feedback is completed, the cloud cipher group used is deleted. ; can also be mixed in a variety of ways.
  • the device-side cipher group needs to be increased, such as the number of times the user uses, the time interval used, the number of existing valid device-side cipher groups, the working characteristics of the shared device, and the password level entered by the user, etc.
  • the hybrid mode is determined, and the elimination of the invalid password is subject to the automatic deletion used by the user.
  • the method further includes:
  • the shared device when an abnormal situation occurs in the working process of the shared device, for example, when the power is turned off, the shared device stores the information before the abnormal situation, and after the normal operation is resumed, the previous work is continued until the completion of the work. Secondary service.
  • the present application also discloses a cloud server and a shared device, and specifically refer to the following description.
  • the cloud server is associated with at least one shared device, where the cloud server has multiple cloud password databases, and each cloud password database corresponds to one shared device.
  • the cloud server includes:
  • the first obtaining unit 301 is configured to acquire a device identity of the shared device to be used input by the user, and determine a corresponding cloud password database according to the device identity;
  • the user can scan the two-dimensional code of the shared device through a terminal such as a mobile phone or an IPAD to obtain the device identity of the shared device, and the device identity is also the device identifier.
  • a terminal such as a mobile phone or an IPAD
  • the user can also obtain the device identity of the shared device in other ways, such as by inputting the identity code printed on the shared device into the computer to obtain the device identity of the shared device.
  • Each of the shared devices has a unique device identity.
  • the second obtaining unit 302 is configured to acquire user information input by the user and demand information about the shared device to be used;
  • the user information specifically refers to the identity information of the user, such as an identity card number.
  • the user's demand information for the shared washing machine includes: laundry time, number of rinsing, washing temperature, rotation speed, and the like.
  • the selecting unit 303 is configured to select a cloud cipher group from the cloud cipher pool, and record the cloud cipher group and the user information in a correspondence relationship;
  • a cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is generated according to a preset password generation rule for the shared device in different working conditions.
  • a collection of all passwords, that is, each cloud cipher group contains all the conditions that the user needs to use the shared device.
  • the shared device is a shared washing machine
  • the user's demand information for the shared washing machine that is, the shared washing machine
  • the laundry time is 30 minutes
  • the laundry mode is: two rinsing plus one dehydration
  • the clothing type is: shirt
  • a set of all passwords is generated by arranging and combining the shared washing machines according to the preset password generation rules in different working situations, that is, obtaining a cloud cipher group.
  • the cloud cipher group in front of the array can be selected as the cloud cipher group.
  • a cloud cipher group can also be randomly selected.
  • the purpose of recording the cloud cipher group and the user information in the form of a corresponding relationship is to implement a real-name system used by the shared device to avoid providing services to users who do not meet the age requirement, such as users who share the bicycle need to be at least 12 years old. At the same time, it provides conditions for the subsequent purchase of personal accident insurance and third party liability insurance for users.
  • different levels of each cloud cipher group included in the cloud cipher pool can be set, and different levels are set for the user, for example, the user's level is determined according to the total number of times the user has used the shared device, and the number of times the user uses The more users, the higher the level of users, the corresponding level of users and cloud password groups correspond.
  • the selecting unit 303 performs the process specifically: first determining a plurality of cloud cipher groups corresponding to the shared device to be used, and secondly, determining a user level according to the user information, and determining a corresponding cloud cipher group according to the user level.
  • the extracting unit 304 is configured to extract a password corresponding to the requirement information from the cloud cipher group;
  • the password is a password obtained by using a preset password generation rule in advance for the requirement information, that is, the password is generated according to a preset password generation rule for a shared device in a different combination of working conditions, and therefore, According to the demand information, that is, the working condition of the shared device, the corresponding password can be extracted from the cloud cipher group.
  • the feedback unit 305 is configured to feed back the password to the user, so that when the user uses the shared device to be used, the password is used by the shared device to be used, and the password is used from the device-side password library. It is found whether the password with the same password is stored, and if yes, the required information of the user is determined by using the found password and the preset password generation rule, and the synchronization verification of the password is completed.
  • the cloud password database feeds back the found password to the user.
  • the password is input to the shared device to be used, and the shared device uses the password to search for the stored password from the device-side password database.
  • the password that is the same as the password entered by the user. If yes, the password is found and the preset password generation rule is used to determine the user's demand information, and the password verification is completed.
