WO2019041782A1 - 物品使用控制方法、验证设备、终端设备以及系统 - Google Patents
物品使用控制方法、验证设备、终端设备以及系统 Download PDFInfo
- Publication number
- WO2019041782A1 WO2019041782A1 PCT/CN2018/078917 CN2018078917W WO2019041782A1 WO 2019041782 A1 WO2019041782 A1 WO 2019041782A1 CN 2018078917 W CN2018078917 W CN 2018078917W WO 2019041782 A1 WO2019041782 A1 WO 2019041782A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- dynamic password
- terminal device
- shield
- item
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
Definitions
- Embodiments of the present invention relate to an article usage control method, a verification device, a terminal device, and a system.
- the item sharing service that temporarily transfers the right to use the item to the user has emerged through the Internet technology, and the idle item can be integrated and provided to the user in a time-sharing or segmented mode. Allow users to use items without paying higher costs, effectively use the resources of the items, avoid waste of goods, and provide green and environmentally friendly items. For example, shared bicycles, shared cars, and shared charging treasures that have emerged in recent years belong to such items. service.
- Embodiments of the present invention provide an item usage control method, a verification device, a terminal device, and a system, which can improve the security of use of shared items and improve user experience.
- an embodiment of the present invention provides an item usage control method, including: the verification device acquires a first dynamic password generated by a password shield connected to the terminal device; and the verification device verifies the first dynamic password; And the verification device performs an unlocking process on the item when the first dynamic password is verified.
- the first dynamic password is generated by the at least one of the identification information of the password shield and the identification information of the item.
- the first dynamic password is generated according to at least one of identification information of the password shield and identification information of the item and time information.
- the item uses a control method
- the method further includes: performing time synchronization with the password shield.
- the verifying the first dynamic password includes:
- Determining whether the first dynamic password passes verification by comparing the first dynamic password with the second dynamic password.
- the verification device is the terminal device; the method further includes: the terminal device separately sending an unlock request to the password shield and the server;
- the verification device acquires a first dynamic password generated by the password shield connected to the terminal device, including:
- the verification device determines a second dynamic password, including:
- the terminal device receives a second dynamic password that is sent by the server in response to the unlock request.
- the unlock request includes identification information of the item
- the method further includes: the terminal device acquiring identification information of the item,
- the verification device when the first dynamic password is authenticated, performs an unlocking process on the item, including: the terminal device sends first indication information to the server, where the first indication information indicates The first dynamic password is verified, and the first indication information is used by the server to unlock the item.
- the item uses a control method, and further includes:
- the terminal device acquires the identification information of the password shield and the user information corresponding to the terminal device;
- the password shield authentication request includes the identifier information of the password shield and the user information, and the password authentication request is used by the server to determine whether the identifier information of the password shield is Bind with the user information;
- the item uses a control method, and before the terminal device sends an unlock request to the password shield connected to the terminal device, the method further includes:
- biometric information input by the user and transmitting the biometric information to the server, the biometric information being used to perform the user identity authentication;
- the verification device is a server, and the verification device acquires a first dynamic password generated by the password shield connected to the terminal device, including: the server accepts the first dynamic password sent by the terminal device; and the verification And performing, by the device, the unlocking process on the item when the first dynamic password is verified, including: the server sending an unlocking instruction to the item by verifying in response to the first dynamic password.
- the verification device is a server
- the verifying, by the verification device, the first dynamic password includes: decoding the obtained first dynamic password according to an inverse rule of the dynamic password generation rule, to obtain a generated Determining whether the first dynamic password passes the verification by comparing the time information of the verification device with the time information of the first dynamic password.
- the item uses a control method, and further includes:
- the password shield authentication request includes identifier information of the password shield and user information corresponding to the terminal device;
- the password shield authentication success response is sent to the terminal device.
- the item usage control method further includes: acquiring biometric information of the user, wherein the biometric information is used for user identity authentication in response to a password shield loss request; performing the user identity authentication to verify the Whether the biometric information is consistent with the biometric information stored in the server.
- an embodiment of the present invention provides an item usage control method, including: determining, by a terminal device, a first dynamic password associated with a password shield connected to the terminal device; and transmitting, to the server, identifier information of the password shield and At least one of the identification information of the item and the first dynamic password.
- the terminal device determines a first dynamic password associated with the password shield connected to the terminal device, and the terminal device receives the first dynamic password sent by the password shield, where the first The dynamic password is generated by the at least one of the identification information of the password shield and the identification information of the item; or the terminal device generates the first dynamic password according to the identification information of the password shield.
- an embodiment of the present invention provides an item usage control method, including: generating, by a password shield connected to a terminal device, a first dynamic password; the terminal device acquiring the first dynamic password and transmitting the first a dynamic password; the server verifies the first dynamic password; and in the case that the first dynamic password passes verification, the server performs an unlocking process on the item.
- an embodiment of the present invention provides an item usage control method, including: a password shield connected to a terminal device generates a first dynamic password and a server generates a second dynamic password; and the terminal device acquires the first dynamic password And the second dynamic password; the terminal device verifies the first dynamic password according to the second dynamic password; and in the case that the first dynamic password passes the verification, the terminal device The item is unlocked.
- an embodiment of the present invention provides a verification apparatus, including: a communication device for implementing communication; a memory for storing an instruction; and a processor for operating by an instruction stored by the memory to The item use control method as described in any of the first aspect is performed.
- an embodiment of the present invention provides a terminal device, including: a communication device, configured to implement communication; a memory, configured to store an instruction; and a processor, configured to operate according to an instruction stored in the memory, to The item use control method according to the second aspect is performed.
- an embodiment of the present invention provides a system, comprising: the verification device according to any of the fifth aspects; and a password shield connected to the terminal device.
- FIG. 1 is a schematic flow chart of an item usage control method according to an embodiment of the present invention.
- FIG. 3 is a schematic block diagram of a verification device according to an embodiment of the present invention.
- FIG. 4 is a schematic block diagram of a terminal device according to an embodiment of the present invention.
- FIG. 5 is a schematic block diagram of a server according to an embodiment of the present invention.
- FIG. 6 is a schematic flow chart of another item usage control method according to an embodiment of the present invention.
- FIG. 7 is a schematic flow chart of still another item use control method according to an embodiment of the present invention.
- FIG. 8 is a schematic flow chart of still another item use control method according to an embodiment of the present invention.
- the overall concept of the embodiment is to provide an item usage control method.
- a password shield and a terminal device need to be used together.
- the password shield generates a dynamic password based on the unlock request, and the dynamic password is generated by using the password.
- the verification is performed, and the shared item can be unlocked for use by the user if the dynamic password verification is passed.
- the use of the shared item is realized by the combination of the password shield and the terminal device.
- the password shield is bound to the user information. If the terminal device is lost, if the password shield of the corresponding user is not available, the non-owner cannot use the password.
- the terminal device utilizes the owner identity to share the use of the item, thereby improving the security of the use of the shared item and avoiding unnecessary property damage.
- the lost password shield can also be reported for loss reporting failure, thereby further improving security.
- the use of password shields to generate dynamic passwords each password is used only once, effectively improving the security of shared items, for example, shared bicycle use.
- the item use control method provided by the embodiment of the present invention, as shown in FIG. 1 includes:
- the verification device acquires a first dynamic password generated by a password shield connected to the terminal device.
- the password shield can be physically connected to the terminal device, for example, directly connected to the terminal device by an interface that is plugged into the terminal device, such as a data interface, a power interface, a dedicated interface, or the like.
- the verification device verifies the first dynamic password.
- the verification device performs an unlocking process on the item when the first dynamic password is verified.
- the item is any item that can be used to transfer the usage right to the user for use by the user, for example, it can be a shared bicycle, a shared charging treasure, a shared car, and the like.
- each item may be assigned an identification, such as a unique identification, such that the same item may be distinguished or used to store information about the item in the server, the item identification may be unique The item number, serial number, string, item code or other item identification information identifying the item, and the like.
- a communication device, a storage area, and a control unit may be disposed in the item, in which the corresponding item identifier is stored, and the item identifier may be read from the storage area under the control of the control unit,
- the communication device transmits the identification so that the user equipment can acquire the identification.
- the item identification may be displayed on the item, for example, the item number, serial number, character string, item code, item QR code, and the like may be displayed at a portion of the item that is easily seen by the user, thereby The user can obtain the item identification or the user acquisition through the terminal device and input the item identification to the terminal device.
- each password shield has unique identification information, and different identification information of the password shield is different.
- the identification information of the password shield is bound to the corresponding user, that is, User information is bound.
- the first dynamic password is generated by the password shield based on the identification information of the password shield and/or the identification information of the item.
- the first dynamic password can be generated using the identification information of the password shield and/or the identification information of the item and the time information.
- the verification device verifies the first dynamic password, including:
- Determining whether the first dynamic password passes verification by comparing the first dynamic password with the second dynamic password.
- the second dynamic password may be generated using the same dynamic password generation rules as the first dynamic password.
- the second dynamic password and the first dynamic password are generated according to at least one of the identification information of the password shield and the identification information of the item and the same dynamic password generation rule.
- the second dynamic password and the first dynamic password may be generated according to the identification information of the password shield, using the same password rule, and the parameter used in generating the password rule is the identifier information of the password shield.
- the second dynamic password and the first dynamic password may also be generated according to the identification information of the item, using the same password rule, and the parameter utilized when the password rule is generated is the identification information of the item.
- the second dynamic password and the first dynamic password are generated according to the identifier information of the password shield and the identifier information of the item, using the same dynamic password generation rule, and the password generation rule is generated.
- Two parameters are used, which are the identification information of the password shield and the identification information of the item.
- the first dynamic password and the second dynamic password are generated by using the same password generation rule, and the parameter used in the password generation rule is the identification information of the password shield and/or the identification information of the item and the time information.
- the method further includes: performing time synchronization between the verification device and the password shield.
- the terminal device may perform time synchronization with the password shield.
- the terminal device may perform time synchronization with the password shield and the server, respectively.
- the time information used in the first dynamic password and the second dynamic password generation may be time information of the password shield and the server performing time synchronization.
