WO2020057640A1 - 一种电子烟控制方法及电子烟 - Google Patents

一种电子烟控制方法及电子烟 Download PDF

Info

Publication number
WO2020057640A1
WO2020057640A1 PCT/CN2019/107034 CN2019107034W WO2020057640A1 WO 2020057640 A1 WO2020057640 A1 WO 2020057640A1 CN 2019107034 W CN2019107034 W CN 2019107034W WO 2020057640 A1 WO2020057640 A1 WO 2020057640A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity authentication
electronic cigarette
atomizer
authentication code
stored
Prior art date
Application number
PCT/CN2019/107034
Other languages
English (en)
French (fr)
Inventor
严慧勇
徐中立
李永海
Original Assignee
深圳市合元科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市合元科技有限公司 filed Critical 深圳市合元科技有限公司
Priority to EP19862393.6A priority Critical patent/EP3854237A4/en
Priority to US17/277,765 priority patent/US20210345682A1/en
Publication of WO2020057640A1 publication Critical patent/WO2020057640A1/zh

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A24TOBACCO; CIGARS; CIGARETTES; SIMULATED SMOKING DEVICES; SMOKERS' REQUISITES
    • A24FSMOKERS' REQUISITES; MATCH BOXES; SIMULATED SMOKING DEVICES
    • A24F40/00Electrically operated smoking devices; Component parts thereof; Manufacture thereof; Maintenance or testing thereof; Charging means specially adapted therefor
    • A24F40/50Control or monitoring
    • A24F40/53Monitoring, e.g. fault detection
    • A24F47/008
    • AHUMAN NECESSITIES
    • A24TOBACCO; CIGARS; CIGARETTES; SIMULATED SMOKING DEVICES; SMOKERS' REQUISITES
    • A24FSMOKERS' REQUISITES; MATCH BOXES; SIMULATED SMOKING DEVICES
    • A24F40/00Electrically operated smoking devices; Component parts thereof; Manufacture thereof; Maintenance or testing thereof; Charging means specially adapted therefor
    • A24F40/10Devices using liquid inhalable precursors
    • AHUMAN NECESSITIES
    • A24TOBACCO; CIGARS; CIGARETTES; SIMULATED SMOKING DEVICES; SMOKERS' REQUISITES
    • A24FSMOKERS' REQUISITES; MATCH BOXES; SIMULATED SMOKING DEVICES
    • A24F40/00Electrically operated smoking devices; Component parts thereof; Manufacture thereof; Maintenance or testing thereof; Charging means specially adapted therefor
    • A24F40/60Devices with integrated user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC

Definitions

  • the embodiments of the present application relate to the technical field of electronic cigarettes, and in particular, to an electronic cigarette control method and an electronic cigarette.
  • E-cigarette is a product that can heat aerosolized substrates such as nicotine to generate aerosols for users to inhale.
  • it includes an atomizer and a power supply device.
  • the power supply device supplies power to the atomizer to make the atomizer to the atomized substrate. Heating produces aerosols.
  • the atomizer and the power supply device can be detachably connected or non-detachable.
  • the embodiment of the present application aims to provide an electronic cigarette control method and an electronic cigarette, which can effectively prevent the atomizer and the power supply device from being mixed by performing identity authentication on the atomizer and the power supply device.
  • the electronic cigarette includes an atomizer and a power supply device.
  • the atomizer is provided with an encrypted authentication unit.
  • the power supply device is provided with a control unit, and when the atomizer is connected to the power supply device, the encrypted authentication unit and the control unit are communicatively connected;
  • the electronic cigarette control method includes:
  • the generating the first identity authentication code includes:
  • the method before the step of obtaining a second identity authentication code from the encryption authentication unit, the method further includes:
  • the pre-stored first encryption algorithm and the pre-stored second encryption algorithm are both secure hash algorithms.
  • the first identity authentication code and the second identity authentication code are both an information verification code or a MAC code.
  • the pre-stored atomizer information includes manufacturer information, version information, production information, and e-liquid type.
  • the performing identity authentication according to the first identity authentication code and the second identity authentication code includes:
  • the identity authentication fails.
  • the pre-stored atomizer information includes the number of smokeable mouths, the length of smokeable time, and the quantity of oil smokeable, and the method further includes:
  • the method further includes:
  • the electronic cigarette includes an atomizer and a power supply device.
  • the atomizer is provided with an encryption authentication unit.
  • the power supply device is provided with a control unit, and when the atomizer is connected to the power supply device, the encrypted authentication unit and the control unit are communicatively connected;
  • the electronic cigarette control device includes:
  • a first generating module configured to generate a first identity authentication code
  • a first obtaining module configured to obtain a second identity authentication code from the encryption authentication unit
  • a first control module configured to perform identity authentication according to the first identity authentication code and the second identity authentication code, and if the identity authentication is passed, control the electronic cigarette to start,
  • the first generating module specifically includes:
  • a second generating module configured to generate random challenge data
  • a second acquisition module configured to acquire pre-stored atomizer information from the encrypted authentication unit
  • a first calculation module is configured to calculate the random challenge data, the pre-stored atomizer information, and the pre-stored first key according to a pre-stored first encryption algorithm to generate the first identity authentication code.
  • the apparatus further includes:
  • a sending module configured to send the random challenge data to the encryption authentication unit before obtaining a second identity authentication code from the encryption authentication unit, so that the encryption authentication unit may
  • the random challenge data, the pre-stored atomizer information and the pre-stored second key are calculated to generate the second identity authentication code.
  • the first control module specifically includes:
  • a comparison module configured to compare the first identity authentication code and the second identity authentication code, and if the first identity authentication code and the second identity authentication code are consistent, the identity authentication passes,
  • the identity authentication fails.
  • the pre-stored atomizer information includes the number of suckable mouths, the length of suckable time, and the amount of oil that can be sucked, and the device further includes:
  • a third obtaining module configured to obtain the number of puffs, the working time of the atomizer, and the working power of the atomizer after controlling the startup of the electronic cigarette;
  • a second calculation module configured to calculate the consumption of cigarette oil according to the working time of the atomizer and the working power of the atomizer;
  • An update module is configured to update the amount of smokeable oil, the number of smokeable mouths, and the length of smokeable time according to the amount of smoke oil consumption, the number of puffs, and the working time of the atomizer.
  • the apparatus further includes:
  • a second control module is configured to control the electronic cigarette to stop working or control the electronic cigarette to issue a reminder when the amount of suckable oil is less than a preset threshold.
  • an atomizer for matching connection with a power supply device including:
  • a heating body for atomizing the atomizing matrix when the current is applied
  • An encryption authentication unit that can be communicatively connected with a control unit in the power supply device, the encryption authentication unit includes an encryption module and a storage module, and the encryption module is connected to the storage module;
  • the encryption module is configured to generate a second identity authentication code when the encryption authentication unit is in communication connection with the control unit in the power supply device and feed it back to the control unit.
  • an electronic cigarette including:
  • An atomizer provided with an encrypted authentication unit
  • a power supply device provided with a control unit
  • the atomizer is connected to the power supply device, and the encryption authentication unit and the control unit are communicatively connected;
  • the control unit includes at least one processor, and
  • a memory connected in communication with the at least one processor, wherein:
  • the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor can execute the method described above.
  • another technical solution adopted in the embodiments of the present application is to provide a non-volatile computer-readable storage medium, where the non-volatile computer-readable storage medium stores computer-executable instructions, and therefore The computer-executable instructions are used to cause the electronic cigarette to perform the method described above.
  • a beneficial effect of the embodiment of the present application is that, in the case of being different from the prior art, the embodiment of the present application provides an electronic cigarette control method and an electronic cigarette.
  • the second identity authentication code obtained by the encryption authentication unit performs identity authentication to control the startup of the electronic cigarette or prohibits the startup of the electronic cigarette.
  • the identity authentication is passed, the atomizer and the power supply device match, and then the electronic cigarette is controlled to start.
  • the identity authentication fails, If the atomizer and the power supply device do not match, the e-cigarette is prohibited from starting, which effectively prevents the mixing of the atomizer and the power supply device, improves the user experience, and protects the interests of the merchant.
  • FIG. 1 is a schematic structural diagram of an electronic cigarette according to an embodiment of the present application.
  • FIG. 2 is a schematic structural diagram of an encrypted authentication unit in the electronic cigarette shown in FIG. 1;
  • FIG. 3 is another schematic structural diagram of an encrypted authentication unit in the electronic cigarette shown in FIG. 1;
  • FIG. 4 is a schematic diagram of a connection structure of an encryption authentication unit and a control unit
  • FIG. 5 is a schematic flowchart of an electronic cigarette control method according to an embodiment of the present application.
  • step S100 is a schematic flowchart of a method in step S100
  • FIG. 7 is a schematic flowchart of a part of an electronic cigarette control method according to another embodiment of the present application.
  • step S130 is a schematic flowchart of a method in step S130;
  • FIG. 9 is a schematic flowchart of a part of an electronic cigarette control method according to another embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a part of an electronic cigarette control method according to another embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of an electronic cigarette control device according to an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a first generating module shown in FIG. 11;
  • FIG. 13 is a schematic structural diagram of an electronic cigarette control device according to another embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a first control module shown in FIG. 11;
  • 15 is a schematic structural diagram of a part of an electronic cigarette control device according to another embodiment of the present application.
  • 16 is a schematic structural diagram of a part of an electronic cigarette control device according to another embodiment of the present application.
  • FIG. 17 is a schematic diagram of a hardware structure of the control unit shown in FIG. 1.
  • FIG. 1 is a schematic structural diagram of an electronic cigarette according to an embodiment of the present application.
  • the electronic cigarette 100 includes: an atomizer 10 and a power supply device 20, the atomizer 10 and the power supply device 20 are detachably connected, and the power supply device 20
  • the atomizer 10 is used for powering the atomizer 10, and the atomizer 10 is used for heating according to the electric power provided by the power supply device 20 to heat the atomizing substrate to generate aerosol.
  • the atomizer 10 is provided with an encryption authentication unit 11 and a heating body 12.
  • the encryption authentication unit 11 is disposed at one end of the atomizer 10 for connection with the power supply device 20 and includes an encryption module 111, a storage module 112, and a printed circuit board (PCB) 113.
  • the encryption module 111 and the storage The module 112 is connected.
  • the encryption module 111 is an encryption chip; the storage module 112 is a storage chip or a storage space in the encryption chip.
  • the encryption chip and the memory chip are both disposed on the printed circuit board 113.
  • the encryption chip is disposed on the printed circuit board 113.
  • the encryption module 111 is configured to store a pre-stored second key and a pre-stored second encryption algorithm, and is also used to generate a second identity authentication code.
  • the storage module 112 is used to store pre-stored atomizer information.
  • the pre-stored atomizer information includes manufacturer information, version information, production information, type of e-liquid, number of ports that can be sucked, length of time that can be sucked, and amount of oil that can be sucked. .
  • the heating body 12 is disposed in the atomizer 10, and can be an element capable of generating heat by being energized, such as a heating coil and a heating sheet, and is used to atomize the atomizing matrix into an aerosol after generating heat.
  • both the encryption authentication unit 11 and the heating body 12 are connected to the power supply device 20, and the power supply device 20 can supply power to the encryption authentication unit 11 and the heating body 12, so that the encryption authentication unit 11 can execute
  • the heating body 12 can generate heat to heat the atomized substrate to generate an aerosol.
  • the power supply device 20 includes a control unit 21, a power source 22, and a connecting member 23, and the control unit 21, the power source 22, and the connecting member 23 are connected to each other.
  • the control unit 21 may be an electronic component such as a controller that can complete the work of coordination and command system.
  • the control unit 21 is configured to store a pre-stored first encryption algorithm and a pre-stored first key, and is also used to execute an electronic cigarette control method to perform identity authentication on the atomizer 10 and the power supply device 20, and control the electronic cigarette according to the identity authentication result Working status.
  • the power source 22 can be a chemical power source, such as a dry battery, a lead-acid battery, and a lithium-ion battery.
  • the power source 22 is used to supply power to the atomizer 10 so that the atomizer 10 Heating the atomized matrix produces an aerosol.
  • the connecting member 23 is provided at an end of the power supply device 20 for connecting with the atomizer 10.
  • the connecting member 23 may be a component such as a spring thimble, an elastic piece, a gold finger, etc., which can implement circuit conduction.
  • the encryption authentication unit 11 When the atomizer 10 is connected to the power supply device 20, the encryption authentication unit 11 is connected to the connection member 23, so that the encryption authentication unit 11 is connected to the power supply 22 and the control unit 21 through the connection member 23.
  • the power supply 22 can be an encryption authentication unit 11 power supply
  • the encrypted authentication unit 11 is communicatively connected with the control unit 21 (as shown in FIG. 4), so that the control unit 21 can use the second identity authentication code generated by the encrypted authentication unit 11 for identity authentication
  • the heating body 12 is connected to the power source 22,
  • the control unit 21 controls the power output from the power source 22 to the heating body 12 to control the heating of the heating body 12, that is, to control the working state of the electronic cigarette, including controlling the starting of the electronic cigarette and prohibiting the starting of the electronic cigarette.
  • the encrypted authentication unit 11 and the control unit 21 can perform a wired communication connection or a wireless communication connection.
  • the wired communication connection includes I2C bus, 1-Wire bus and other methods; the wireless communication connection includes Bluetooth, 3G, 4G, WiFi and other methods.
  • control unit 21 executes the electronic cigarette control method, performs identity authentication on the atomizer 10 and the power supply device 20, and controls the working state of the electronic cigarette according to the identity authentication result, specifically:
  • the control unit 21 generates a first identity authentication code, and obtains a second identity authentication code from the encryption authentication unit 11, and then the control unit 21 performs identity authentication according to the first identity authentication code and the second identity authentication code. If the identity authentication passes, the control The e-cigarette is started. If the identity authentication fails, the e-cigarette is forbidden to start.
  • the generation of the first identity authentication code by the control unit 21 is specifically: the control unit 21 generates random challenge data, and obtains pre-stored atomizer information from the encrypted authentication unit 11, the pre-stored atomizer information includes manufacturer information, version information, and production information And the type of e-liquid, etc., then the control unit 21 calculates the generated random challenge data, the obtained pre-stored atomizer information, and the pre-stored first key according to a pre-stored first encryption algorithm to generate a first identity authentication code.
  • control unit 21 also sends the generated random challenge data to the encryption and authentication unit 11 so that the encryption and authentication unit 11 performs the pre-stored atomizer information, the pre-stored second key, and the received random challenge data according to the pre-stored second encryption algorithm. Calculation is performed to generate a second identity authentication code.
  • the second identity authentication code generated by the encryption authentication unit 11 is the second identity authentication code to be obtained by the control unit 21.
  • the pre-stored atomizer information includes manufacturer information, version information, production information, and type of e-liquid.
  • the pre-stored first encryption algorithm and the pre-stored second encryption algorithm are both secure hash algorithms (SHA).
  • SHA secure hash algorithms
  • the pre-stored first encryption algorithm and the pre-stored second encryption algorithm are SHA-256.
  • the first identity authentication code and the second identity authentication code are information verification codes or MAC codes, both of which are calculated based on the pre-stored atomizer information. Therefore, the first identity authentication code and the second identity authentication code represent the same atomizer. identity of".
  • the first identity authentication code is calculated by pre-storing the first key and the obtained pre-stored atomizer information at the power supply device 20 side, and the second identity authentication code is pre-storing the second key and pre-stored at the atomizer 10 side.
  • the atomizer information is calculated, that is, the first identity authentication code and the second identity authentication code represent the "identity" of the atomizer from the power device 20 and the atomizer 10, respectively.
  • the pre-stored first key and the pre-stored second key match, which means that the power supply device 20 and the atomizer 10 match, so the power supply device 20 and the atomizer can be matched by the first identity authentication code and the second identity authentication code.
  • the device 10 performs identity authentication.
  • the control unit 21 when the pre-stored first key and the pre-stored second key are completely the same, it is determined that the power supply device 20 and the atomizer 10 are matched. At this time, the first identity authentication code and the second identity authentication code should be completely the same. Therefore, when the control unit 21 performs identity authentication according to the first identity authentication code and the second identity authentication code, the control unit 21 specifically includes:
  • the control unit 21 compares the first identity authentication code and the second identity authentication code. If the first identity authentication code and the second identity authentication code are consistent, the identity authentication is passed, and the control unit 21 controls the power source 22 to output a specified power to the heating body 12 so that The heating body 12 generates heat and the electronic cigarette starts; if the first identity authentication code and the second identity authentication code do not match, the identity authentication fails, and the control unit 21 controls the power source 22 to output 0 power to the heating body 12 so that the heating body 12 does not Fever, e-cigarettes are prohibited from starting.
  • control unit 21 generates a first identity authentication code and obtains a second identity authentication code from the encryption authentication unit 11 when receiving the startup instruction, thereby completing the identity authentication of the atomizer 10 and the power supply device 20.
  • the startup instruction is an instruction generated when a user presses an ignition key of the electronic cigarette.
  • control unit 21 can generate a first identity authentication code and obtain a second identity authentication code from the encryption authentication unit 11 when it is in communication connection with the encryption authentication unit 11 to complete the atomizer 10 and the power supply. Authentication of the device 20.
  • control unit 21 can also generate a first identity authentication code according to a preset time interval and obtain a second identity authentication code from the encryption authentication unit 11 to complete the atomizer 10 and the power supply device 20 Authentication.
  • control unit 21 can obtain the number of puffs, the working time of the atomizer, and the working power of the atomizer, and according to the working time of the atomizer and the work of the atomizer Power, calculate the consumption of e-liquid, and then the control unit 21 updates the obtained pre-stored atomizer information, including the number of smokeable mouths, based on the acquired number of puffs, the working time of the atomizer, and the calculated e-liquid consumption. Suction time and amount of oil.