  • the device-side password library includes multiple device-side password groups, and each device-side password group corresponds to one user, and all passwords stored in the device-side password library of each shared device and the cloud password corresponding to the shared device are configured.
  • the passwords in the library are generated by using the same preset password generation rules for the user's demand information.
  • the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
  • the cloud server disclosed in the present application uses the same preset password generation rule by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device.
  • the user Before using the shared device, the user can use the information about the device to be used.
  • the corresponding password is extracted from the cloud password database.
  • the password is obtained by using the preset password generation rule in advance, and then the password is input to the shared device.
  • the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password.
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • the present application since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
  • different sharing devices may have different time requirements for payment, such as sharing a washing machine.
  • the shared washing machine can generate a corresponding fee according to the demand information; for example, sharing the bicycle, due to advance
  • the user's usage time cannot be known, so the user's fee cannot be determined in advance.
  • the user can pay after the user completes the use.
  • the extracting unit 304 includes:
  • a first extracting subunit configured to extract, from the cloud cipher group, a fee corresponding to the demand information that needs to be paid by the user;
  • a second extracting subunit configured to: after detecting that the user has paid the fee, extract a password corresponding to the demand information from the cloud cipher group.
  • the fee and the password are extracted from the cloud cipher group according to the user's requirement, for example, the shared washing machine, and the cloud server can find one from the cloud cipher group according to the laundry duration, the rotation speed, and the washing temperature selected by the user.
  • the user needs to pay the fee.
  • the cloud server After the user pays successfully, the cloud server provides the user with a corresponding password.
  • the cloud server and the at least one shared device are in a corresponding relationship, and the cloud server and each shared device can form a system, and the cloud server and the multiple shared devices form a plurality of systems.
  • the same system must ensure
  • the preset password generation rules (including the password generation algorithm and encryption principle) adopted by the device-side password database and the corresponding cloud password database are the same, and the preset password generation rules between different systems may be different.
  • all cloud cipher groups in the cloud cipher pool and all device cipher groups in the device cipher pool can adopt the same password classification and grading scheme, that is, the same demand information for the same user.
  • the corresponding cloud cipher group and the device cipher group have the same level, and the password in the cloud cipher group and the password in the device cipher group use the same preset password generation rule, but the password and the device end in the cloud cipher group
  • the time generated by the password in the cipher group can be the same or different.
  • the user level can be determined according to the order in which the user completes the payment, and when the multiple users need to pay the fee, the user pays the higher time.
  • the second extraction subunit is specifically used to:
  • the user After detecting that the user has paid the fee, extracting a password corresponding to the demand information from the cloud cipher group, and marking a user level, wherein when a plurality of users need to pay a fee, the user The level is determined according to the order in which the users complete the payment, and the higher the time for the user to complete the payment, the higher the corresponding user level;
  • the feedback unit 305 is specifically configured to:
  • the user may input the number in the form of a number, or the self-identification of the two-dimensional code certificate generated by the shared device according to the user's payment, or input by a password voice recognition method.
  • the passwords are arranged in the device-side cipher group regardless of the level. Only the password is input to the shared device by the user, and the level is determined after the use, and the level of the password and the corresponding device-side cipher group are determined. The same level.
  • a schematic diagram of a shared device disclosed in an embodiment of the present disclosure such as a shared bicycle, a shared electric vehicle, a shared washing machine, and the like, the shared device includes:
  • the third obtaining unit 401 is configured to obtain a password obtained by the user in the cloud password database, where the password is a password obtained by using a preset password generation rule for the requirement information, and the demand information is that the user shares the to-be-used Equipment demand information;
  • the searching unit 402 is configured to use, by using the password, to search, from its own device-side password database, whether the same password as the password is stored;
  • the device-side password library includes multiple device-side cipher groups, and each device-side cipher group corresponds to one user, and each shared device stores all passwords in the device-side password store and the cloud cipher library corresponding to the shared device.
  • the passwords are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database and the preset password generation rule.
  • the verification unit 403 is configured to determine the requirement information of the user by using the found password and the preset password generation rule, and complete synchronization verification of the password.
  • the cloud cryptographic database includes a plurality of cloud cipher groups, and each cloud cipher group corresponds to one user, and each cloud cipher group is all generated according to a preset password generation rule for a shared device in a different combination of working conditions.