- the process of time synchronization is described by using the password shield and the server respectively to generate the first dynamic password and the second dynamic password.
- the terminal device detects the password shield access terminal device
- the password shield is time synchronized with the server.
- the password shield and the server use the time when the time synchronization is performed as the time for calculating the dynamic password. information.
- the terminal device may perform time synchronization of the password shield and the server again after a period of time, for example, half an hour, one hour, etc., and the latest synchronization time is calculated by the password shield and the server when generating the dynamic password. Time information for dynamic passwords.
- the time information used in the generation of the first dynamic password and the second dynamic password may be current time information of the device that generates the first dynamic password and the second dynamic password.
- the time when the password shield generates the password is 17:30 on August 30, 2017, and the time when the server generates the dynamic password is also 17:30 on August 30, 2017, or only the year + month +
- the information of the day + hour, or the information of the year + month + day, or the information of the month + day + hour, for example, the information used for the calculation is 201708301730, 2017083017, 20170830, etc., and the embodiment of the present invention is not limited. Or, if you consider the delay of the signal, you can divide the time of 24 hours a day into many time periods.
- the information obtained is 201708303, 08303, etc.
- the verification device may be a terminal device
- the item usage control method according to the embodiment of the present invention further includes: the terminal device separately sending an unlock request to the password shield and the server.
- the obtaining, by the verification device, the first dynamic password generated by the password shield connected to the terminal device may include: the terminal device receiving the first dynamic password sent by the password shield in response to the unlock request.
- determining the second dynamic password may include: the verification device receiving a second dynamic password sent by the server in response to the unlock request.
- the second dynamic password may be used by the server to use the same dynamic password generation rule as the password shield, and according to the identification information of the password shield and/or the identification information of the item, or And generated according to at least one of the identification information of the password shield and the identification information of the item.
- the first and second dynamic passwords generated by the password shield and the server using the same dynamic password generation rule are sent to the terminal device for verification by the terminal device.
- the first dynamic password and the second dynamic password are consistent, the first dynamic password is verified. Conversely, if the first dynamic password and the second dynamic password are inconsistent, the first dynamic password is not. approved.
- the unlock request sent by the terminal device includes identification information of the item.
- the item usage control method according to the embodiment of the present invention further includes:
- the terminal device acquires identification information of the item.
- the terminal device may read the identification information such as the two-dimensional code displayed on the item, or the user may manually input the identification information such as the digital code displayed on the item on the terminal device.
- the manner in which the item identification information is obtained is not limited in any way, and any technique known to the inventors can be applied to the embodiment of the present invention.
- the identification information of the password shield may be sent when the terminal device sends the unlock request, or when the password shield performs the password shield authentication, as long as the identification information of the password shield can be obtained when the dynamic password is generated.
- the embodiments of the present invention are not limited thereto.
- the verification device when the first dynamic password passes the verification, performs an unlocking process on the item, including:
- the terminal device sends first indication information to the server, the first indication information indicates that the first dynamic password passes verification, and the first indication information is used by the server to unlock the item.
- the first indication information may be a message that the first dynamic password is sent by the terminal device, or an instruction for opening the lock sent by the terminal device, and after receiving the indication information, the server sends an unlocking instruction to the item corresponding to the identifier information. Unlock the item.
- the method for controlling the use of the item according to the embodiment of the present invention further includes: the terminal device acquiring the identification information of the password shield and the user information; and sending a password shield authentication request to the server,
- the password shield authentication request includes the identifier information and the user information, and accepts the password shield authentication response sent by the server, where the password shield authentication determines whether the identifier information is bound to the user information.
- the terminal device when the password shield is connected to the terminal device, the terminal device needs to verify whether the password shield belongs to the user who is logged in in the application of the currently used item of the terminal device, that is, whether the password shield needs to be verified with the currently logged-in user information.
- the bound password shield if not, does not respond to any request made by the current user in the current application, for example, a request to obtain item identification information and an unlock request, etc., if so, responding to the request issued by the user in the terminal device application .
- the item use control method may further include a step of verifying the biometric of the user, the item using the control method, connecting to the terminal at the terminal device Before the password Shield of the device sends the unlock request, the method may further include: acquiring biometric information input by the user, and sending the biometric information to the server, where the biometric information is used for performing the user identity authentication; The user identity authentication response sent by the server.
- the terminal device Before the terminal device acquires the identification information of the item or after the terminal device acquires the identification information of the item and before the terminal device sends an unlock request to the password shield connected to the terminal device, the terminal device itself or the instruction of the receiving server prompts the user. After inputting the biometric feature, the terminal device acquires the biometric information input by the user, for example, iris information, face information, fingerprint information, sound information, etc., and sends the biometric information to the server, where the server performs user identity authentication, and the authentication is passed. Or, the server will send a user identity authentication response to the terminal device.
- the biometric information input by the user for example, iris information, face information, fingerprint information, sound information, etc.
- the server performs user identity authentication, and the authentication is passed.
- the server will send a user identity authentication response to the terminal device.
- the authentication means that the biometric information currently input by the user is consistent with the biometric information of the user stored in the server, and the biometric information of the user stored in the server may be obtained when the user uses the terminal device to perform user registration or the user claims. Obtained when the password is shielded.
- the user biometric information stored in the server may be bound to at least one of the identification information and the user information of the password shield.
- the server sends a response to the user identity authentication to the terminal device, and the user can perform any operation in the terminal device.
- the server sends a response that the user identity authentication fails, so that the current user is not responding to the current application of the terminal device. Any request made.
- the verification device may be a server, S1100, the first dynamic password generated by the verification device to obtain the password shield connected to the terminal device may include: the server accepting the first dynamic sent by the terminal device a password; S1300, the verification device, when the first dynamic password is verified, performing the unlocking process on the item, the method may include: sending, by the server, the item to the item by verifying in response to the first dynamic password Unlock the command.
- the verifying the first dynamic password includes: determining a second dynamic password, where the second dynamic password is based on at least the identifier information of the password shield and the identifier information of the item. And generating, by the dynamic password generation rule, determining whether the first dynamic password passes verification by comparing the first dynamic password and the second dynamic password.
- the determining the second dynamic password may include: the server generating the second dynamic password in response to the unlock request sent by the terminal device.
- the verification device When the server is used as the verification device, the verification device is different from the verification device in that the server accepts the first dynamic password generated by the password shield sent by the terminal device, and the server itself generates the second dynamic password, and the server generates the second dynamic password and the server The dynamic password is compared. If the two are consistent, the first dynamic password is verified. If not, the first dynamic password verification fails. The rest of the same with the terminal device as the verification device will not be described here.
- the verification of the first dynamic password is performed by comparison with the second dynamic password.
- the verification of the first dynamic password may also be performed by using an inverse algorithm for generating the first dynamic password to obtain parameters of the first dynamic password generation.
- the verifying, by the verification device, the first dynamic password includes: decoding the obtained first dynamic password according to an inverse rule of the dynamic password generation rule, to obtain the generated Time information used by a dynamic password; determining whether the first dynamic password passes verification by comparing time information of the verification device with time information of the first dynamic password.
- the verification since the verification utilizes the time information, it is necessary to synchronize the time.
- the authentication device As a server as an example, it is necessary to synchronize the time of generating the password password of the first dynamic password with the server.
- the time synchronization process the time information utilized is the same as the above description, and for brevity, it will not be described here.
- the first dynamic password passes the verification, otherwise, the first dynamic password fails the verification.
- the following describes an item usage control method for performing a first dynamic password verification on the server in conjunction with FIG. 2, as shown in FIG. 2.
- control methods including:
- the terminal device sends an unlock request to the password shield.
- the unlocking request may include identification information of the password shield, or may include both identification information of the password shield and identification information of the item.
- the password shield After receiving the unlocking request, the password shield generates the first dynamic password according to at least one of the identification information of the password shield and the identification information of the item, and adopting a dynamic password generation rule.
- the password shield sends the generated first dynamic password to the terminal device.
- the terminal device sends the first dynamic password to the server.
- the terminal device server when the terminal device server sends the first dynamic password, the identifier information of the password shield and/or the identification information of the item may be simultaneously sent.
- the server After acquiring the first dynamic password, the server generates a second dynamic password according to at least one of the identifier information of the password shield and the identifier information of the item, and generates a second dynamic password by using the same dynamic password generation rule as the password shield. Verifying by a dynamic password, for example, comparing the first dynamic password with the second dynamic password, and if the two are consistent, the first dynamic password is verified;
- the identification information of the first dynamic password and the password shield and/or the identification information of the item may not be simultaneously sent in the same message.
- the identification information of the password shield may be sent to the server when the password shield authentication is performed, and the item is The identification information may be sent to the server after the terminal device obtains the information.
- the item use control method of the embodiment of the present invention when the user terminal device or the password shield is lost, the item cannot be used at this time, and the password shield can be reported for loss reporting.
- the item usage control method may further include: acquiring biometric information of the user, the biometric information being used for user identity authentication in response to a password shield loss request; performing the user identity Authentication to verify whether the biometric information is consistent with biometric information stored in the server.
- the user can log in to the application on another terminal device to perform a loss reporting operation.
- the terminal device itself or the server may prompt the user to input.
- the biometric feature after the terminal device obtains the biometric information input by the user, sends the biometric information to the server, and the server compares the biometric information with the biometric information stored in the server. If the two are consistent, the server responds to the user's report loss.
- the request may be, for example, the binding relationship between the identification information of the current password shield corresponding to the user information and the user information, so that the binding relationship does not exist, and the user uses the user terminal device or the password shield or the terminal device. And the password shield can not be used to operate the item.
- the user can apply for a new password shield at the nearest service point, and when the claim is made, the identification information of the new password shield can be bound with the user information.
- an item usage control method is provided.
- the combination of the password shield and the terminal device is used, and the dynamic password generated by the password shield is verified.
- the shared item can be unlocked for use by the user, thereby improving the security of the use of the item.
- the password shield is bound to the user information. If the terminal device is lost, if there is no password shield corresponding to the user, the non-operator cannot use the terminal device to use the owner identity to share the item, thereby Improve the security of shared items and avoid unnecessary property damage.