  • control unit 21 updates the number of suctionable ports, the length of suctionable time and the amount of oil that can be pumped, it sends the updated number of suctionable ports, the length of suctionable time and the amount of oil that can be pumped to the encryption authentication unit 11 Storage, and replaces the number of smokeable mouths, the length of time that can be smoked, and the amount of oil that can be smoked in the encrypted authentication unit 11.
  • control unit 21 obtains the amount of smokeable oil stored in the encryption authentication unit 11 each time the electronic cigarette is started or is turned off, and compares the obtained amount of smokeable oil with a preset threshold. If the amount of suckable oil is less than a preset threshold, the control unit 21 controls the electronic cigarette to stop working, that is, the control unit 21 controls the power source 22 to output power to the heating body 12 as 0.
  • the control unit 21 can control the prompting device to issue a prompt when the amount of suckable oil is less than a preset threshold.
  • the prompting device may be a speaker capable of issuing a prompt, or a buzzer or the like capable of emitting an alarm sound.
  • control unit 21 can analyze the user's smoking habits according to the number of puffs, the working time of the atomizer, the working power of the atomizer, the amount of smoke oil consumption, and the type of smoke oil in each working process. , Generating a smoking report and a health smoking advice report, and sending the generated smoking report and health smoking advice report to the mobile terminal by establishing a communication connection with the mobile terminal, so that the user can better use the electronic cigarette and improve the user experience.
  • An embodiment of the present application provides an electronic cigarette.
  • An encryption authentication unit is provided in an atomizer of the electronic cigarette
  • a control unit is provided in a power supply device
  • the encryption authentication unit and the control unit are connected when the atomizer and the power supply device are connected.
  • the communication connection enables the control unit to execute an electronic cigarette control method to perform identity authentication on the atomizer and the power supply device, effectively preventing the mixing of the atomizer and the power supply device, improving the user experience, and protecting the interests of the merchant.
  • FIG. 5 is a schematic flowchart of an electronic cigarette control method according to an embodiment of the present application, which is applied to an electronic cigarette.
  • the electronic cigarette is the electronic cigarette described in the foregoing embodiment, and the method provided by the embodiment of the application is
  • the control unit 21 in the electronic cigarette is executed to perform identity authentication on the atomizer and the power supply device.
  • the electronic cigarette control method includes:
  • S100 Generate a first identity authentication code.
  • first identity authentication code is an information verification code or MAC code calculated and generated on the power supply device side, and can represent the “identity” of the atomizer on the power supply device side.
  • the above “generating a first identity authentication code” specifically includes:
  • random challenge data is a random number generated in the challenge-response mechanism for challenge, and the random challenge data generated each time is not fixed.
  • pre-stored atomizer information is the basic information of the atomizer stored in the encrypted authentication unit of the atomizer, including the manufacturer information, version information, production information, and type of e-liquid.
  • S103 Calculate the random challenge data, the pre-stored atomizer information, and the pre-stored first key according to a pre-stored first encryption algorithm to generate the first identity authentication code.
  • the “prestored first encryption algorithm” is a secure hash algorithm (SHA) stored in the control unit of the power supply device.
  • SHA secure hash algorithm
  • the prestored first encryption algorithm is SHA-256.
  • SHA-256 Use SHA-256 to calculate random challenge data, pre-stored atomizer information, and pre-stored first key to generate a first identity authentication code. Because the random challenge data is generated randomly, the first identity authentication code obtained by each calculation is not a fixed value, and can be different according to the different random challenge data each time.
  • second identity authentication code is an information verification code or a MAC code calculated and generated on the atomizer end, and can represent the "identity" of the atomizer on the atomizer end.
  • the electronic cigarette control method further includes:
  • S110 Send the random challenge data to the encrypted authentication unit, so that the encrypted authentication unit performs the random challenge data, the pre-stored atomizer information, and the pre-stored second key according to a pre-stored second encryption algorithm. Calculate and generate the second identity authentication code.
  • pre-stored atomizer information is the basic information of the atomizer stored in the encrypted authentication unit of the atomizer, including the manufacturer information, version information, production information, and type of e-liquid.
  • the aforementioned “prestored second encryption algorithm” is a secure hash algorithm (SHA) stored in the atomizer encryption authentication unit.
  • SHA secure hash algorithm
  • the prestored second encryption algorithm is SHA-256.
  • SHA-256 Use SHA-256 to calculate random challenge data, pre-stored atomizer information, and pre-stored second key to generate a second identity authentication code.
  • the random challenge data of the code is sent to the encrypted authentication unit, so that the encrypted authentication unit uses the same random challenge data to calculate and generate a second identity authentication code.
  • the pre-stored first key and the pre-stored second key match, which means that the power supply device and the atomizer match, so the first identity authentication code and the The second identity authentication code authenticates the power supply device 20 and the atomizer 10.
  • a first identity authentication code is generated and a second identity authentication code is obtained from the encrypted authentication unit.
  • a first identity authentication code can be generated and a second identity authentication code can be obtained from the encrypted authentication unit.
  • the first identity authentication code can be generated according to a preset time interval and the second identity authentication code can be obtained from the encrypted authentication unit.
  • S130 Perform identity authentication according to the first identity authentication code and the second identity authentication code.
  • the “identity authentication according to the first identity authentication code and the second identity authentication code” specifically includes:
  • S132 Determine whether the first identity authentication code and the second identity authentication code are consistent
  • the power supply device and the atomizer are determined to match when the pre-stored first key and the pre-stored second key are completely the same. At this time, the first identity authentication code and the second identity authentication code are the same, so When identity authentication is performed according to the first identity authentication code and the second identity authentication code, it is compared whether the first identity authentication code and the second identity authentication code are the same.
  • S140 determine whether the identity authentication is passed
  • Determine whether the identity authentication is passed by judging whether the first identity authentication code and the second identity authentication code are consistent. If the first identity authentication code and the second identity authentication code are consistent, the identity authentication is passed and the electronic cigarette is controlled to start; if the first identity If the authentication code is inconsistent with the second identity authentication code, the identity authentication fails and the e-cigarette is prohibited from starting.
  • the electronic cigarette control method further includes:
  • puff count is the number of mouths of the user who smokes the electronic cigarette during the process of starting up and closing the electronic cigarette.
  • the number of suctions can be counted through the change curve of the air flow, and each peak or trough is counted as one. This number of puffs can be obtained using a flow sensor.
  • the above “atomizer working time” is the time from when the user starts the electronic cigarette to when the electronic cigarette is turned off.
  • the working time of the atomizer can be obtained using a timer. The timer starts to count whenever the electronic cigarette is started, and when the electronic cigarette is off. When the time is over, the difference is the working time of the atomizer.
  • atomizer working power refers to the power output from the power supply to the heating body during the process of the electronic cigarette starting to closing.
  • S170 Calculate the consumption of cigarette oil according to the working time of the atomizer and the working power of the atomizer.
  • liquid oil consumption refers to the amount of e-liquid used in the electronic cigarette working process, which can be calculated from the working time of the atomizer and the working power of the atomizer during the working time of the atomizer.
  • S180 Update the amount of smokeable oil, the number of smokeable mouths, and the length of smokeable time according to the amount of smoke oil consumption, the number of puffs, and the working time of the atomizer.
  • the pre-stored atomizer information also includes: the number of pumpable ports, the length of pumpable time and the amount of pumpable oil.
  • the number of smokeable mouths in the pre-stored atomizer information obtained is updated according to the number of smoked breaths obtained, specifically, the number of smoked mouths is subtracted from the number of smoked breaths;
  • the obtained pre-stored atomizer is updated according to the calculated smoke oil consumption
  • the amount of smokeable oil in the information specifically, the amount of smokeable oil minus the amount of smoke oil consumed.
  • the updated number of smokeable mouths, length of smokeable time and the amount of smokeable oil are sent to the encrypted authentication unit 11 for storage, and the number of smoked mouths, length of smoked and Amount of suckable oil.
  • the user's smoking habits can also be analyzed according to the number of puffs, the working time of the nebulizer, the working power of the nebulizer, the consumption of smoke oil, and the type of smoke oil in each working process of the electronic cigarette.
  • Generate a smoking report and a health smoking advice report and send the generated smoking report and health smoking advice report to the mobile terminal by establishing a communication connection with the mobile terminal, so that the user can better use the electronic cigarette and improve the user experience.
  • the electronic cigarette control method further includes:
  • the “preset threshold” is a preset minimum amount of e-liquid that can prevent the electronic cigarette from being dry-burned.
  • the prompting device may be a speaker provided in the electronic cigarette and capable of emitting a prompt, or a buzzer provided in the electronic cigarette and capable of emitting an alarm sound.
  • An embodiment of the present application provides an electronic cigarette control method. By performing identity authentication on a generated first identity authentication code and a second identity authentication code obtained from an encrypted authentication unit, an electronic cigarette is controlled to be started or an electronic cigarette is prohibited from being started, effectively It prevents the mixing of the atomizer and the power supply device, improves the user experience, and protects the interests of businesses.
  • FIG. 11 is a schematic structural diagram of an electronic cigarette control device provided in an embodiment of the present application, which is applied to an electronic cigarette.
  • the electronic cigarette is the electronic cigarette described in the foregoing embodiment, and each of the devices provided in the embodiment of the present application The function of the module is performed by the above control unit, which is used for identity authentication of the atomizer and the power supply device.
  • the electronic cigarette control device includes:
  • a first generating module 900 configured to generate a first identity authentication code
  • a first obtaining module 910 where the first obtaining module 910 is configured to obtain a second identity authentication code from the encrypted authentication unit;
  • a first control module 920 where the first control module 920 is configured to perform identity authentication according to the first identity authentication code and the second identity authentication code, and if the identity authentication is passed, control the electronic cigarette to start,
  • the first generating module 900 further includes:
  • a second generating module 901 which is configured to generate random challenge data
  • a second obtaining module 902 configured to obtain pre-stored atomizer information from the encrypted authentication unit
  • a first calculation module 903 configured to calculate the random challenge data, the pre-stored atomizer information, and the pre-stored first key according to a pre-stored first encryption algorithm to generate the first identity Authentication Code.
  • the electronic cigarette control device further includes:
  • a sending module 930 the sending module 930 is configured to send the random challenge data to the encrypted authentication unit, so that the encrypted authentication unit fogs the random challenge data, the pre-stored atomization according to a pre-stored second encryption algorithm Device information and a pre-stored second key to perform calculation to generate the second identity authentication code.
  • the first control module 920 includes:
  • a comparison module 921 configured to compare the first identity authentication code and the second identity authentication code, and if the first identity authentication code and the second identity authentication code are consistent, the identity Certified,
  • the identity authentication fails.
  • the electronic cigarette control device further includes:
  • a third obtaining module 940 configured to obtain the number of puffs, the working time of the atomizer, and the working power of the atomizer after controlling the startup of the electronic cigarette;
  • a second calculation module 950 where the second calculation module 950 is configured to calculate an e-liquid consumption according to the working time of the atomizer and the working power of the atomizer;
  • An update module 960 which is configured to update the amount of smokeable oil, the number of smokeable mouths, and the number of smokers according to the amount of smoke oil consumption, the number of puffs, and the working time of the atomizer. The length of time that can be smoked.
  • the electronic cigarette control device further includes:
  • a second control module 970 which is configured to control the electronic cigarette to stop working or control the electronic cigarette to issue a reminder when the amount of suckable oil is less than a preset threshold.
  • the content of the device embodiment can refer to the method embodiment on the premise that the content does not conflict with each other, and will not be described one by one here.
  • the embodiment of the present application provides an electronic cigarette control device, which can effectively prevent the mixing of the atomizer and the power supply device, improve the user experience, and protect the interests of businesses.
  • FIG. 17 is a schematic diagram of the hardware structure of the control unit shown in FIG. 1.
  • the control unit 21 can execute an electronic cigarette control method described in the above embodiment, and can also implement an electronic cigarette described in the above embodiment. Control the functions of the various modules of the device.
  • control unit 21 includes:
  • One or more processors 211 and a memory 212 are taken as an example in FIG. 17.
  • the processor 211 and the memory 212 may be connected through a bus or in other manners. In FIG. 17, the connection through the bus is taken as an example.
  • the memory 212 is a non-volatile computer-readable storage medium, and can be used to store non-volatile software programs, non-volatile computer executable programs, and modules, such as an electronic cigarette control method in the foregoing embodiment of the present application.
  • Corresponding program instructions and a module corresponding to an electronic cigarette control device for example, a first generation module 900, a first acquisition module 910, a first control module 920, etc.
  • the processor 211 executes various functional applications and data processing of an electronic cigarette control method by running non-volatile software programs, instructions, and modules stored in the memory 212, that is, an electronic device in the foregoing method embodiment is implemented.
  • the memory 212 may include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required for at least one function; the storage data area may store data created according to the use of an electronic cigarette control device, and the like .
  • the stored data area further stores preset data, including a pre-stored first encryption algorithm, a pre-stored first key, a preset threshold, and the like.
  • the memory 212 may include a high-speed random access memory, and may further include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other non-volatile solid-state storage device.
  • the memory 212 may optionally include a memory remotely disposed with respect to the processor 211, and these remote memories may be connected to the processor 211 through a network. Examples of the above network include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
  • the program instructions and one or more modules are stored in the memory 212, and when executed by the one or more processors 211, perform each step of an electronic cigarette control method in any of the above method embodiments, Alternatively, the functions of each module of an electronic cigarette control device in any of the above device embodiments are realized.
  • the above product can execute the method provided by the foregoing embodiment of the present application, and has corresponding function modules and beneficial effects for executing the method.
  • the above product can execute the method provided by the foregoing embodiment of the present application, and has corresponding function modules and beneficial effects for executing the method.
  • An embodiment of the present application further provides a non-volatile computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are executed by one or more processors, such as FIG. 17
  • a processor 211 may cause a computer to execute each step of an electronic cigarette control method in any of the foregoing method embodiments, or implement functions of each module of an electronic cigarette control device in any of the foregoing device embodiments.
  • An embodiment of the present application further provides a computer program product.
  • the computer program product includes a computer program stored on a non-volatile computer-readable storage medium.
  • the computer program includes program instructions.
  • multiple processors, such as a processor 211 in FIG. 17, may cause a computer to execute each step of an electronic cigarette control method in any of the foregoing method embodiments, or implement one of the foregoing device embodiments Functions of each module of the electronic cigarette control device.
  • the device embodiments described above are only schematic, and the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical units, which may be located in One place, or it can be distributed across multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • the embodiments can be implemented by means of software plus a general hardware platform, and of course, also by hardware.
  • the program can be stored in a computer-readable storage medium, and the program is being executed. In this case, the process of implementing the methods as described above may be included.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a random access memory (RandomAccess Memory, RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Power Engineering (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Power Sources (AREA)
  • Stored Programmes (AREA)