  • a set of passwords the device-side password library includes a plurality of device-side password groups, each device-side password group corresponding to one user, and all passwords stored in the device-side password library of each shared device and corresponding to the shared device
  • the passwords in the cloud password database are generated by using the same preset password generation rules for the user's demand information. In this way, the shared device can determine the user's demand information according to the password obtained by the user from the cloud password database.
  • the shared device disclosed in the present application uses the same preset password generation rule by using the password in the cloud password database corresponding to the shared device in the cloud server and the password in the device password database of the shared device.
  • the user Before using the shared device, the user can use the information about the device to be used.
  • the corresponding password is extracted from the cloud password database.
  • the password is obtained by using the preset password generation rule in advance, and then the password is input to the shared device.
  • the shared device finds the password corresponding to the password from its own device-side password database, it can use the found password and the preset password generation rule to determine the user's demand information, thereby completing the synchronization verification of the password.
  • the present application implements a password synchronization verification process between a user and a shared device based on the same password generation rule in the case that the cloud server and the shared device do not need to connect to the network, so that the use of the shared device is no longer affected.
  • Network restrictions which effectively avoid the risk of Internet insecure attacks.
  • the present application since the method disclosed in the present application does not need to establish a network connection between the shared device and the cloud server, the present application also saves the wireless module disposed on the shared device, thereby saving the shared device. Hardware cost.
  • the method further includes: an output unit, configured to output prompt information when the password is the same as the password, and the prompt information is used to prompt the user to re-enter the password. .
  • a valid password reservation area can be set in the device-side password database.
  • the priority can be preferentially searched in the valid password reserved area. If the password reservation area is not found, it is searched from the device-side password group that has been generated by the device-side password library and is not located in the valid password reserved area.
  • the valid password reserved area is mainly used to reserve the password that is to be used but not used by the shared device.
  • the searching unit 402 can be specifically used to:
  • the searching unit 402 can also be specifically used to:
  • the device-side password group that has been generated by the device-side password library is searched for whether the password is stored. The same password.
  • the user level may be determined according to the order in which the user completes the payment. When multiple users need to pay the fee, the user pays the higher the time, and the corresponding user level is higher.
  • the level of the user level, the cloud cipher group, and the level of the device cipher group are the same.
  • the shared device can determine the user level according to the level of the device-side cipher group where the password matching the password provided by the user is located.
  • the verification unit 403 is specifically configured to:
  • an unused device-side cipher group of a higher level than the user level can be placed in the valid password reservation area, and all device-side cipher groups whose level is lower than the user level can be deleted.
  • the cloud cipher group in the cloud cipher library and the device cipher group in the device cipher library are gradually generated according to a preset rule, and the low level cipher group is gradually eliminated by setting rules to ensure the cloud of the cloud cipher library.
  • the device-side cipher group in the cipher group and the device-side cipher library is within a certain number of ranges and is not repeated.
  • the cloud cipher group can add one or more cloud cipher groups after providing the user password or the user to complete a payment behavior, or increase the cloud cipher group of a certain data by a certain number of days, or according to the frequency of the user.
  • the invalid cloud cipher group can be removed by setting the validity period of the cloud cipher group and automatically deleting it after the expiration. After the user completes the self-service and the feedback is completed, the cloud cipher group used is deleted. ; can also be mixed in a variety of ways.
  • the device-side cipher group needs to be increased, such as the number of times the user uses, the time interval used, the number of existing valid device-side cipher groups, the working characteristics of the shared device, and the password level entered by the user, etc.
  • the hybrid mode is determined, and the elimination of the invalid password is subject to the automatic deletion used by the user.
  • the shared device also includes:
  • a placing unit configured to: after the synchronization verification of the password is completed, put an unused device-side cipher group of a level higher than the user level into the valid password reservation area;
  • the first deleting unit is configured to delete all device-side cipher groups whose level is lower than the user level.
  • the shared device further includes:
  • the second deleting unit is configured to delete the password that is successfully verified after determining the user's requirement information and completing the synchronization verification of the password.
  • the present application further provides a password verification system for a shared device, the system includes the cloud server and the at least one shared device described above, wherein the working principle of the system can be found in the corresponding part of the cloud server and the shared device. I won't go into details here.