- the lost password shield can also be reported for loss reporting failure, thereby further improving security.
- the use of password shields to generate dynamic passwords each password is used only once, effectively improving the security of shared items, for example, shared bicycle use.
- a verification device is further provided, as shown in FIG. 3, comprising: a communication device for implementing communication; a memory for storing instructions; and a processor for controlling an instruction stored by the memory An operation is performed to execute the item use control method as described in any of the embodiments.
- the verification device may be a terminal device or may be a server.
- the terminal device may be a smart terminal or a wearable smart device
- the smart terminal may be a mobile phone, a palmtop computer, a tablet computer, etc.
- the wearable smart device may be a smart watch, a smart bracelet or a smart jewelry. Wait.
- the terminal device can be as shown in FIG. 4, and can include a processor 6100, a memory 6200, an interface device 6300, a communication device 6400, a display device 6500, an input device 6600, a speaker 6700, a microphone 6800, and the like.
- the processor 6100 may be a central processing unit CPU, a microprocessor MCU, or the like.
- the memory 6200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
- the interface device 6300 includes, for example, a USB interface, a headphone jack, and the like.
- the communication device 6400 can at least perform short-range communication, such as at least one of Bluetooth communication, NFC communication, UWB communication, WiFi communication, ZigBee communication, infrared communication, and acoustic communication, and can also perform other wired or wireless communication, such as 2G. /3G/4G/5G communication or LAN communication.
- the display device 6500 is, for example, a liquid crystal display, a touch display, or the like.
- Input device 6600 can include, for example, a touch screen, a keyboard, a somatosensory input, and the like. The user can input/output voice information through the speaker 6700 and the microphone 6800.
- the terminal device 6000 illustrated in Figure 4 is merely illustrative and is in no way meant to limit the invention, its application or use.
- the memory 6200 of the terminal device 6000 is configured to store an instruction for controlling the processor 6100 to perform an operation of the item usage control according to any one of the methods provided by the embodiments of the present invention. method.
- the present invention may relate only to some of the devices, for example, the terminal device 6000 relates to the processor 6100 and the storage device 6200 and the communication device. 6400.
- a technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
- the terminal device 6000 can be implemented in various ways.
- the terminal device 6000 can be implemented by an instruction configuration processor.
- the instructions may be stored in the ROM, and when the device is booted, the instructions are read from the ROM into the programmable device to implement the item usage control device.
- the item can be cured into a dedicated device (eg, an ASIC) using a control device.
- the terminal device 6000 can be divided into mutually independent units, or they can be implemented together.
- the terminal device 6000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
- the terminal device may further include an information acquisition device, such as a camera or the like, to acquire an item identification of the item.
- an information acquisition device such as a camera or the like
- the terminal device of this embodiment may further include: an acquiring unit, configured to collect biometric features of the user.
- the terminal device of this embodiment may further include: an encoding unit, configured to encode the biometric information.
- the collecting unit of the terminal device of the embodiment may be a microphone 3800 to acquire a sound feature of the user; and may be a fingerprint input device, for example, an input device 3600, to acquire a fingerprint of the user; and may also be a face/iris recognition Device to capture the user's face/iris features.
- the server may be a computer group composed of, for example, a blade server, a computer, or a plurality of computers, or may be a cloud server.
- the server may include a processor 7100, a memory 7200, an interface device 7300, a communication device 7400, a display device 7500, and an input device 7600, as shown in FIG.
- the processor 7100 can be, for example, a central processing unit CPU, a microprocessor MCU, or the like.
- the memory 7200 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a nonvolatile memory such as a hard disk, and the like.
- the interface device 7300 includes, for example, a USB interface, a serial interface, and the like.
- the communication device 7400 can perform, for example, wired or wireless communication.
- the display device 7500 is, for example, a liquid crystal display.
- Input device 7600 can include, for example, a touch screen, a keyboard, and the like.
- the server shown in Figure 5 is merely illustrative and is in no way meant to limit the invention, its application or use.
- the memory 7200 of the server 7000 is configured to store instructions for controlling the processor 7100 to operate to perform an item usage control method provided by an embodiment of the present invention.
- server 7000 may relate only to some of the devices therein, for example, server 7000 only relates to processor 7100 and storage device 7200.
- a technician can design instructions in accordance with the disclosed aspects of the present invention. How the instructions control the processor for operation is well known in the art and will not be described in detail herein.
- server 7000 can be implemented in a variety of ways.
- server 7000 can be implemented by an instruction configuration processor.
- the instructions may be stored in the ROM, and when the device is booted, the instructions are read from the ROM into the programmable device to implement the item usage control device.
- the item can be cured into a dedicated device (eg, an ASIC) using a control device.
- the server 7000 can be divided into mutually independent units, or they can be combined and implemented.
- the server 7000 may be implemented by one of the various implementations described above, or may be implemented by a combination of two or more of the various implementations described above.
- an item usage control method is provided, as shown in FIG. 6, including:
- the terminal device determines a first dynamic password associated with a password shield connected to the terminal device;
- S2200 Send at least one of the identification information of the password shield and the identification information of the item to the server and the first dynamic password.
- the terminal device determines a first dynamic password associated with the password shield connected to the terminal device, including:
- the terminal device Receiving, by the terminal device, the first dynamic password that is sent by the password shield, where the first dynamic password is generated by the password shield according to at least one of identifier information of the password shield and identification information of the item.
- the terminal device generates the first dynamic password according to the identifier information of the password shield.
- the first dynamic password may be generated by the terminal device or generated by the terminal device by the password shield.
- the first dynamic password may also be sent to the server after being acquired by the terminal device.
- the terminal device may perform the first dynamic password verification.
- the server may generate the second dynamic password by using the same password generation rule and send the second dynamic password to the terminal device, where the terminal device compares the first dynamic password with the second dynamic password. If the agreement is the same, the first dynamic password is verified. Otherwise, the first dynamic password fails to pass the verification.
- the server may perform the first dynamic password verification, and after the server receives the first dynamic password sent by the terminal device, the second dynamic password is generated by using the same password generation rule, and then the server compares the first and the first. Two dynamic passwords, if the two are consistent, the first dynamic password passes the verification; otherwise, the first dynamic password fails the verification.
- the server obtains the time information used in the first dynamic password generation by using an inverse algorithm for generating the first dynamic password, and compares the time information with the time information of the server itself, if both If the first dynamic password is consistent, the first dynamic password fails to pass the verification.
- a terminal device including:
- a communication device for implementing communication
- a memory for storing instructions
- the terminal device of this embodiment may further include: an acquiring unit, configured to collect biometric features of the user.
- the terminal device of this embodiment may further include: an encoding unit, configured to encode the biometric information.
- the terminal device may be as shown in FIG. 4, and may refer to the first embodiment, and details are not described herein.
- an item usage control method is provided, as shown in FIG. 7, comprising:
- S3100 The password shield connected to the terminal device generates a first dynamic password
- S3200 The terminal device acquires the first dynamic password and sends the first dynamic password to a server.
- an item usage control method is provided, as shown in FIG. 8, including:
- the password shield connected to the terminal device generates a first dynamic password and the server generates a second dynamic password.
- S8200 The terminal device acquires the first dynamic password and the second dynamic password.
- the terminal device verifies the first dynamic password according to the second dynamic password
- a system comprising: the verification device as described in any of the first embodiments; and a password shield connected to the terminal device.
- an exemplary description of the verification device may refer to the first embodiment, and details are not described herein.
- the password shield can include a microprocessor for generating a first dynamic password based on the password generation rules.
- the password shield may be any device that can generate a password, which is not limited by the embodiment of the present invention.
- the password shield can be directly connected to the terminal device through an interface to enable communication with the device.
- the interface may be a USB interface or a serial port, etc., which is not limited by the embodiment of the present invention.
- Embodiments of the present invention provide an item usage control method, a verification apparatus, a terminal apparatus, and a system, and may have at least one of the following beneficial effects:
- the password shield is combined with the terminal device. Before unlocking, the password shield generates the first dynamic password. When the first dynamic password is verified, the item can be unlocked and the user account is enhanced. The security enhances the security of shared items and avoids unnecessary account losses.
- the password shield can be reported for loss reporting.
- the report is lost, the user's biometric information needs to be verified, which further improves the security of the shared item.
- the invention can be a system, method and/or computer program product.
- the computer program product can comprise a computer readable storage medium having computer readable program instructions embodied thereon for causing a processor to implement various aspects of the present invention.
- the computer readable storage medium can be a tangible device that can hold and store the instructions used by the instruction execution device.
- the computer readable storage medium can be, for example , but not limited to , an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
- Non-exhaustive list of computer readable storage media include: portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM) Or flash memory), static random access memory (SRAM), portable compact disk read only memory (CD-ROM), digital versatile disk (DVD), memory stick, floppy disk, mechanical encoding device, for example, with instructions stored thereon A raised structure in the hole card or groove, and any suitable combination of the above.
- a computer readable storage medium as used herein is not to be interpreted as a transient signal itself, such as a radio wave or other freely propagating electromagnetic wave, an electromagnetic wave propagating through a waveguide or other transmission medium (eg, a light pulse through a fiber optic cable), or through a wire The electrical signal transmitted.
- the computer readable program instructions described herein can be downloaded from a computer readable storage medium to various computing/processing devices or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network.
- the network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers, and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in each computing/processing device .
- Computer program instructions for performing the operations of the present invention may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine related instructions, microcode, firmware instructions, state setting data, or in one or more programming languages.
- the computer readable program instructions can execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer, partly on the remote computer, or entirely on the remote computer or server. carried out.
- the remote computer can be connected to the user's computer through any kind of network, including a local area network (LAN) or wide area network (WAN), or can be connected to an external computer (eg, using an Internet service provider to access the Internet) connection).
- the customized electronic circuit such as a programmable logic circuit, a field programmable gate array (FPGA), or a programmable logic array (PLA), can be customized by utilizing state information of computer readable program instructions.
- Computer readable program instructions are executed to implement various aspects of the present invention.