Abstract

一种电子烟(100)控制方法及电子烟(100)。电子烟(100)包括雾化器(10)和电源装置(20),雾化器(10)设置有加密认证单元(11),电源装置(20)设置有控制单元(21),当雾化器(10)和电源装置(20)连接时,加密认证单元(11)和控制单元(21)通信连接;电子烟(100)控制方法则包括:生成第一身份认证码(S100);从加密认证单元(11)获取第二身份认证码(S120);根据第一身份认证码和第二身份认证码进行身份认证(S130),若身份认证通过,则控制电子烟(100)启动(S150a),若身份认证未通过,则禁止电子烟(100)启动(S150b)。通过上述方式能够有效地防止雾化器(10)和电源装置(20)的混用,提高用户体验。

Description

一种电子烟控制方法及电子烟
本申请要求于2018年9月21日提交中国专利局,申请号为2018111057529,发明名称为“一种电子烟控制方法及电子烟”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及电子烟技术领域,特别是涉及一种电子烟控制方法及电子烟。
背景技术
电子烟是一种能够对尼古丁等雾化基质进行加热以产生气溶胶供用户吸食的产品,一般包括雾化器和电源装置,通过电源装置为雾化器供电以使雾化器对雾化基质加热产生气溶胶。其中,雾化器和电源装置之间能够进行可拆卸连接,也能够进行不可拆卸连接。
对于可拆卸连接的雾化器和电源装置,容易将不同型号、不同品牌的雾化器和电源装置安装在一起使用,进而容易造成电子烟功能上的混乱和错误,影响用户体验和商家利益。
于是,如何防止雾化器和电源装置的混用是目前亟待解决的技术问题。
发明内容
本申请实施例旨在提供一种电子烟控制方法及电子烟,能够通过对雾化器和电源装置进行身份认证有效地防止雾化器和电源装置的混用。
为解决上述技术问题,本申请实施例采用的一个技术方案是:提供一种电子烟控制方法,所述电子烟包括雾化器和电源装置,所述雾化器设置有加密认证单元,所述电源装置设置有控制单元,当所述雾化器和所述电源装置连接时,所述加密认证单元和所述控制单元通信连接;
所述电子烟控制方法包括:
生成第一身份认证码;
从所述加密认证单元获取第二身份认证码;
根据所述第一身份认证码和所述第二身份认证码进行身份认证,若所述身份认证通过,则控制所述电子烟启动,
若所述身份认证未通过,则禁止所述电子烟启动。
可选地,所述生成第一身份认证码包括:
生成随机质询数据;
从所述加密认证单元获取预存雾化器信息;
根据预存第一加密算法对所述随机质询数据、所述预存雾化器信息以及预存第一密钥进行计算,生成所述第一身份认证码。
可选地,所述从所述加密认证单元获取第二身份认证码的步骤之前,所述方法还包括:
将所述随机质询数据发送至所述加密认证单元,以使所述加密认证单元根据预存第二加密算法对所述随机质询数据、所述预存雾化器信息以及预存第二密钥进行计算,生成所述第二身份认证码。
可选地,所述预存第一加密算法和所述预存第二加密算法均为安全散列算法。
可选地,所述第一身份认证码和所述第二身份认证码均为信息验证码或者MAC码。
可选地,所述预存雾化器信息包括厂家信息、版本信息、生产信息和烟油类型。
可选地,所述根据所述第一身份认证码和所述第二身份认证码进行身份认证包括:
比较所述第一身份认证码和所述第二身份认证码,若所述第一身份认证码和所述第二身份认证码一致,则所述身份认证通过,
若所述第一身份认证码和所述第二身份认证码不一致,则所述身份认证未通过。
可选地,所述预存雾化器信息包括可抽吸口数、可抽吸时长和可抽吸油量,所述方法还包括:
当控制所述电子烟启动后,获取抽吸次数、所述雾化器工作时长以 及所述雾化器工作功率;
根据所述雾化器工作时长和所述雾化器工作功率,计算烟油消耗量;
根据所述烟油消耗量、所述抽吸次数以及所述雾化器工作时长,更新所述可抽吸油量、所述可抽吸口数以及所述可抽吸时长。
可选地,所述方法还包括:
当所述可抽吸油量小于预设阈值时,控制所述电子烟停止工作或者控制所述电子烟发出提示。
为解决上述技术问题,本申请实施例采用的另一个技术方案是:提供一种电子烟控制装置,所述电子烟包括雾化器和电源装置,所述雾化器设置有加密认证单元,所述电源装置设置有控制单元,当所述雾化器和所述电源装置连接时,所述加密认证单元和所述控制单元通信连接;
所述电子烟控制装置包括:
第一生成模块,用于生成第一身份认证码;
第一获取模块,用于从所述加密认证单元获取第二身份认证码;
第一控制模块,用于根据所述第一身份认证码和所述第二身份认证码进行身份认证,若所述身份认证通过,则控制所述电子烟启动,
若所述身份认证未通过,则禁止所述电子烟启动。
可选地,所述第一生成模块具体包括:
第二生成模块,用于生成随机质询数据;
第二获取模块,用于从所述加密认证单元获取预存雾化器信息;
第一计算模块,用于根据预存第一加密算法对所述随机质询数据、所述预存雾化器信息以及预存第一密钥进行计算,生成所述第一身份认证码。
可选地,所述装置还包括:
发送模块,用于在从所述加密认证单元获取第二身份认证码之前,将所述随机质询数据发送至所述加密认证单元,以使所述加密认证单元根据预存第二加密算法对所述随机质询数据、所述预存雾化器信息以及预存第二密钥进行计算,生成所述第二身份认证码。
可选地,所述第一控制模块具体包括:
比较模块,用于比较所述第一身份认证码和所述第二身份认证码,若所述第一身份认证码和所述第二身份认证码一致,则所述身份认证通过,
若所述第一身份认证码和所述第二身份认证码不一致,则所述身份认证未通过。
可选地,所述预存雾化器信息包括可抽吸口数、可抽吸时长和可抽吸油量,所述装置还包括:
第三获取模块,用于在控制所述电子烟启动后,获取抽吸次数、所述雾化器工作时长以及所述雾化器工作功率;
第二计算模块,用于根据所述雾化器工作时长和所述雾化器工作功率,计算烟油消耗量;
更新模块,用于根据所述烟油消耗量、所述抽吸次数以及所述雾化器工作时长,更新所述可抽吸油量、所述可抽吸口数以及所述可抽吸时长。
可选地,所述装置还包括:
第二控制模块,用于当所述可抽吸油量小于预设阈值时,控制所述电子烟停止工作或者控制所述电子烟发出提示。
为解决上述技术问题,本申请实施例采用的另一个技术方案是:提供一种雾化器,用于与电源装置匹配连接,包括:
加热体,用于在通电时雾化雾化基质;
加密认证单元,可与所述电源装置中的控制单元通信连接,所述加密认证单元包括加密模块和存储模块,所述加密模块与所述存储模块连接;
其中所述加密模块用于在所述加密认证单元与所述电源装置中的控制单元通信连接时生成第二身份认证码并反馈给所述控制单元。
为解决上述技术问题,本申请实施例采用的另一个技术方案是:提供一种电子烟,包括:
雾化器,所述雾化器设置有加密认证单元;以及,
电源装置,所述电源装置设置有控制单元;
所述雾化器和所述电源装置连接,并且所述加密认证单元和所述控制单元通信连接;
所述控制单元包括至少一个处理器,以及,
与所述至少一个处理器通信连接的存储器,其中,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行以上所述的方法。
为解决上述技术问题,本申请实施例采用的另一个技术方案是:提供一种非易失性计算机可读存储介质,所述非易失性计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使电子烟执行以上所述的方法。
本申请实施例的有益效果是:区别于现有技术的情况下,本申请实施例提供一种电子烟控制方法及电子烟,所述电子烟控制方法通过对生成的第一身份认证码和从加密认证单元获取的第二身份认证码进行身份认证,来控制电子烟启动或者禁止电子烟启动,当身份认证通过时雾化器和电源装置匹配,则控制电子烟启动,当身份认证未通过时雾化器和电源装置不匹配,则禁止电子烟启动,有效地防止了雾化器和电源装置的混用,提高用户体验,并保障商家利益。
附图说明
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定,附图中具有相同参考数字标号的元件表示为类似的元件,除非有特别申明,附图中的图不构成比例限制。
图1是本申请实施例提供的一种电子烟的结构示意图;
图2是图1所示的电子烟中的加密认证单元的结构示意图;
图3是图1所示的电子烟中的加密认证单元的另一结构示意图;
图4是加密认证单元和控制单元的连接结构示意图;
图5是本申请实施例提供的一种电子烟控制方法的流程示意图;
图6是步骤S100的方法流程示意图;
图7是本申请另一实施例提供的一种电子烟控制方法的部分流程示意图;
图8是步骤S130的方法流程示意图;
图9是本申请又一实施例提供的一种电子烟控制方法的部分流程示意图;
图10是本申请再一实施例提供的一种电子烟控制方法的部分流程示意图;
图11是本申请实施例提供的一种电子烟控制装置的结构示意图;
图12是图11所示的第一生成模块的结构示意图;
图13是本申请另一实施例提供的一种电子烟控制装置的结构示意图;
图14是图11所示的第一控制模块的结构示意图;
图15是本申请又一实施例提供的一种电子烟控制装置的部分结构示意图;
图16是本申请再一实施例提供的一种电子烟控制装置的部分结构示意图;
图17是图1所示的控制单元的硬件结构示意图。
具体实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整的描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
需要说明的是,当元件被表述“固定于”另一个元件,它可以直接在另一个元件上、或者其间可以存在一个或多个居中的元件。当一个元件被表述“连接”另一个元件,它可以是直接连接到另一个元件、或者 其间可以存在一个或多个居中的元件。本说明书所使用的术语“垂直的”、“水平的”、“左”、“右”以及类似的表述只是为了说明的目的。
此外,下面所描述的本申请各个实施例中所涉及到的技术特征只要彼此之间未构成冲突就可以相互组合。
实施例一
请参阅图1,是本申请实施例提供的一种电子烟的结构示意图,该电子烟100包括:雾化器10和电源装置20,雾化器10和电源装置20可拆卸连接,电源装置20用于为雾化器10供电,雾化器10则用于根据电源装置20提供的电能发热以加热雾化基质产生气溶胶。
具体地,雾化器10设置有加密认证单元11和加热体12。
该加密认证单元11设置于雾化器10用于与电源装置20连接的一端端部,包括加密模块111、存储模块112和印刷电路板(Printed Circuit Board,PCB)113,该加密模块111和存储模块112连接。
其中,加密模块111为加密芯片;存储模块112为存储芯片或者为加密芯片中的存储空间。