Abstract

La présente invention concerne un procédé d'authentification de mot de passe pour un dispositif partagé, un dispositif partagé, un serveur en nuage et un système. En adoptant la même règle de production de mots de passe prédéfinie pour des mots de passe dans une base de données de mots de passe en nuage correspondante d'un dispositif partagé dans un serveur en nuage et des mots de passe dans une base de données de mots de passe de dispositif du dispositif partagé, avant d'utiliser le dispositif partagé, un utilisateur peut d'abord extraire un mot de passe correspondant à partir de la base de données de mots de passe en nuage en utilisant des informations de besoins pour le dispositif à utiliser, le mot de passe étant obtenu à l'avance en utilisant la règle de production de mots de passe prédéfinie pour les informations de besoins, puis saisir le mot de passe dans le dispositif partagé. Lorsque le dispositif partagé trouve un mot de passe correspondant au mot de passe de sa propre base de données de mots de passe de dispositif, les informations de besoins de l'utilisateur peuvent être déterminées grâce au mot de passe trouvé et à la règle de production de mots de passe prédéfinie, ce qui réalise une vérification synchrone de mots de passe sans devoir connecter le serveur en nuage et le dispositif partagé à un réseau.
PCT/CN2018/090666 2017-08-16 2018-06-11 Procédé d'authentification de mot de passe pour dispositif partagé, dispositif partagé, serveur en nuage et système WO2019033840A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710703147.0 2017-08-16
CN201710703147.0A CN107483581B (zh) 2017-08-16 2017-08-16 共享设备的密码验证方法、共享设备、云端服务器及系统

Publications (1)

Publication Number Publication Date
WO2019033840A1 true WO2019033840A1 (fr) 2019-02-21

Family

ID=60600611

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/090666 WO2019033840A1 (fr) 2017-08-16 2018-06-11 Procédé d'authentification de mot de passe pour dispositif partagé, dispositif partagé, serveur en nuage et système

Country Status (2)

Country Link
CN (1) CN107483581B (fr)
WO (1) WO2019033840A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653701A (zh) * 2020-12-24 2021-04-13 北京安信天行科技有限公司 一种应用密码安全使用监测方法及系统