- the computer readable program instructions can be provided to a general purpose computer, a special purpose computer, or a processor of other programmable data processing apparatus to produce a machine such that when executed by a processor of a computer or other programmable data processing apparatus Means for implementing the functions/acts specified in one or more of the blocks of the flowcharts and/or block diagrams.
- the computer readable program instructions can also be stored in a computer readable storage medium that causes the computer, programmable data processing device, and/or other device to operate in a particular manner, such that the computer readable medium storing the instructions includes An article of manufacture that includes instructions for implementing various aspects of the functions/acts recited in one or more of the flowcharts.
- the computer readable program instructions can also be loaded onto a computer, other programmable data processing device, or other device to perform a series of operational steps on a computer, other programmable data processing device or other device to produce a computer-implemented process.
- instructions executed on a computer, other programmable data processing apparatus, or other device implement the functions/acts recited in one or more of the flowcharts and/or block diagrams.
- each block of the flowchart or block diagrams can represent a module, a program segment, or a portion of an instruction that includes one or more Executable instructions.
- the functions noted in the blocks may also occur in a different order than those illustrated in the drawings. For example, two consecutive blocks may be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending upon the functionality involved.
- each block of the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented in a dedicated hardware-based system that performs the specified function or action. Or it can be implemented by a combination of dedicated hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, implementation by software, and implementation by a combination of software and hardware are equivalent.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
一种物品使用控制方法、验证设备、终端设备以及系统,能够提升共享物品使用的安全性,提升用户体验。该物品使用控制方法,包括:验证设备获取连接到终端设备的密码盾生成的第一动态密码(S1100);所述验证设备对所述第一动态密码进行验证(S1200);以及所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理(S1300)。
Description
本发明的实施例涉及一种物品使用控制方法、验证设备、终端设备以及系统。
随着互联网技术和设备制造技术的飞速发展,通过互联网技术使得具有物品使用权暂时转移至用户的物品共享服务应运而生,可以将闲散物品整合以分时或者分段的模式提供给用户使用,让用户不必付出较高成本就能使用物品,有效利用物品资源,避免物品浪费,提供绿色环保的物品使用服务,例如,近年来兴起的共享自行车、共享汽车、共享充电宝都属于这类物品共享服务。
但是,目前的物品共享服务中,例如共享单车服务中,存在一定的安全问题:手机丢失后,被别人捡到后依旧可以实现扫码借车,带来的问题是使用失主身份使用自行车,当自行车受到损坏时,失主钱财信用受到损失。
目前需要一种实现共享物品使用,例如,共享单车使用的新方法,能够解决共享物品使用存在的安全漏洞问题,提升共享物品使用的安全性。
发明内容
本发明的实施例提供一种物品使用控制方法、验证设备、终端设备以及系统,能够提升共享物品使用的安全性,提升用户体验。
第一方面,本发明的实施例提供一种物品使用控制方法,包括:验证设备获取连接到终端设备的密码盾生成的第一动态密码;所述验证设备对所述第一动态密码进行验证;以及所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理。
例如,所述第一动态密码是所述密码盾根据所述密码盾的标识信息和所述物品的标识信息中的至少一项生成的。
例如,所述第一动态密码是根据所述密码盾的标识信息和所述物品的标识信息中的至少一种以及时间信息生成的。
例如,该物品使用控制方法,在所述验证设备获取连接到终端设备的密 码盾生成的第一动态密码之前,还包括:与所述密码盾进行时间同步。
例如,所述对所述第一动态密码进行验证,包括:
确定第二动态密码,其中,所述第二动态密码是利用与所述第一动态密码相同的动态密码生成规则生成的;
通过比较所述第一动态密码和所述第二动态密码,确定所述第一动态密码是否通过验证。
例如,所述验证设备为所述终端设备;所述方法还包括:所述终端设备向所述密码盾和服务器分别发送开锁请求;
所述验证设备获取连接到终端设备的密码盾生成的第一动态密码,包括:
所述终端设备接收所述密码盾响应于所述开锁请求发送的第一动态密码;
所述验证设备确定第二动态密码,包括:
所述终端设备接收服务器响应于所述开锁请求发送的第二动态密码。
例如,所述开锁请求包含所述物品的标识信息;
例如,所述方法还包括:所述终端设备获取所述物品的标识信息,
其中所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理,包括:所述终端设备向所述服务器发送第一指示信息,所述第一指示信息指示所述第一动态密码通过验证,并且所述第一指示信息用于所述服务器对所述物品进行开锁。
例如,该物品使用控制方法,还包括:
所述终端设备获取所述密码盾的标识信息以及所述终端设备对应的用户信息;
向所述服务器发送密码盾认证请求,所述密码盾认证请求包括所述密码盾的标识信息以及所述用户信息,所述密码顿认证请求用于所述服务器确定所述密码盾的标识信息是否与所述用户信息绑定;
接受服务器发送的所述密码盾认证成功响应。
例如,该物品使用控制方法,在所述终端设备向连接到所述终端设备的密码盾发送开锁请求之前,还包括:
获取所述用户输入的生物特征信息且向所述服务器发送所述生物特征信息,所述生物特征信息用于进行所述用户身份认证;以及
接受所述服务器发送的所述用户身份认证响应。
例如,所述验证设备为服务器,所述验证设备获取连接到终端设备的密码盾生成的第一动态密码,包括:所述服务器接受所述终端设备发送的所述第一动态密码;所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理,包括:所述服务器响应于所述第一动态密码通过验证向所述物品发送解锁指令。
例如,所述验证设备为服务器,其中所述验证设备对所述第一动态密码进行验证包括:对获取的所述第一动态密码根据所述动态密码生成规则的反规则进行解码,以获取生成所述第一动态密码所利用的时间信息;通过比较所述验证设备的时间信息和所述第一动态密码的时间信息,确定所述第一动态密码是否通过验证。
例如,该物品使用控制方法,还包括:
接受所述终端设备发送的密码盾认证请求,所述密码盾认证请求包括所述密码盾的标识信息以及所述终端设备对应的用户信息;
响应于所述密码盾认证请求进行所述密码盾认证,以判断所述密码盾的标识信息是否与所述用户信息绑定;
在确定所述密码盾的标识信息与所述用户信息绑定的情况下,向所述终端设备发送密码盾认证成功响应。
例如,该物品使用控制方法,还包括:获取所述用户的生物特征信息,所述生物特征信息用于响应于密码盾挂失请求而进行用户身份认证;进行所述用户身份认证,以验证所述生物特征信息与所述服务器中存储的生物特征信息是否一致。
第二方面,本发明的实施例提供一种物品使用控制方法,包括:终端设备确定与连接到所述终端设备的密码盾关联的第一动态密码;向服务器发送所述密码盾的标识信息和所述物品的标识信息中的至少一项以及所述第一动态密码。
例如,所述终端设备确定与连接到所述终端设备的密码盾关联的第一动态密码,包括:所述终端设备接收所述密码盾发送的所述第一动态密码,其中,所述第一动态密码是所述密码盾根据密码盾的标识信息和所述物品的标识信息中的至少一项生成的;或者所述终端设备根据所述密码盾的标识信息,生成所述第一动态密码。
第三方面,本发明的实施例一种物品使用控制方法,包括:连接到终端 设备的密码盾生成第一动态密码;所述终端设备获取所述第一动态密码并向服务器发送所述第一动态密码;所述服务器对所述第一动态密码进行验证;以及在所述第一动态密码通过验证的情况下,所述服务器对所述物品进行解锁处理。
第四方面,本发明的实施例提供一种物品使用控制方法,包括:连接到终端设备的密码盾生成第一动态密码并且服务器生成第二动态密码;所述终端设备获取所述第一动态密码和所述第二动态密码;所述终端设备根据所述第二动态密码,对所述第一动态密码进行验证;以及在所述第一动态密码通过验证的情况下,所述终端设备对所述物品进行解锁处理。
第五方面,本发明的实施例提供一种验证设备,包括:通信装置,用于实施通信;存储器,用于存储指令;处理器,用于受控于所述存储器存储的指令进行操作,以执行如第一方面中任意所述的物品使用控制方法。