请参阅图2,当存储模块112为存储芯片时,加密芯片和存储芯片均布设于印刷电路板113上。
请参阅图3,当存储模块112为加密芯片中的存储空间时,加密芯片布设与印刷电路板113上。
加密模块111用于存储预存第二密钥和预存第二加密算法,还用于生成第二身份认证码。
存储模块112则用于存储预存雾化器信息,所述预存雾化器信息包括厂家信息、版本信息、生产信息、烟油类型、可抽吸口数、可抽吸时长和可抽吸油量等。
加热体12则设置于雾化器10内,可以为发热线圈、发热片等能够通电产热的元件,用于发热后将雾化基质雾化成气溶胶。
雾化器10与电源装置20连接时,加密认证单元11和加热体12均与电源装置20连接导通,电源装置20能够为加密认证单元11和加热 体12供电,使得加密认证单元11能够执行生成第二身份认证码的方法、加热体12能够发热以加热雾化基质产生气溶胶。
电源装置20则包括控制单元21、电源22和连接件23,控制单元21、电源22以及连接件23相互连接。
其中,控制单元21可以为控制器等能够完成协调和指挥系统工作的电子元器件。
该控制单元21用于存储预存第一加密算法和预存第一密钥,还用于执行电子烟控制方法,以对雾化器10和电源装置20进行身份认证,并根据身份认证结果控制电子烟工作状态。
电源22则可以为化学电源,比如:干电池、铅酸蓄电池、锂离子电池等,当雾化器10与电源装置20连接后,电源22用于为雾化器10供电,以使雾化器10对雾化基质进行加热产生气溶胶。
连接件23则设置于电源装置20用于与雾化器10连接的一端端部,该连接件23可以为弹簧顶针、弹片、金手指等能够实现电路导通的元器件。
雾化器10与电源装置20连接时,加密认证单元11与连接件23连接,使得加密认证单元11通过连接件23与电源22和控制单元21导通,此时,电源22能够为加密认证单元11供电,加密认证单元11与控制单元21通信连接(如图4所示),使得控制单元21能够利用加密认证单元11生成的第二身份认证码进行身份认证;加热体12与电源22连接,通过控制单元21控制电源22向加热体12输出的功率来控制加热体12的发热情况,也即控制电子烟工作状态,包括控制电子烟启动和禁止电子烟启动。
其中,加密认证单元11与控制单元21之间能够进行有线通信连接或者无线通信连接。有线通信连接包括I2C总线、1-Wire总线等方式;无线通信连接包括蓝牙、3G、4G、WiFi等方式。
加密认证单元11与控制单元21通信连接后,控制单元21执行电子烟控制方法,对雾化器10和电源装置20进行身份认证,并根据身份认证结果控制电子烟工作状态,具体地:
控制单元21生成第一身份认证码,并从加密认证单元11获取第二身份认证码,然后控制单元21根据第一身份认证码和第二身份认证码进行身份认证,若身份认证通过,则控制电子烟启动,若身份认证未通过,则禁止电子烟启动。
其中,控制单元21生成第一身份认证码具体为:控制单元21生成随机质询数据,并从加密认证单元11获取预存雾化器信息,该预存雾化器信息包括厂家信息、版本信息、生产信息以及烟油类型等,然后控制单元21根据预存第一加密算法对所生成的随机质询数据、所获取的预存雾化器信息以及预存第一密钥进行计算,生成第一身份认证码。
同时,控制单元21还将所生成的随机质询数据发送至加密认证单元11,使得加密认证单元11根据预存第二加密算法对预存雾化器信息、预存第二密钥以及所接收的随机质询数据进行计算,生成第二身份认证码,此时,加密认证单元11所生成的第二身份认证码即控制单元21所要获取的第二身份认证码。
在加密认证单元11生成第二身份认证码的过程中,所述预存雾化器信息包括厂家信息、版本信息、生产信息以及烟油类型等。
进一步地,预存第一加密算法和预存第二加密算法均为安全散列算法(SHA),优选地,该预存第一加密算法和预存第二加密算法为SHA-256。
第一身份认证码和第二身份认证码则为信息验证码或者MAC码,其均基于预存雾化器信息计算得到,故第一身份认证码和第二身份认证码表征的是同一雾化器的“身份”。而第一身份认证码是在电源装置20端通过预存第一密钥和所获取的预存雾化器信息计算得到,第二身份认证码是在雾化器10端通过预存第二密钥和预存雾化器信息计算得到,即第一身份认证码和第二身份认证码分别从电源装置20端和雾化器10端表征雾化器“身份”,当第一身份认证码和第二身份认证码匹配时,预存第一密钥和预存第二密钥匹配,即表示电源装置20和雾化器10匹配,故能够通过第一身份认证码和第二身份认证码对电源装置20和雾化器10进行身份认证。
优选地,将预存第一密钥和预存第二密钥完全相同时的电源装置20 和雾化器10确定为匹配,此时,第一身份认证码和第二身份认证码应完全相同。故控制单元21在根据第一身份认证码和第二身份认证码进行身份认证时,具体包括:
控制单元21比较第一身份认证码和第二身份认证码,若第一身份认证码和第二身份认证码一致,则身份认证通过,控制单元21控制电源22向加热体12输出指定功率以使加热体12发热,电子烟启动;若第一身份认证码和第二身份认证码不一致,则身份认证未通过,控制单元21控制电源22向加热体12输出功率为0,以使加热体12不发热,禁止电子烟启动。
进一步地,控制单元21在接收启动指令时生成第一身份认证码以及从加密认证单元11获取第二身份认证码,完成雾化器10和电源装置20的身份认证。其中,启动指令为用户按压电子烟的点火键而产生的指令。
当然,在一些可替代实施例中,控制单元21能够在与加密认证单元11通信连接时,生成第一身份认证码以及从加密认证单元11获取第二身份认证码,完成雾化器10和电源装置20的身份认证。
当然,在另一些可替代实施例中,控制单元21还能够根据预设时间间隔生成第一身份认证码以及从加密认证单元11获取第二身份认证码,完成雾化器10和电源装置20的身份认证。
进一步地,当身份认证通过,控制单元21控制电子烟启动后,控制单元21能够获取抽吸次数、雾化器工作时长以及雾化器工作功率,并根据雾化器工作时长和雾化器工作功率,计算烟油消耗量,然后控制单元21根据所获取的抽吸次数、雾化器工作时长以及所计算的烟油消耗量,更新所获取的预存雾化器信息,包括可抽吸口数、可抽吸时长和可抽吸油量。
进一步地,控制单元21更新可抽吸口数、可抽吸时长和可抽吸油量后,将更新后的可抽吸口数、可抽吸时长和可抽吸油量,发送至加密认证单元11中进行存储,替换加密认证单元11中原本存储的可抽吸口数、可抽吸时长和可抽吸油量。
进一步地,控制单元21在每次启动电子烟或者关闭电子烟时,获取加密认证单元11中存储的可抽吸油量,并将所获取的可抽吸油量与预设阈值进行比较,若可抽吸油量小于预设阈值,则控制单元21控制电子烟停止工作,即控制单元21控制电源22向加热体12输出功率为0。
当然,在一些实施例中,电子烟中设置有提示装置时,控制单元21能够在可抽吸油量小于预设阈值时,控制提示装置发出提示。所述提示装置可以为能够发出提示语的扬声器,也可以为能够发出警报声的蜂鸣器等。
进一步地,在一些实施例中,控制单元21能够根据每次工作过程中的抽吸次数、雾化器工作时长、雾化器工作功率、烟油消耗量以及烟油类型等分析用户的抽烟习惯,生成抽烟报告和健康抽烟建议报告,并通过与移动终端建立通信连接将所生成的抽烟报告和健康抽烟建议报告发送至移动终端,以使用户能够更好的使用电子烟,提高用户体验。
本申请实施例提供一种电子烟,通过在该电子烟的雾化器中设置加密认证单元,在电源装置中设置控制单元,并使得加密认证单元和控制单元在雾化器和电源装置连接时进行通信连接,使得控制单元执行电子烟控制方法来对雾化器和电源装置进行身份认证,有效地防止了雾化器和电源装置的混用,提高用户体验,并保障商家利益。
实施例二
请参阅图5,是本申请实施例提供的一种电子烟控制方法的流程示意图,应用于电子烟,该电子烟为上述实施例中所述的电子烟,而本申请实施例提供的方法由电子烟中的控制单元21执行,用于对雾化器和电源装置进行身份认证,该电子烟控制方法包括:
S100:生成第一身份认证码。
上述“第一身份认证码”为在电源装置端计算生成的信息验证码或者MAC码,能够在电源装置端表征雾化器的“身份”。
请参阅图6,上述“生成第一身份认证码”具体包括:
S101:生成随机质询数据。
上述“随机质询数据”即质询-响应机制中用于质询而产生的随机数,每次生成的随机质询数据不固定。
S102:从所述加密认证单元获取预存雾化器信息。
上述“预存雾化器信息”即存储于雾化器加密认证单元中的雾化器的基本信息,包括厂家信息、版本信息、生产信息和烟油类型等。
S103:根据预存第一加密算法对所述随机质询数据、所述预存雾化器信息以及预存第一密钥进行计算,生成所述第一身份认证码。
上述“预存第一加密算法”为存储于电源装置控制单元中的安全散列算法(SHA),优选地,该预存第一加密算法为SHA-256。
利用SHA-256对随机质询数据、预存雾化器信息以及预存第一密钥进行计算,生成第一身份认证码。由于随机质询数据随机产生,使得每次计算得到的第一身份认证码不为固定值,能够根据每次随机质询数据的不同而不同。
S120:从所述加密认证单元获取第二身份认证码。
上述“第二身份认证码”为在雾化器端计算生成的信息验证码或者MAC码,能够在雾化器端表征雾化器的“身份”。
请参阅图7,在步骤S120之前,该电子烟控制方法还包括:
S110:将所述随机质询数据发送至所述加密认证单元,以使所述加密认证单元根据预存第二加密算法对所述随机质询数据、所述预存雾化器信息以及预存第二密钥进行计算,生成所述第二身份认证码。
上述“预存雾化器信息”即存储于雾化器加密认证单元中的雾化器的基本信息,包括厂家信息、版本信息、生产信息和烟油类型等。
上述“预存第二加密算法”为存储于雾化器加密认证单元中的安全散列算法(SHA),优选地,该预存第二加密算法为SHA-256。
利用SHA-256对随机质询数据、预存雾化器信息以及预存第二密钥进行计算,生成第二身份认证码。
由于随机质询数据的随机性较强,为了保证第一身份认证码和第二身份认证码的匹配与预存第一密钥和预存第二密钥的匹配相关,将用于计算生成第一身份认证码的随机质询数据发送至加密认证单元,以使得 加密认证单元利用相同的随机质询数据计算生成第二身份认证码。此时,若第一身份认证码和第二身份认证码匹配,则预存第一密钥和预存第二密钥匹配,即表示电源装置和雾化器匹配,故能够通过第一身份认证码和第二身份认证码对电源装置20和雾化器10进行身份认证。
在一些实施例中,在接收启动指令时,就生成第一身份认证码以及从加密认证单元获取第二身份认证码。
当然,在一些可替代实施例中,能够在控制单元与加密认证单元通信连接时,就生成第一身份认证码以及从加密认证单元获取第二身份认证码。
当然,在另一些可替代实施例中,还能够根据预设时间间隔生成第一身份认证码以及从加密认证单元获取第二身份认证码。
S130:根据所述第一身份认证码和所述第二身份认证码进行身份认证。