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483581B (zh) * 2017-08-16 2020-02-14 珠海格力电器股份有限公司 共享设备的密码验证方法、共享设备、云端服务器及系统
CN109978529B (zh) * 2017-12-27 2024-01-23 海尔衣联生态科技(上海)有限公司 离线支付方法
CN108335218A (zh) * 2018-02-12 2018-07-27 平安科技(深圳)有限公司 保险费用计算方法、装置、计算机设备及存储介质
CN109448209A (zh) * 2019-01-07 2019-03-08 上海早米网络科技有限公司 一种基于离线模式的动态密码按摩控制系统及控制方法
CN109887179A (zh) * 2019-01-23 2019-06-14 上海早米网络科技有限公司 基于离线动态密码的充电共享按摩控制系统及控制方法
CN110322599B (zh) * 2019-05-23 2021-10-26 深圳绿米联创科技有限公司 门锁管理方法、装置、电子设备及存储介质
CN110335394A (zh) * 2019-07-05 2019-10-15 深圳市智臻环保能源科技有限公司 一种基于密码组的智能锁控制方法和系统
CN114973518A (zh) * 2022-04-21 2022-08-30 杭州小电科技股份有限公司 共享充电设备运维方法、共享充电设备、终端设备和系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110161141A1 (en) * 2008-03-20 2011-06-30 8D Technologies Inc. Bicycle rental system and station
CN106600792A (zh) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 一种自行车开锁方法、系统及装置
CN106652232A (zh) * 2016-12-28 2017-05-10 北京拜克洛克科技有限公司 一种自行车共享方法及系统
CN106780917A (zh) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 锁的控制方法与系统
CN107483581A (zh) * 2017-08-16 2017-12-15 珠海格力电器股份有限公司 共享设备的密码验证方法、共享设备、云端服务器及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110161141A1 (en) * 2008-03-20 2011-06-30 8D Technologies Inc. Bicycle rental system and station
CN106600792A (zh) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 一种自行车开锁方法、系统及装置
CN106652232A (zh) * 2016-12-28 2017-05-10 北京拜克洛克科技有限公司 一种自行车共享方法及系统
CN106780917A (zh) * 2017-01-11 2017-05-31 上海共佰克智能科技有限公司 锁的控制方法与系统
CN107483581A (zh) * 2017-08-16 2017-12-15 珠海格力电器股份有限公司 共享设备的密码验证方法、共享设备、云端服务器及系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653701A (zh) * 2020-12-24 2021-04-13 北京安信天行科技有限公司 一种应用密码安全使用监测方法及系统
CN112653701B (zh) * 2020-12-24 2023-03-14 北京安信天行科技有限公司 一种应用密码安全使用监测方法及系统

Also Published As

Publication number Publication date
CN107483581A (zh) 2017-12-15
CN107483581B (zh) 2020-02-14

Similar Documents

Publication Publication Date Title
WO2019033840A1 (fr) Procédé d'authentification de mot de passe pour dispositif partagé, dispositif partagé, serveur en nuage et système
CN107079034B (zh) 一种身份认证的方法、终端设备、认证服务器及电子设备
US9930040B2 (en) System and method for provisioning a security token
KR102493744B1 (ko) 생체 특징에 기초한 보안 검증 방법, 클라이언트 단말, 및 서버
CN111917773B (zh) 业务数据处理方法、装置和服务器
CN105262779B (zh) 身份认证方法、装置及系统
US10630488B2 (en) Method and apparatus for managing application identifier
US20090165107A1 (en) Identification managment system for electronic device authentication
US20140279519A1 (en) Method and system for obtaining and using identification information
TW201424324A (zh) 帳戶登入的方法及裝置
CN108876365A (zh) 一种生成区块发布机制的智能合约
WO2020215568A1 (fr) Procédé, appareil et système de changement de numéro de communication, dispositif informatique et support d'enregistrement
CN102782694A (zh) 用于数据安全设备的事务审计
WO2013184267A1 (fr) Sécurité d'authentification 2chk améliorée comportant des transactions d'interrogation
US10439809B2 (en) Method and apparatus for managing application identifier
CN102217280A (zh) 用户业务鉴权方法、系统及服务器
CN110163658A (zh) 虚拟资源数据处理方法、装置、计算机设备和存储介质
CN101944216A (zh) 双因子在线交易安全认证方法及系统
CN104125230A (zh) 一种短信认证服务系统以及认证方法
CN106487758B (zh) 一种数据安全签名方法、业务终端以及私钥备份服务器
TW201002025A (en) Method and system of using OTP dynamic password verification combined with a pay platform
KR20120030092A (ko) 휴대가능한 이용자 평판을 인에이블하기 위한 방법 및 디바이스
CN113474804A (zh) 数字货币的交易和账户验证方法,装置及存储介质
CN103428176A (zh) 移动用户访问移动互联网应用的方法、系统及应用服务器
KR20200041631A (ko) 법인 계좌의 간편 결제 서비스를 제공하는 장치 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18846118

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07.10.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18846118

Country of ref document: EP

Kind code of ref document: A1