第六方面,本发明的实施例提供一种终端设备,包括:通信装置,用于实施通信;存储器,用于存储指令;处理器,用于受控于所述存储器存储的指令进行操作,以执行如第二方面所述的物品使用控制方法。
第七方面,本发明的实施例提供一种系统,包括:如第五方面任意所述的验证设备;以及密码盾,连接到终端设备。
为了更清楚地说明本发明实施例的技术方案,下面将对实施例的附图作简单地介绍,显而易见地,下面描述中的附图仅仅涉及本发明的一些实施例,而非对本发明的限制。
图1是根据本发明实施例的物品使用控制方法的示意性流程图;
图2是根据本发明实施例的物品使用控制方法的交互流程图;
图3是根据本发明实施例的验证设备的示意性框图;
图4是根据本发明实施例的终端设备的示意性框图;
图5是根据本发明实施例的服务器的示意性框图;以及
图6是根据本发明实施例的另一物品使用控制方法的示意性流程图;
图7是根据本发明实施例的再一物品使用控制方法的示意性流程图;以及
图8是根据本发明实施例的又一物品使用控制方法的示意性流程图。
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例的附图,对本发明实施例的技术方案进行清楚、完整地描述。显然,所描述的实施例是本发明的一部分实施例,而不是全部的实施例。基于所描述的本发明的实施例,本领域普通技术人员在无需创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。
除非另外定义,此处使用的技术术语或者科学术语应当为本发明所属领域内具有一般技能的人士所理解的通常意义。本公开中使用的“第一”、“第二”以及类似的词语并不表示任何顺序、数量或者重要性,而只是用来区分不同的组成部分。同样,“一个”、“一”或者“该”等类似词语也不表示数量限制,而是表示存在至少一个。“包括”或者“包含”等类似的词语意指出现该词前面的元件或者物件涵盖出现在该词后面列举的元件或者物件及其等同,而不排除其他元件或者物件。“连接”或者“相连”等类似的词语并非限定于物理的或者机械的连接,而是可以包括电性的连接,不管是直接的还是间接的。“上”、“下”、“左”、“右”等仅用于表示相对位置关系,当被描述对象的绝对位置改变后,则该相对位置关系也可能相应地改变。
<第一实施例>
本实施例的总体构思,是提供一种物品使用控制方法,在使用共享物品的时候,需要将密码盾和终端设备结合使用,该密码盾基于开锁请求而生成一动态密码,通过对该动态密码进行验证,在该动态密码验证通过的情况下,该共享物品才可解锁供用户使用。通过密码盾和终端设备结合使用而实现共享物品的使用,该密码盾是与用户信息绑定的,在终端设备丢失的情况下,如果没有对应用户的密码盾,非机主无法采用捡到的终端设备利用机主身份进行共享物品的使用,从而提升了共享物品使用的安全性,避免不必要的财产损失。而且在密码盾和/或终端设备丢失的情况下,还可以对该丢失的密码盾进行挂失失效处理,进一步提升安全性。此外,采用密码盾生成动态密码,每个密码只使用一次,有效提高了共享物品,例如,共享单车使用的安全性。
本发明实施例提供的物品使用控制方法,如图1所示,包括:
S1100,验证设备获取连接到终端设备的密码盾生成的第一动态密码。
例如,密码盾可以物理连接到终端设备,例如,可以通过插接到终端设 备的接口,例如,数据接口、电源接口、专用接口等而与终端设备直接连接。
S1200,所述验证设备对所述第一动态密码进行验证。
S1300,所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理。
在本实施例中,物品是任何可以将使用权分时或分段转移给用户以供用户使用的物品,例如,可以是共享自行车、共享充电宝、共享汽车等物品。
备选地,每个物品可以被分配一标识,例如,唯一的标识,从而可以将同种物品之间区别开来,或者用来在服务器中存储该物品的相关信息,该物品标识可以是唯一标识该物品的物品编号、序列号、字符串、物品代码或其他物品标识信息等等。
备选地,还可以在物品中设置通信装置、存储区以及控制单元,在所述存储区中存储有对应的物品标识,在控制单元的控制下可以从存储区中读取该物品标识,通过通信装置发送该标识,使得用户设备可以获取该标识。
备选地,可以在物品上展示该物品标识,例如,可以在物品的容易被用户看到的部位展示其物品编号、序列号、字符串、物品代码、物品二维码等其他物品标识,从而用户通过终端设备能够获取该物品标识或者用户获取而向终端设备输入该物品标识。
在本实施例中,每个密码盾具有唯一的标识信息,不同的密码盾的标识信息不同,当用户领取密码盾时,该密码盾的标识信息被绑定到对应的用户,也就是,与用户信息进行绑定。
在一个例子中,第一动态密码是所述密码盾根据所述密码盾的标识信息和/或所述物品的标识信息生成的。
在另一个例子中,第一动态密码可以采用密码盾的标识信息和/或所述物品的标识信息以及时间信息而生成。
在一个例子中,S1200,所述验证设备对所述第一动态密码进行验证,包括:
确定第二动态密码;
通过比较所述第一动态密码和所述第二动态密码,确定所述第一动态密码是否通过验证。
可选地,第二动态密码可以是利用与第一动态密码相同的动态密码生成规则生成的。
备选地,所述第二动态密码和所述第一动态密码是根据所述密码盾的标识信息和所述物品的标识信息中的至少一项以及相同的动态密码生成规则生成的。
备选地,所述第二动态密码和所述第一动态密码可以根据所述密码盾的标识信息、采用相同的密码规则生成,该密码规则生成时所利用的参数是密码盾的标识信息。
备选地,所述第二动态密码和所述第一动态密码还可以根据所述物品的标识信息、采用相同的密码规则生成,该密码规则生成时所利用的参数是物品的标识信息。
备选地,所述第二动态密码和所述第一动态密码是根据所述密码盾的标识信息和所述物品的标识信息二者、采用相同的动态密码生成规则生成的,该密码生成规则采用两个参数,分别为密码盾的标识信息和所述物品的标识信息。
备选地,第一动态密码和第二动态密码是采用相同的密码生成规则生成的,密码生成规则中采用的参数为密码盾的标识信息和/或所述物品的标识信息以及时间信息。
示例性地,在第一动态密码和第二动态密码分别由不同的设备生成的情况下,为了保证第一动态密码和第二动态密码生成时所采用的时间信息是一致的,在所述密码盾生成所述第一动态密码以及确定所述第二动态密码之前,还包括:验证设备与密码盾进行时间同步。
可选地,如果验证设备为终端设备,则终端设备可以与密码盾进行时间同步。
可选地,如果验证设备为服务器,则该终端设备可以分别与所述密码盾和服务器进行时间同步。
示例性地,第一动态密码和第二动态密码生成时采用的时间信息可以是密码盾和服务器进行时间同步时的时间信息。例如,以密码盾和服务器分别生成第一动态密码和第二动态密码为例对时间同步的过程进行说明,当终端设备侦测密码盾接入终端设备后,立刻将密码盾与服务器进行时间同步为当前时刻,并告知服务器同步的时间就是密码生成的时间信息,则在后续生成第一动态密码和第二动态密码时,密码盾和服务器均采用进行时间同步时的时刻作为计算动态密码的时间信息。
备选地,该终端设备可以经过一段时间,例如,半个小时、1个小时等,再次进行密码盾和服务器的时间同步,密码盾和服务器生成动态密码时均将最近一次的同步时间作为计算动态密码的时间信息。
备选地,第一动态密码和第二动态密码生成时采用的时间信息可以是生成第一动态密码和第二动态密码的设备当前的时刻信息。例如,密码盾生成密码的时刻是2017年8月30日17时30分,而服务器生成动态密码采用的时刻也是2017年8月30日17时30分,或者也只采用其中的年+月+日+小时的信息,或者采用年+月+日的信息,或者月+日+小时的信息等,例如,计算是用到的信息为201708301730、2017083017、20170830等,本发明的实施例并不限定;或者如果考虑信号的延迟在内,可以将一天24小时的时间分成许多时间段,例如,可以以四个小时为单位分成6个时间段,从1-6顺序编号,当前时刻处于哪个时间段就采用哪个时间段的编号,例如,上午9时为三个时间段,编号为3,可以利用年+月+日+时间段、或者月+日+时间段的时间信息,如,计算是用到的信息为201708303、08303等。
在一个例子中,该验证设备可以是终端设备,根据本发明实施例的物品使用控制方法还包括:所述终端设备向所述密码盾和服务器分别发送开锁请求。
进一步地,S1100,所述验证设备获取连接到终端设备的密码盾生成的第一动态密码可以包括:所述终端设备接收所述密码盾响应于所述开锁请求发送的第一动态密码。
进一步地,确定第二动态密码可以包括:所述验证设备接收服务器响应于所述开锁请求发送的第二动态密码。
例如,在终端设备为验证设备的情况下,第二动态密码可以由服务器利用与密码盾相同的动态密码生成规则,且根据所述密码盾的标识信息和/或所述物品的标识信息,或者根据密码盾的标识信息和所述物品的标识信息中的至少一项和时间信息生成的。
密码盾和服务器利用相同的动态密码生成规则生成的第一和第二动态密码均发送到终端设备,由终端设备进行验证。
例如,在本发明实施例中,如果第一动态密码和第二动态密码一致则第一动态密码便通过验证,相反地,如果第一动态密码和第二动态密码不一致则第一动态密码便没有通过验证。
备选地,所述终端设备发送的开锁请求包含所述物品的标识信息。
进一步地,根据本发明实施例的物品使用控制方法,还包括:
所述终端设备获取所述物品的标识信息。
例如,所述终端设备可以读取所述物品上展示的二维码等标识信息、或者用户可以在终端设备上手动输入所述物品上展示的数字编码等标识信息,本发明实施例对终端设备获取物品标识信息的方式不进行任何限定,任何发明人已知的技术都可以应用于本发明的实施例。
备选地,密码盾的标识信息可以在所述终端设备发送开锁请求时发送,或者,密码盾进行密码盾认证的时候发送,只要在生成动态密码的时候能够对得到密码盾的标识信息即可,本发明的实施例并不对此进行限定。
进一步地,所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理,包括:
所述终端设备向所述服务器发送第一指示信息,所述第一指示信息指示所述第一动态密码通过验证,并且所述第一指示信息用于所述服务器对所述物品进行开锁。
例如,第一指示信息可以是终端设备发送的第一动态密码通过验证的消息,或者终端设备发送的打开车锁的指令,服务器收到该指示信息后便向对应标识信息的物品发送开锁指令,解锁所述物品。
进一步地,为了提升物品使用的安全性,根据本发明实施例的物品使用控制方法还包括:所述终端设备获取所述密码盾的标识信息以及用户信息;向所述服务器发送密码盾认证请求,所述密码盾认证请求包括所述标识信息以及所述用户信息,接受服务器发送的所述密码盾认证响应,其中在所述密码盾认证中,判断所述标识信息是否与所述用户信息绑定。
示例性地,当密码盾连接到终端设备时,终端设备要验证该密码盾是否属于终端设备的当前使用物品的应用中登录的用户,也就是,需要验证密码盾是否是与当前登录的用户信息绑定的密码盾,如果不是,则不响应当前用户在当前应用中发出的任何请求,例如,获取物品标识信息的请求以及开锁请求等,如果是,才响应用户在终端设备应用中发出的请求。
备选地,为了进一步提升安全性,根据本发明实施例的物品使用控制方法还可以加入识别用户的生物特征而验证的步骤,该物品使用控制方法,在所述终端设备向连接到所述终端设备的密码盾发送开锁请求之前,还可以包 括:获取所述用户输入的生物特征信息且向所述服务器发送所述生物特征信息,所述生物特征信息用于进行所述用户身份认证;以及接受所述服务器发送的所述用户身份认证响应。
例如,在终端设备获取物品的标识信息之前或者在终端设备获取物品的标识信息之后且在终端设备向连接到所述终端设备的密码盾发送开锁请求之前,终端设备本身或者接受服务器的指示提示用户输入生物特征,终端设备获取用户输入的生物特征信息,例如,虹膜信息、人脸信息、指纹信息、声音信息等后,将该生物特征信息发送到服务器,所述服务器进行用户身份认证,认证通过或者通不过,服务器都会向终端设备发送用户身份认证响应。