请参阅图8,上述“根据所述第一身份认证码和所述第二身份认证码进行身份认证”具体包括:
S131:比较所述第一身份认证码和所述第二身份认证码;
S132:判断所述第一身份认证码和所述第二身份认证码是否一致;
S133a:若所述第一身份认证码和所述第二身份认证码一致,则身份认证通过;
S133b:若所述第一身份认证码和所述第二身份认证码不一致,则身份认证未通过。
在本申请实施例中,将预存第一密钥和预存第二密钥完全相同时的电源装置和雾化器确定为匹配,此时,第一身份认证码和第二身份认证码相同,故根据第一身份认证码和第二身份认证码进行身份认证时,比较第一身份认证码和第二身份认证码是否相同。
S140:判断身份认证是否通过;
S150a:若身份认证通过,则控制所述电子烟启动;
S150b:若身份认证未通过,则禁止所述电子烟启动。
通过判断第一身份认证码和第二身份认证码是否一致来判断身份 认证是否通过,若第一身份认证码和第二身份认证码一致,则身份认证通过,控制电子烟启动;若第一身份认证码和第二身份认证码不一致,则身份认证未通过,禁止电子烟启动。
进一步地,请参阅图9,在一些实施例中,该电子烟控制方法还包括:
S160:当控制所述电子烟启动后,获取抽吸次数、所述雾化器工作时长以及所述雾化器工作功率。
上述“抽吸次数”即用户在电子烟启动到关闭的过程中抽吸电子烟的口数,能够通过气流流量的变化曲线统计抽吸次数,每个波峰或者波谷统计为1次。该抽吸次数能够使用流量传感器获取。
上述“雾化器工作时长”即用户启动电子烟到关闭电子烟的时间,该雾化器工作时长能够使用计时器获取,每当电子烟启动时计时器开始计时,当电子烟关闭时计时器结束计时,其差值即雾化器工作时长。
上述“雾化器工作功率”即电子烟在启动到关闭的过程中电源向加热体输出的功率。
S170:根据所述雾化器工作时长和所述雾化器工作功率,计算烟油消耗量。
上述“烟油消耗量”即烟油在电子烟工作过程中的使用量,其能够通过雾化器工作时长和雾化器在该雾化器工作时长内的工作功率计算得到。
S180:根据所述烟油消耗量、所述抽吸次数以及所述雾化器工作时长,更新所述可抽吸油量、所述可抽吸口数以及所述可抽吸时长。
在预存雾化器信息中还包括:可抽吸口数、可抽吸时长和可抽吸油量。
在每次电子烟工作结束后,根据获取的抽吸次数更新所获取的预存雾化器信息中的可抽吸口数,具体地,将可抽吸口数减去抽吸次数;根据获取的雾化器工作时长更新所获取的预存雾化器信息中的可抽吸时长,具体地,将可抽吸时长减去雾化器工作时长;根据计算的烟油消耗量更新所获取的预存雾化器信息中的可抽吸油量,具体地,将可抽吸油 量减去烟油消耗量。
然后,将更新后的可抽吸口数、可抽吸时长和可抽吸油量发送至加密认证单元11中进行存储,替换加密认证单元11中原本存储的可抽吸口数、可抽吸时长和可抽吸油量。
当然,在一些实施例中,还能够根据电子烟每次工作过程中的抽吸次数、雾化器工作时长、雾化器工作功率、烟油消耗量以及烟油类型等分析用户的抽烟习惯,生成抽烟报告和健康抽烟建议报告,并通过与移动终端建立通信连接将所生成的抽烟报告和健康抽烟建议报告发送至移动终端,以使用户能够更好的使用电子烟,提高用户体验。
进一步地,请参阅图10,在一些实施例中,该电子烟控制方法还包括:
S190:当所述可抽吸油量小于预设阈值时,控制所述电子烟停止工作或者控制所述电子烟发出提示。
上述“预设阈值”为预先设定的能够防止电子烟干烧的最小烟油量。
在每次启动电子烟或者关闭电子烟时,获取加密认证单元中存储的可抽吸油量,并将所获取的可抽吸油量与预设阈值进行比较,若可抽吸油量小于预设阈值,则控制电子烟停止工作,或者控制提示装置发出提示。其中,提示装置可以为设置于电子烟中的能够发出提示语的扬声器,也可以为设置于电子烟中的能够发出警报声的蜂鸣器等。
本申请实施例提供一种电子烟控制方法,通过对生成的第一身份认证码和从加密认证单元获取的第二身份认证码进行身份认证,来控制电子烟启动或者禁止电子烟启动,有效地防止了雾化器和电源装置的混用,提高用户体验,并保障商家利益。
实施例三
请参阅图11,是本申请实施例提供的一种电子烟控制装置的结构示意图,应用于电子烟,该电子烟为上述实施例中所述的电子烟,而本申请实施例提供的装置各个模块的功能由上述控制单元执行,用于对雾化器和电源装置进行身份认证,该电子烟控制装置包括:
第一生成模块900,所述第一生成模块900用于生成第一身份认证码;
第一获取模块910,所述第一获取模块910用于从所述加密认证单元获取第二身份认证码;
第一控制模块920,所述第一控制模块920用于根据所述第一身份认证码和所述第二身份认证码进行身份认证,若所述身份认证通过,则控制所述电子烟启动,
若所述身份认证未通过,则禁止所述电子烟启动。
请参阅图12,该第一生成模块900还包括:
第二生成模块901,所述第二生成模块901用于生成随机质询数据;
第二获取模块902,所述第二获取模块902用于从所述加密认证单元获取预存雾化器信息;
第一计算模块903,所述第一计算模块903用于根据预存第一加密算法对所述随机质询数据、所述预存雾化器信息以及预存第一密钥进行计算,生成所述第一身份认证码。
请参阅图13,该电子烟控制装置还包括:
发送模块930,所述发送模块930用于将所述随机质询数据发送至所述加密认证单元,以使所述加密认证单元根据预存第二加密算法对所述随机质询数据、所述预存雾化器信息以及预存第二密钥进行计算,生成所述第二身份认证码。
请参阅图14,该第一控制模块920包括:
比较模块921,所述比较模块921用于比较所述第一身份认证码和所述第二身份认证码,若所述第一身份认证码和所述第二身份认证码一致,则所述身份认证通过,
若所述第一身份认证码和所述第二身份认证码不一致,则所述身份认证未通过。
请参阅图15,该电子烟控制装置还包括:
第三获取模块940,所述第三获取模块940用于当控制所述电子烟启动后,获取抽吸次数、所述雾化器工作时长以及所述雾化器工作功率;
第二计算模块950,所述第二计算模块950用于根据所述雾化器工作时长和所述雾化器工作功率,计算烟油消耗量;
更新模块960,所述更新模块960用于根据所述烟油消耗量、所述抽吸次数以及所述雾化器工作时长,更新所述可抽吸油量、所述可抽吸口数以及所述可抽吸时长。
请参阅图16,该电子烟控制装置还包括:
第二控制模块970,所述第二控制模块用于当所述可抽吸油量小于预设阈值时,控制所述电子烟停止工作或者控制所述电子烟发出提示。
由于装置实施例和方法实施例是基于同一构思,在内容不互相冲突的前提下,装置实施例的内容可以引用方法实施例的,在此不再一一赘述。
本申请实施例提供一种电子烟控制装置,能够有效地防止雾化器和电源装置的混用,提高用户体验,并保障商家利益。
实施例四
请参阅图17,是图1所示的控制单元的硬件结构示意图,该控制单元21能够执行以上实施例所述的一种电子烟控制方法,还能实现以上实施例所述的一种电子烟控制装置的各个模块的功能。
如图17所示,该控制单元21包括:
一个或多个处理器211以及存储器212。其中,图17中以一个处理器211为例。
处理器211和存储器212可以通过总线或者其他方式连接,图17中以通过总线连接为例。
存储器212作为一种非易失性计算机可读存储介质,可用于存储非易失性软件程序、非易失性计算机可执行程序以及模块,如本申请上述实施例中的一种电子烟控制方法对应的程序指令以及一种电子烟控制装置对应的模块(例如,第一生成模块900、第一获取模块910和第一控制模块920等)。处理器211通过运行存储在存储器212中的非易失性软件程序、指令以及模块,从而执行一种电子烟控制方法的各种功能 应用以及数据处理,即实现上述方法实施例中的一种电子烟控制方法以及上述装置实施例的各个模块的功能。
存储器212可以包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需要的应用程序;存储数据区可存储根据一种电子烟控制装置的使用所创建的数据等。
所述存储数据区还存储有预设的数据,包括预存第一加密算法、预存第一密钥和预设阈值等。
此外,存储器212可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实施例中,存储器212可选包括相对于处理器211远程设置的存储器,这些远程存储器可以通过网络连接至处理器211。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
所述程序指令以及一个或多个模块存储在所述存储器212中,当被所述一个或者多个处理器211执行时,执行上述任意方法实施例中的一种电子烟控制方法的各个步骤,或者,实现上述任意装置实施例中的一种电子烟控制装置的各个模块的功能。
上述产品可执行本申请上述实施例所提供的方法,具备执行方法相应的功能模块和有益效果。未在本实施例中详尽描述的技术细节,可参见本申请上述实施例所提供的方法。
本申请实施例还提供了一种非易失性计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行指令,该计算机可执行指令被一个或多个处理器执行,例如图17中的一个处理器211,可使得计算机执行上述任意方法实施例中的一种电子烟控制方法的各个步骤,或者,实现上述任意装置实施例中的一种电子烟控制装置的各个模块的功能。
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在非易失性计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被一个或多个处理器执行,例如图17中的一个处理器211,可使得计算机执行上述任意方法实施例中的一 种电子烟控制方法的各个步骤,或者,实现上述任意装置实施例中的一种电子烟控制装置的各个模块的功能。
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
通过以上的实施例的描述,本领域普通技术人员可以清楚地了解到各实施例可借助软件加通用硬件平台的方式来实现,当然也可以通过硬件。本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程是可以通过计算机程序指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施方法的流程。其中,所述存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(RandomAccessMemory,RAM)等。
以上所述仅为本申请的实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (12)