例如,认证通过指的是用户当前输入的生物特征信息与服务器中存储的用户生物特征信息一致,服务器中存储的用户生物特征信息可以是用户采用该终端设备进行用户注册时获取的或者用户申领密码盾时获取的。服务器中存储的用户生物特征信息可以与密码盾的标识信息和用户信息至少之一绑定。这种情况下,服务器会向终端设备发送用户身份认证通过的响应,用户可以在终端设备中进行任何操作。
相反地,如果用户当前输入的生物特征信息与服务器中存储的用户生物特征信息不一致,服务器会向终端设备发送用户身份认证未通过的响应,这样,将不响应当前用户在终端设备的当前应用中发出的任何请求。
在一个例子中,该验证设备可以是服务器,S1100,所述验证设备获取连接到终端设备的密码盾生成的第一动态密码可以包括:所述服务器接受所述终端设备发送的所述第一动态密码;S1300,所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理,可以包括:所述服务器响应于所述第一动态密码通过验证向所述物品发送解锁指令。
进一步地,S1200,对所述第一动态密码进行验证,包括:确定第二动态密码,其中,所述第二动态密码是根据所述密码盾的标识信息和所述物品的标识信息中的至少一项以及所述动态密码生成规则生成的;通过比较所述第一动态密码和所述第二动态密码,确定所述第一动态密码是否通过验证。
例如,所述确定第二动态密码,可以包括:所述服务器响应于所述终端设备发送的开锁请求生成所述第二动态密码。
服务器作为验证设备时,与验证设备是终端设备不同之处在于:服务器接受终端设备发送的密码盾生成的第一动态密码,且服务器本身生成第二动 态密码,服务器对第一动态密码和第二动态密码进行比较,如果二者一致,则第一动态密码验证通过,如果不一致,则第一动态密码验证未通过。其余与终端设备作为验证设备时的相同之处这里将不再进行赘述。
以上的示例中,第一动态密码的验证是采用与第二动态密码的比较而进行的。备选地,本发明的实施例中,第一动态密码的验证还可以采用:利用生成第一动态密码的反算法来获取第一动态密码生成时的参数的方式来进行验证。
在一个例子中,S1200,所述验证设备对所述第一动态密码进行验证包括:对获取的所述第一动态密码根据所述动态密码生成规则的反规则进行解码,以获取生成所述第一动态密码所利用的时间信息;通过比较所述验证设备的时间信息和所述第一动态密码的时间信息,确定所述第一动态密码是否通过验证。
这里需要注意的是,与上文描述的相同,由于验证利用到了时间信息,因此需要对时间进行同步。以验证设备为服务器为例,需要对生成第一动态密码的密码盾和服务器的时间进行同步。时间同步的过程,所利用的时间信息与上面的描述相同,为了简洁,这里将不进行赘述。
在这种情况下,如果验证设备的时间信息和所述第一动态密码生成时的时间信息是一致的,则第一动态密码通过验证,否则,第一动态密码未通过验证。
下面结合附图2,对服务器进行第一动态密码验证的物品使用控制方法进行示例性说明,如图2所示。
该物品使用控制方法,包括:
S501,终端设备向密码盾发送解锁请求;
例如,该解锁请求中可以包括密码盾的标识信息,或者可以包括密码盾的标识信息和物品的标识信息二者。
S502,密码盾接受到解锁请求后,根据所述密码盾的标识信息和所述物品的标识信息中的至少一项、且采用动态密码生成规则生成第一动态密码;
S503,密码盾将生成的第一动态密码向终端设备发送;
S504,终端设备向服务器发送该第一动态密码;
例如,终端设备服务器发送该第一动态密码时,可以同时发送密码盾的标识信息和/或物品的标识信息。
S505,服务器获取第一动态密码后,根据所述密码盾的标识信息和所述物品的标识信息中的至少一项以及采用与密码盾相同的动态密码生成规则生成第二动态密码,然后对第一动态密码进行验证,例如,比较第一动态密码和第二动态密码,如果二者一致,则第一动态密码验证通过;
S506,第一动态密码验证通过后,服务器向物品发送开锁指令;
S507,物品被解锁。
示例性地,第一动态密码和密码盾的标识信息和/或物品的标识信息可以不是同一条消息中同时发送,例如,密码盾的标识信息可以在进行密码盾认证时发送到服务器,物品的标识信息可以是终端设备获取后便向服务器发送。
备选地,对于本发明实施例的物品使用控制方法,当用户终端设备或者密码盾丢失后,此时无法使用物品,可以进行密码盾的挂失处理。
例如,根据本发明实施例的物品使用控制方法,还可以包括:获取所述用户的生物特征信息,所述生物特征信息用于响应于密码盾挂失请求而进行用户身份认证;进行所述用户身份认证,以验证所述生物特征信息与所述服务器中存储的生物特征信息是否一致。
示例性地,当终端设备或密码盾丢失后,用户可以在别的终端设备上登录到应用,进行挂失操作,当用户发送了挂失请求后,终端设备本身或在服务器的指示下会提示用户输入生物特征,终端设备获取用户输入的生物特征信息后,向服务器发送该生物特征信息,服务器会比较该生物特征信息与服务器中存储的生物特征信息,如果二者一致,则服务器会响应用户的挂失请求,例如,可以解除该用户信息下对应的当前密码盾的标识信息与该用户信息的绑定关系,从而由于这种绑定关系已经不存在,他人采用用户的终端设备或者密码盾或者终端设备和密码盾二者都无法进行使用物品的操作。
进一步地,用户可以在最近的服务点申请领取新的密码盾,在进行申领时,可以将新的密码盾的标识信息与用户信息进行绑定。
以上已经结合附图说明了本实施例,在本实施例中,提供一种物品使用控制方法,使用物品时,通过密码盾和终端设备的结合,且对该密码盾生成的动态密码进行验证,在该动态密码验证通过的情况下,该共享物品才可解锁供用户使用,从而提升的物品使用的安全性。而且,该密码盾是与用户信息绑定的,在终端设备丢失的情况下,如果没有对应用户的密码盾,非机主无法采用捡到的终端设备利用机主身份进行共享物品的使用,从而提升了共 享物品使用的安全性,避免了不必要的财产损失。而且在密码盾丢失的情况下,还可以对该丢失的密码盾进行挂失失效处理,进一步提升安全性。此外,采用密码盾生成动态密码,每个密码只使用一次,有效提高了共享物品,例如,共享单车使用的安全性。
在本实施例中,还提供一种验证设备,如图3所示,包括:通信装置,用于实施通信;存储器,用于存储指令;处理器,用于受控于所述存储器存储的指令进行操作,以执行如本实施例任意所述的物品使用控制方法。
例如,该验证设备可以是终端设备,或者,可以是服务器。
在本实施例中,所述终端设备可以是智能终端或者可穿戴智能设备,该智能终端可以是手机、掌上电脑、平板电脑等,该可穿戴智能设备可以是智能手表、智能手环或者智能首饰等。
在一个例子中,所述终端设备可以如图4示,可以包括处理器6100、存储器6200、接口装置6300、通信装置6400、显示装置6500、输入装置6600、扬声器6700、麦克风6800等等。
其中,处理器6100可以是中央处理器CPU、微处理器MCU等。存储器6200例如包括ROM(只读存储器)、RAM(随机存取存储器)、诸如硬盘的非易失性存储器等。接口装置6300例如包括USB接口、耳机接口等。通信装置6400至少能实施近距离通信,例如蓝牙通信、NFC通信、UWB通信、WiFi通信、ZigBee通信、红外通信、声波通信中其中至少一种,此外还能能够进行其他有线或无线通信,例如2G/3G/4G/5G通信或局域网通信等。显示装置6500例如是液晶显示屏、触摸显示屏等。输入装置6600例如可以包括触摸屏、键盘、体感输入等。用户可以通过扬声器6700和麦克风6800输入/输出语音信息。
图4示的终端设备6000仅仅是说明性的并且决不意味着对本发明、其应用或使用的任何限制。应用于本发明的实施例中,终端设备6000的所述存储器6200用于存储指令,所述指令用于控制所述处理器6100进行操作以执行本发明实施例提供的任意一项方法物品使用控制方法。本领域技术人员应当理解,尽管在图4对终端设备6000示出了多个装置,但是,本发明可以仅涉及其中的部分装置,例如,终端设备6000涉及处理器6100和存储装置6200以及通信装置6400。技术人员可以根据本发明所公开方案设计指令。指令如何控制处理器进行操作,这是本领域公知,故在此不再详细描述。
本领域技术人员还应当明白,可以通过各种方式来实现终端设备6000。例如,可以通过指令配置处理器来实现终端设备6000。例如,可以将指令存储在ROM中,并且当启动设备时,将指令从ROM读取到可编程器件中来实现物品使用控制设备。例如,可以将物品使用控制设备固化到专用器件(例如ASIC)中。可以将终端设备6000分成相互独立的单元,或者可以将它们合并在一起实现。终端设备6000可以通过上述各种实现方式中的一种来实现,或者可以通过上述各种实现方式中的两种或更多种方式的组合来实现。
备选地,该终端设备还可以包括信息获取装置,例如,摄像头等,来获取物品的物品标识。
例如,本实施例的终端设备,还可以包括:采集单元,用于采集所述用户的生物特征。
进一步地,本实施例的终端设备,还可以包括:编码单元,用于将所述生物特征信息编码。
示例性地,本实施例的终端设备的采集单元可以是麦克风3800,来获取用户的声音特征;可以是指纹输入装置,例如,输入装置3600,来获取用户的指纹;还可以是面部/虹膜识别装置,来获取用户的面部/虹膜特征。
在本实施例中,所述服务器可以是例如刀片服务器、计算机或者多台计算机组成的计算机组,还可以是云服务器。
在一个例子中,所述服务器可以如图5所示,包括处理器7100、存储器7200、接口装置7300、通信装置7400、显示装置7500、输入装置7600。尽管服务器也可以包括扬声器、麦克风等等,但是,这些部件与本发明无关,故在此省略。其中,处理器7100例如可以是中央处理器CPU、微处理器MCU等。存储器7200例如包括ROM(只读存储器)、RAM(随机存取存储器)、诸如硬盘的非易失性存储器等。接口装置7300例如包括USB接口、串行接口等。通信装置7400例如能够进行有线或无线通信。显示装置7500例如是液晶显示屏。输入装置7600例如可以包括触摸屏、键盘等。
图5所示的服务器仅仅是说明性的并且决不意味着对本发明、其应用或使用的任何限制。应用于本发明的实施例中,服务器7000的的所述存储器7200用于存储指令,所述指令用于控制所述处理器7100进行操作以执行本发明实施例提供的物品使用控制方法。本领域技术人员应当理解,尽管在图7中对服务器7000的示出了多个装置,但是,本发明可以仅涉及其中的部分 装置,例如,服务器7000的只涉及处理器7100和存储装置7200。技术人员可以根据本发明所公开方案设计指令。指令如何控制处理器进行操作,这是本领域公知,故在此不再详细描述。
本领域技术人员还应当明白,可以通过各种方式来实现服务器7000。例如,可以通过指令配置处理器来实现服务器7000。例如,可以将指令存储在ROM中,并且当启动设备时,将指令从ROM读取到可编程器件中来实现物品使用控制设备。例如,可以将物品使用控制设备固化到专用器件(例如ASIC)中。可以将服务器7000分成相互独立的单元,或者可以将它们合并在一起实现。服务器7000可以通过上述各种实现方式中的一种来实现,或者可以通过上述各种实现方式中的两种或更多种方式的组合来实现。
<第二实施例>
在本实施例中,提供一种物品使用控制方法,如图6所示,包括:
S2100,终端设备确定与连接到所述终端设备的密码盾关联的第一动态密码;以及
S2200,向服务器发送所述密码盾的标识信息和所述物品的标识信息中的至少一项以及所述第一动态密码。
在本实施例中,所述终端设备确定与连接到所述终端设备的密码盾关联的第一动态密码,包括:
所述终端设备接收所述密码盾发送的所述第一动态密码,其中,所述第一动态密码是所述密码盾根据密码盾的标识信息和所述物品的标识信息中的至少一项生成的;或者
所述终端设备根据所述密码盾的标识信息,生成所述第一动态密码。
在本实施例中,第一动态密码可以是终端设备生成的,或者是由密码盾生成而由终端设备获取的。
备选地,所述第一动态密码也可以由由终端设备获取后发送到服务器。
对应地,可以是终端设备进行第一动态密码验证,此时,可以由服务器利用相同的密码生成规则生成第二动态密码且发送到终端设备,终端设备比较第一和第二动态密码,如果二者一致,则第一动态密码通过验证,否则,第一动态密码未通过验证。
备选地,还可以是服务器进行第一动态密码验证,可以是服务器接受到终端设备发送的第一动态密码后,利用相同的密码生成规则生成第二动态密 码,而后服务器比较比较第一和第二动态密码,如果二者一致,则第一动态密码通过验证,否则,第一动态密码未通过验证。或者,服务器接受到终端设备发送的第一动态密码后,利用生成第一动态密码的反算法得到第一动态密码生成时利用的时间信息,比较该时间信息和服务器本身的时间信息,如果二者一致,则第一动态密码通过验证,否则,第一动态密码未通过验证。
其他与第一实施例相同的部分可以参照第一实施例的描述,为了简洁,这里将不进行赘述。
在本实施例中,还提供一种终端设备,包括:
通信装置,用于实施通信;
存储器,用于存储指令;
处理器,用于受控于所述存储器存储的指令进行操作,以执行本实施例任意所述的物品使用控制方法。
例如,本实施例的终端设备,还可以包括:采集单元,用于采集所述用户的生物特征。
进一步地,本实施例的终端设备,还可以包括:编码单元,用于将所述生物特征信息编码。
具体地,该终端设备可以如图4所示,可以参考第一实施例,这里将不进行赘述。
<第三实施例>
在本实施例中,提供一种物品使用控制方法,如图7所示,包括:
S3100,连接到终端设备的密码盾生成第一动态密码;
S3200,所述终端设备获取所述第一动态密码并向服务器发送所述第一动态密码;
S3300,所述服务器对所述第一动态密码进行验证;以及
S3400,在所述第一动态密码通过验证的情况下,所述服务器对所述物品进行解锁处理。
与第一实施例和第二实施例相同部分这里将不进行赘述。
<第四实施例>
在本实施例中,提供一种物品使用控制方法,如图8所示,包括:
S8100,连接到终端设备的密码盾生成第一动态密码并且服务器生成第二动态密码;
S8200,所述终端设备获取所述第一动态密码和所述第二动态密码;
S8300,所述终端设备根据所述第二动态密码,对所述第一动态密码进行验证;以及
S8400,在所述第一动态密码通过验证的情况下,所述终端设备对所述物品进行解锁处理。
与第一实施例和第二实施例相同部分这里将不进行赘述。
<第五实施例>
在本实施例中,提供一种系统,包括:如第一实施例任意所述的验证设备;以及密码盾,连接到终端设备。
例如,验证设备的示例性说明可以参照第一实施例,这里将不进行赘述。
在一个例子中,密码盾可以包括:微处理器,用于根据密码生成规则生成第一动态密码。密码盾可以是任意可以生成密码的装置,本发明的实施例对此不进行限定。
备选地,密码盾可以通过接口直接连接到终端设备,从而实现与设备的通信。
例如,该接口可以USB接口或者串口等,本发明的实施例对此不进行限定。
本发明的实施例提供了物品使用控制方法、验证设备、终端设备以及系统,并且可以具有以下至少一项有益效果:
(1)使用共享物品时,密码盾和终端设备结合使用,在进行解锁之前,密码盾生成第一动态密码,在第一动态密码通过验证的情况下,才可解锁该物品,提升了用户账号的安全性,提升了共享物品使用的安全性,避免了不必要的账户损失。
(2)在进行物品解锁之前,需要验证用户的生物特征信息,验证通过才可解锁物品,进一步提升了安全性。
(3)在终端设备或密码盾丢失的情况下,可以对密码盾进行挂失处理,挂失时,需要验证用户的生物特诊信息,进一步提升了共享物品使用的安全性。
本领域技术人员公知的是,随着诸如大规模集成电路技术的电子信息技术的发展和软件硬件化的趋势,要明确划分计算机系统软、硬件界限已经显得比较困难了。因为,任何操作可以软件来实现,也可以由硬件来实现。任 何指令的执行可以由硬件完成,同样也可以由软件来完成。对于某一机器功能采用硬件实现方案还是软件实现方案,取决于价格、速度、可靠性、存储容量、变更周期等非技术性因素。因此,对于电子信息技术领域的普通技术人员来说,更为直接和清楚地描述一个技术方案的方式是描述该方案中的各个操作。在知道所要执行的操作的情况下,本领域技术人员可以基于对所述非技术性因素的考虑直接设计出期望的产品。
本发明可以是系统、方法和/或计算机程序产品。计算机程序产品可以包括计算机可读存储介质,其上载有用于使处理器实现本发明的各个方面的计算机可读程序指令。
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是
――但不限于
――电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、静态随机存取存储器(SRAM)、便携式压缩盘只读存储器(CD-ROM)、数字多功能盘(DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。这里所使用的计算机可读存储介质不被解释为瞬时信号本身,诸如无线电波或者其他自由传播的电磁波、通过波导或其他传输媒介传播的电磁波(例如,通过光纤电缆的光脉冲)、或者通过电线传输的电信号。
这里所描述的计算机可读程序指令可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。
用于执行本发明操作的计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程 语言包括面向对象的编程语言—诸如Smalltalk、C++等,以及常规的过程式编程语言—诸如“C”语言或类似的编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(FPGA)或可编程逻辑阵列(PLA),该电子电路可以执行计算机可读程序指令,从而实现本发明的各个方面。
这里参照根据本发明实施例的方法、装置(系统)和计算机程序产品的流程图和/或框图描述了本发明的各个方面。应当理解,流程图和/或框图的每个方框以及流程图和/或框图中各方框的组合,都可以由计算机可读程序指令实现。
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理器,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理器执行时,产生了实现流程图和/或框图中的一个或多个方框中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或框图中的一个或多个方框中规定的功能/动作的各个方面的指令。
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或框图中的一个或多个方框中规定的功能/动作。
附图中的流程图和框图显示了根据本发明的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,所述模块、 程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。对于本领域技术人员来说公知的是,通过硬件方式实现、通过软件方式实现以及通过软件和硬件结合的方式实现都是等价的。
以上已经描述了本发明的各实施例,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施例。在不偏离所说明的各实施例的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中的技术改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。本发明的范围由所附权利要求来限定。
以上已经描述了本发明的各实施例,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施例。在不偏离所说明的各实施例的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中的技术改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。本发明的范围由所附权利要求来限定。
本申请要求于2017年8月31日提交的中国专利申请第201710773230.5的优先权,该中国专利申请的全文通过引用的方式结合于此以作为本申请的一部分。
Claims (20)
- 一种物品使用控制方法,包括:验证设备获取连接到终端设备的密码盾生成的第一动态密码;所述验证设备对所述第一动态密码进行验证;以及所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理。
- 根据权利要求1所述的物品使用控制方法,其中所述第一动态密码是所述密码盾根据所述密码盾的标识信息和所述物品的标识信息中的至少一项生成的。
- 根据权利要求2所述的物品使用控制方法,其中所述第一动态密码是根据所述密码盾的标识信息和所述物品的标识信息中的至少一种以及时间信息生成的。
- 根据权利要求3所述的物品使用控制方法,在所述验证设备获取连接到终端设备的密码盾生成的第一动态密码之前,还包括:与所述密码盾进行时间同步。
- 根据权利要求2所述的物品使用控制方法,其中所述对所述第一动态密码进行验证,包括:确定第二动态密码,其中,所述第二动态密码是利用与所述第一动态密码相同的动态密码生成规则生成的;通过比较所述第一动态密码和所述第二动态密码,确定所述第一动态密码是否通过验证。
- 根据权利要求2-5中任一项所述的物品使用控制方法,其中所述验证设备为所述终端设备;所述方法还包括:所述终端设备向所述密码盾和服务器分别发送开锁请求;所述验证设备获取连接到终端设备的密码盾生成的第一动态密码,包括:所述终端设备接收所述密码盾响应于所述开锁请求发送的第一动态密码;所述验证设备确定第二动态密码,包括:所述终端设备接收服务器响应于所述开锁请求发送的第二动态密码。
- 根据权利要求6所述的物品使用控制方法,其中所述开锁请求包含所述物品的标识信息;所述方法还包括:所述终端设备获取所述物品的标识信息,其中所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理,包括:所述终端设备向所述服务器发送第一指示信息,所述第一指示信息指示所述第一动态密码通过验证,并且所述第一指示信息用于所述服务器对所述物品进行开锁。
- 根据权利要求6所述的物品使用控制方法,还包括:所述终端设备获取所述密码盾的标识信息以及所述终端设备对应的用户信息;向所述服务器发送密码盾认证请求,所述密码盾认证请求包括所述密码盾的标识信息以及所述用户信息,所述密码盾认证请求用于所述服务器确定所述密码盾的标识信息是否与所述用户信息绑定;接受服务器发送的所述密码盾认证成功响应。
- 根据权利要求6所述的物品使用控制方法,在所述终端设备向连接到所述终端设备的密码盾发送开锁请求之前,还包括:获取所述用户输入的生物特征信息且向所述服务器发送所述生物特征信息,所述生物特征信息用于进行所述用户身份认证;以及接受所述服务器发送的所述用户身份认证响应。
- 根据权利要求2-5中任一项所述的物品使用控制方法,其中所述验证设备为服务器,所述验证设备获取连接到终端设备的密码盾生成的第一动态密码,包括:所述服务器接受所述终端设备发送的所述第一动态密码;所述验证设备在所述第一动态密码通过验证的情况下,对所述物品进行解锁处理,包括:所述服务器响应于所述第一动态密码通过验证向所述物品发送解锁指 令。