  1. 一种电子烟控制方法,其特征在于,所述电子烟包括雾化器和电源装置,所述雾化器设置有加密认证单元,所述电源装置设置有控制单元,当所述雾化器和所述电源装置连接时,所述加密认证单元和所述控制单元通信连接;
    所述电子烟控制方法包括:
    生成第一身份认证码;
    从所述加密认证单元获取第二身份认证码;
    根据所述第一身份认证码和所述第二身份认证码进行身份认证,若所述身份认证通过,则控制所述电子烟启动,
    若所述身份认证未通过,则禁止所述电子烟启动。
  2. 根据权利要求1所述的电子烟控制方法,其特征在于,所述生成第一身份认证码包括:
    生成随机质询数据;
    从所述加密认证单元获取预存雾化器信息;
    根据预存第一加密算法对所述随机质询数据、所述预存雾化器信息以及预存第一密钥进行计算,生成所述第一身份认证码。
  3. 根据权利要求2所述的电子烟控制方法,其特征在于,所述从所述加密认证单元获取第二身份认证码的步骤之前,所述方法还包括:
    将所述随机质询数据发送至所述加密认证单元,以使所述加密认证单元根据预存第二加密算法对所述随机质询数据、所述预存雾化器信息以及预存第二密钥进行计算,生成所述第二身份认证码。
  4. 根据权利要求3所述的电子烟控制方法,其特征在于,所述预存第一加密算法和所述预存第二加密算法均为安全散列算法。
  5. 根据权利要求3所述的电子烟控制方法,其特征在于,所述第一身份认证码和所述第二身份认证码均为信息验证码或者MAC码。
  6. 根据权利要求2或3所述的电子烟控制方法,其特征在于,所述预存雾化器信息包括厂家信息、版本信息、生产信息和烟油类型。
  7. 根据权利要求1-6任意一项所述的电子烟控制方法,其特征在于,所述根据所述第一身份认证码和所述第二身份认证码进行身份认证包括:
    比较所述第一身份认证码和所述第二身份认证码,若所述第一身份认证码和所述第二身份认证码一致,则所述身份认证通过,
    若所述第一身份认证码和所述第二身份认证码不一致,则所述身份认证未通过。
  8. 根据权利要求2-7任意一项所述的电子烟控制方法,其特征在于,所述预存雾化器信息包括可抽吸口数、可抽吸时长和可抽吸油量,所述方法还包括:
    当控制所述电子烟启动后,获取抽吸次数、所述雾化器工作时长以及所述雾化器工作功率;
    根据所述雾化器工作时长和所述雾化器工作功率,计算烟油消耗量;
    根据所述烟油消耗量、所述抽吸次数以及所述雾化器工作时长,更新所述可抽吸油量、所述可抽吸口数以及所述可抽吸时长。
  9. 根据权利要求8所述的电子烟控制方法,其特征在于,所述方法还包括:
    当所述可抽吸油量小于预设阈值时,控制所述电子烟停止工作或者控制所述电子烟发出提示。
  10. 一种电子烟控制装置,其特征在于,所述电子烟包括雾化器和电源装置,所述雾化器设置有加密认证单元,所述电源装置设置有控制单元,当所述雾化器和所述电源装置连接时,所述加密认证单元和所述控制单元通信连接;
    所述电子烟控制装置包括:
    第一生成模块,用于生成第一身份认证码;
    第一获取模块,用于从所述加密认证单元获取第二身份认证码;
    第一控制模块,用于根据所述第一身份认证码和所述第二身份认证码进行身份认证,若所述身份认证通过,则控制所述电子烟启动,
    若所述身份认证未通过,则禁止所述电子烟启动。
  11. 一种雾化器,用于与电源装置匹配连接,其特征在于,包括:
    加热体,用于在通电时雾化雾化基质;
    加密认证单元,可与所述电源装置中的控制单元通信连接,所述加密认证单元包括加密模块和存储模块,所述加密模块与所述存储模块连接;
    其中所述加密模块用于在所述加密认证单元与所述电源装置中的控制单元通信连接时生成第二身份认证码并反馈给所述控制单元。
  12. 一种电子烟,其特征在于,包括:
    雾化器,所述雾化器设置有加密认证单元;以及,
    电源装置,所述电源装置设置有控制单元;
    所述雾化器和所述电源装置连接,并且所述加密认证单元和所述控制单元通信连接;
    所述控制单元包括至少一个处理器,以及,
    与所述至少一个处理器通信连接的存储器,其中,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行权利要求1-9任意一项所述的方法。
PCT/CN2019/107034 2018-09-21 2019-09-20 一种电子烟控制方法及电子烟 WO2020057640A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP19862393.6A EP3854237A4 (en) 2018-09-21 2019-09-20 ELECTRONIC CIGARETTE AND ELECTRONIC CIGARETTE ORDERING PROCESS
US17/277,765 US20210345682A1 (en) 2018-09-21 2019-09-20 Electronic cigarette control method and electronic cigarette