- 根据权利要求1至4中任一项所述的物品使用控制方法,所述验证设备为服务器,其中所述验证设备对所述第一动态密码进行验证包括:对获取的所述第一动态密码根据所述动态密码生成规则的反规则进行解码,以获取生成所述第一动态密码所利用的时间信息;通过比较所述验证设备的时间信息和所述第一动态密码的时间信息,确定所述第一动态密码是否通过验证。
- 根据权利要求10或11所述的物品使用控制方法,还包括:接受所述终端设备发送的密码盾认证请求,所述密码盾认证请求包括所述密码盾的标识信息以及所述终端设备对应的用户信息;响应于所述密码盾认证请求进行所述密码盾认证,以判断所述密码盾的标识信息是否与所述用户信息绑定;在确定所述密码盾的标识信息与所述用户信息绑定的情况下,向所述终端设备发送密码盾认证成功响应。
- 根据权利要求10或11所述的物品使用控制方法,还包括:获取所述用户的生物特征信息,所述生物特征信息用于响应于密码盾挂失请求而进行用户身份认证;进行所述用户身份认证,以验证所述生物特征信息与所述服务器中存储的生物特征信息是否一致。
- 一种物品使用控制方法,包括:终端设备确定与连接到所述终端设备的密码盾关联的第一动态密码;向服务器发送所述密码盾的标识信息和所述物品的标识信息中的至少一项以及所述第一动态密码。
- 根据权利要求14所述的物品使用控制方法,所述终端设备确定与连接到所述终端设备的密码盾关联的第一动态密码,包括:所述终端设备接收所述密码盾发送的所述第一动态密码,其中,所述第一动态密码是所述密码盾根据密码盾的标识信息和所述物品的标识信息中的至少一项生成的;或者所述终端设备根据所述密码盾的标识信息,生成所述第一动态密码。
- 一种物品使用控制方法,包括:连接到终端设备的密码盾生成第一动态密码;所述终端设备获取所述第一动态密码并向服务器发送所述第一动态密码;所述服务器对所述第一动态密码进行验证;以及在所述第一动态密码通过验证的情况下,所述服务器对所述物品进行解锁处理。
- 一种物品使用控制方法,包括:连接到终端设备的密码盾生成第一动态密码并且服务器生成第二动态密码;所述终端设备获取所述第一动态密码和所述第二动态密码;所述终端设备根据所述第二动态密码,对所述第一动态密码进行验证;以及在所述第一动态密码通过验证的情况下,所述终端设备对所述物品进行解锁处理。
- 一种验证设备,包括:通信装置,用于实施通信;存储器,用于存储指令;处理器,用于受控于所述存储器存储的指令进行操作,以执行如权利要求1-13中任一项所述的物品使用控制方法。
- 一种终端设备,包括:通信装置,用于实施通信;存储器,用于存储指令;处理器,用于受控于所述存储器存储的指令进行操作,以执行如权利要求14或15所述的物品使用控制方法。
- 一种系统,包括如权利要求18所述的验证设备;以及密码盾,连接到终端设备。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710773230.5A CN109426704A (zh) | 2017-08-31 | 2017-08-31 | 物品使用控制方法、验证设备、终端设备以及系统 |
CN201710773230.5 | 2017-08-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019041782A1 true WO2019041782A1 (zh) | 2019-03-07 |
Family
ID=65505521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/078917 WO2019041782A1 (zh) | 2017-08-31 | 2018-03-14 | 物品使用控制方法、验证设备、终端设备以及系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109426704A (zh) |
WO (1) | WO2019041782A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110502297A (zh) * | 2019-08-12 | 2019-11-26 | 北京兼爱科技有限公司 | 一种智能设备丢失处理方法 |
CN114362941A (zh) * | 2021-12-30 | 2022-04-15 | 深圳市元征科技股份有限公司 | 离线模式授权方法、装置、电子设备及存储介质 |
CN115134165A (zh) * | 2022-07-29 | 2022-09-30 | 中国工商银行股份有限公司 | 信息验证方法及系统、存储介质、电子设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1777098A (zh) * | 2004-11-16 | 2006-05-24 | 上海盛大网络发展有限公司 | 动态密码认证系统、方法及其用途 |
CN104134294A (zh) * | 2014-07-18 | 2014-11-05 | 浪潮软件集团有限公司 | 一种基于营业厅自助终端的授权认证方法 |
CN105790951A (zh) * | 2016-02-26 | 2016-07-20 | 浙江维尔科技股份有限公司 | 一种身份认证的装置以及智能终端 |
CN107070663A (zh) * | 2017-03-28 | 2017-08-18 | 浙江神州量子网络科技有限公司 | 一种基于移动终端的现场认证方法和现场认证系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104299019B (zh) * | 2013-07-15 | 2019-05-14 | 深圳市腾讯计算机系统有限公司 | 密码卡及验证方法、生成方法、装置和系统 |
CN106101159B (zh) * | 2016-08-27 | 2019-08-23 | 谢志豪 | 动态密码生成方法、动态密码认证方法及装置 |
WO2018090183A1 (zh) * | 2016-11-15 | 2018-05-24 | 深圳达闼科技控股有限公司 | 一种身份认证的方法、终端设备、认证服务器及电子设备 |
-
2017
- 2017-08-31 CN CN201710773230.5A patent/CN109426704A/zh active Pending
-
2018
- 2018-03-14 WO PCT/CN2018/078917 patent/WO2019041782A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1777098A (zh) * | 2004-11-16 | 2006-05-24 | 上海盛大网络发展有限公司 | 动态密码认证系统、方法及其用途 |
CN104134294A (zh) * | 2014-07-18 | 2014-11-05 | 浪潮软件集团有限公司 | 一种基于营业厅自助终端的授权认证方法 |
CN105790951A (zh) * | 2016-02-26 | 2016-07-20 | 浙江维尔科技股份有限公司 | 一种身份认证的装置以及智能终端 |
CN107070663A (zh) * | 2017-03-28 | 2017-08-18 | 浙江神州量子网络科技有限公司 | 一种基于移动终端的现场认证方法和现场认证系统 |
Also Published As
Publication number | Publication date |
---|---|
CN109426704A (zh) | 2019-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11240046B2 (en) | Digital certificate management method, apparatus, and system | |
US11329802B2 (en) | Systems and methods for data collection with blockchain recording | |
US10972582B2 (en) | System and method for scoped attributes | |
US9923905B2 (en) | System and method for zone access control | |
CN102930199B (zh) | 多承租人订阅环境中的安全机器登记 | |
US20170223057A1 (en) | System and method for access control services | |
WO2019127267A1 (zh) | 一种数据处理方法和系统 | |
JP2017507592A (ja) | モバイルクラウドサービスアーキテクチャ | |
US12021864B2 (en) | Systems and methods for contactless authentication using voice recognition | |
US10198571B2 (en) | Authentication management | |
US9576123B2 (en) | Pattern-based password with dynamic shape overlay | |
US12014740B2 (en) | Systems and methods for contactless authentication using voice recognition | |
TW202036376A (zh) | 基於區塊鏈對人臉資訊進行場景化存證的方法及裝置 | |
WO2019041782A1 (zh) | 物品使用控制方法、验证设备、终端设备以及系统 | |
CN104298910A (zh) | 便携式电子装置及互动式人脸登入方法 | |
CA3178249A1 (en) | Systems and methods for conducting remote attestation | |
TW201837869A (zh) | 一種使用者端驗票的方法、系統及智慧設備 | |
US20240153327A1 (en) | Systems and methods for providing a secure physical storage system | |
US9135416B2 (en) | GUI-based authentication for a computing system | |
US20230075252A1 (en) | Methods, systems, apparatus, and devices for controlling access to access control locations | |
US20230130648A1 (en) | System for multifactor authentication utilizing augmented reality | |
US9596231B1 (en) | Grid-based authentication on touch-aware devices | |
CN104112092A (zh) | 一种信息处理方法及电子设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18851824 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18851824 Country of ref document: EP Kind code of ref document: A1 |