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811105752.9A CN109315837A (zh) 2018-09-21 2018-09-21 一种电子烟控制方法及电子烟
CN201811105752.9 2018-09-21

Publications (1)

Publication Number Publication Date
WO2020057640A1 true WO2020057640A1 (zh) 2020-03-26

Family

ID=65265685

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/107034 WO2020057640A1 (zh) 2018-09-21 2019-09-20 一种电子烟控制方法及电子烟

Country Status (4)

Country Link
US (1) US20210345682A1 (zh)
EP (1) EP3854237A4 (zh)
CN (1) CN109315837A (zh)
WO (1) WO2020057640A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112369703A (zh) * 2020-11-23 2021-02-19 武汉瑞纳捷电子技术有限公司 一种两触点电子烟及其认证方法
CN112773001A (zh) * 2021-01-26 2021-05-11 深圳市海派特光伏科技有限公司 雾化器功率自适应电路、芯片、控制方法及雾化装置
CN115052496A (zh) * 2020-12-21 2022-09-13 韩国烟草人参公社 气溶胶生成装置

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109315837A (zh) * 2018-09-21 2019-02-12 深圳市合元科技有限公司 一种电子烟控制方法及电子烟
CN111616411A (zh) * 2019-02-27 2020-09-04 沅圣科技股份有限公司 具有酒精测试功能的电子烟
CN109757784B (zh) * 2019-03-25 2022-03-08 天网互联科技(深圳)有限公司 一种电子烟的使用方法和注册认证方法
CN110122932A (zh) * 2019-06-10 2019-08-16 蒋双峰 一种防吸食冷凝液的雾化器及电子烟
WO2020252663A1 (zh) * 2019-06-18 2020-12-24 深圳达钿科技有限公司 一种与电子烟主体匹配的雾化器、系统及匹配方法
CN110279153B (zh) * 2019-06-20 2022-10-21 深圳市康柏特科技开发有限公司 一种烟具的抽吸过程检测方法
CN110279156A (zh) * 2019-06-27 2019-09-27 深圳雾芯科技有限公司 电子雾化器装置、电子雾化器装置主体及操作方法
WO2020258139A1 (zh) * 2019-06-27 2020-12-30 深圳雾芯科技有限公司 电子雾化器装置、电子雾化器装置主体及操作方法
EP3991585A4 (en) * 2019-06-27 2023-06-21 Shenzhen Relx Technology Co., Ltd. ELECTRONIC ATOMIZER DEVICE AND METHOD OF OPERATION
WO2020258138A1 (zh) * 2019-06-27 2020-12-30 深圳雾芯科技有限公司 电子雾化器、电子雾化器装置主体及电子雾化器装置
CN110226777A (zh) 2019-06-27 2019-09-13 深圳雾芯科技有限公司 电子雾化器、电子雾化器装置主体及电子雾化器装置
CN110279155A (zh) * 2019-06-27 2019-09-27 深圳雾芯科技有限公司 电子雾化器装置、电子雾化器装置主体及操作方法
CN110226779A (zh) * 2019-06-27 2019-09-13 深圳雾芯科技有限公司 电子雾化器及电子雾化器装置
CN110226778A (zh) * 2019-06-27 2019-09-13 深圳雾芯科技有限公司 电子雾化器、电子雾化器装置主体及电子雾化器装置
CN111227318A (zh) * 2019-12-31 2020-06-05 云南云烁科技有限公司 电子烟的控制方法、系统、移动终端和云端服务器
CN111387568A (zh) * 2020-03-26 2020-07-10 深圳市吉迩科技有限公司 烟油量提示方法和气溶胶产生装置
CN111789307B (zh) * 2020-07-03 2024-03-22 西安恩狄集成电路有限公司 一种电子烟加密认证方法、系统及电子烟
CN111972722B (zh) * 2020-08-18 2024-02-27 深圳市为美电子科技有限公司 一种电子烟的控制方法、装置、计算机设备和存储介质
CN112089097B (zh) * 2020-10-09 2024-03-15 西安稳先半导体科技有限责任公司 一种电子烟以及用于电子烟的烟弹和安全电路
CN112244360B (zh) * 2020-10-12 2023-12-22 武汉瑞纳捷半导体有限公司 电子烟烟弹的认证方法、装置及电子烟
CN113243570B (zh) * 2021-05-05 2023-04-25 深圳市美深威科技有限公司 雾化装置及其空气开机密码生成方法
CN113312606B (zh) * 2021-05-28 2023-04-28 深圳美众联科技有限公司 电子雾化装置的激活方法、装置、系统、认证端和电池杆
CN114145504B (zh) * 2021-12-30 2024-08-27 东莞市亿海电子有限公司 电子烟控制方法、装置、控制器、电子烟及可存储介质
CN115769919A (zh) * 2022-12-21 2023-03-10 深圳市百泰实业股份有限公司 一种电子烟的烟弹加密系统

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005198538A (ja) * 2004-01-14 2005-07-28 Seiko Epson Corp タバコ、ライター、シガレットホルダおよび喫煙情報提示システム
CN102017578A (zh) * 2008-05-09 2011-04-13 高通股份有限公司 用于在令牌与验证器之间进行认证的网络助手
CN105077592A (zh) * 2015-07-02 2015-11-25 北京希格玛和芯微电子技术有限公司 电子烟、烟杆、烟弹及用于烟弹的识别方法
CN105962427A (zh) * 2016-07-31 2016-09-28 王世峰 一种电子烟及其烟杆与雾化器的组合方法
CN106690422A (zh) * 2017-01-10 2017-05-24 深圳市新宜康科技有限公司 一种带记录芯片的电子烟雾化器
CN106820274A (zh) * 2017-03-22 2017-06-13 颐中(青岛)实业有限公司 可消毒灭菌、可识别雾化器的封闭式电子烟
CN107397255A (zh) * 2016-05-19 2017-11-28 上海烟草集团有限责任公司 雾化器及电子烟的雾化器信息传输方法
CN107997239A (zh) * 2017-12-13 2018-05-08 惠州市吉瑞科技有限公司深圳分公司 气溶胶发生装置及其控制方法、应用于气溶胶发生装置的微处理器
CN109315837A (zh) * 2018-09-21 2019-02-12 深圳市合元科技有限公司 一种电子烟控制方法及电子烟

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100997879B1 (ko) * 2008-03-03 2010-12-07 삼성전자주식회사 Crum 유닛, 교체가능유닛 및 이를 이용하는 화상형성장치와, 그 암호화 데이터 통신 방법
CN105939620B (zh) * 2013-10-17 2018-11-02 吉瑞高新科技股份有限公司 电子烟及其电池杆组件与雾化器组件的匹配控制方法
CN104106844B (zh) * 2014-06-23 2017-10-10 深圳麦克韦尔股份有限公司 电子烟控制器及电子烟
EP2959784B1 (en) * 2014-06-27 2019-04-03 Fontem Holdings 1 B.V. Electronic smoking device and capsule system
WO2016187111A1 (en) * 2015-05-15 2016-11-24 John Cameron Vaporizable material handling for electronic vapor device
WO2018053689A1 (zh) * 2016-09-20 2018-03-29 惠州市吉瑞科技有限公司深圳分公司 一种电子烟以及识别方法
CN107114825B (zh) * 2017-06-30 2023-11-28 上海烟草集团有限责任公司 一种用于控制电子烟的芯片及包含该芯片的电子烟

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005198538A (ja) * 2004-01-14 2005-07-28 Seiko Epson Corp タバコ、ライター、シガレットホルダおよび喫煙情報提示システム
CN102017578A (zh) * 2008-05-09 2011-04-13 高通股份有限公司 用于在令牌与验证器之间进行认证的网络助手
CN105077592A (zh) * 2015-07-02 2015-11-25 北京希格玛和芯微电子技术有限公司 电子烟、烟杆、烟弹及用于烟弹的识别方法
CN107397255A (zh) * 2016-05-19 2017-11-28 上海烟草集团有限责任公司 雾化器及电子烟的雾化器信息传输方法
CN105962427A (zh) * 2016-07-31 2016-09-28 王世峰 一种电子烟及其烟杆与雾化器的组合方法
CN106690422A (zh) * 2017-01-10 2017-05-24 深圳市新宜康科技有限公司 一种带记录芯片的电子烟雾化器
CN106820274A (zh) * 2017-03-22 2017-06-13 颐中(青岛)实业有限公司 可消毒灭菌、可识别雾化器的封闭式电子烟
CN107997239A (zh) * 2017-12-13 2018-05-08 惠州市吉瑞科技有限公司深圳分公司 气溶胶发生装置及其控制方法、应用于气溶胶发生装置的微处理器
CN109315837A (zh) * 2018-09-21 2019-02-12 深圳市合元科技有限公司 一种电子烟控制方法及电子烟

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
See also references of EP3854237A4 *
ZHANG, CHANGYOU: "Public Key Infrastructure PKI", NETWORK SECURITY ARCHITECTURE, 30 September 2006 (2006-09-30), pages 148 - 149, XP009526667, ISBN: 7-81094-597-1 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112369703A (zh) * 2020-11-23 2021-02-19 武汉瑞纳捷电子技术有限公司 一种两触点电子烟及其认证方法
CN115052496A (zh) * 2020-12-21 2022-09-13 韩国烟草人参公社 气溶胶生成装置
CN112773001A (zh) * 2021-01-26 2021-05-11 深圳市海派特光伏科技有限公司 雾化器功率自适应电路、芯片、控制方法及雾化装置

Also Published As

Publication number Publication date
EP3854237A1 (en) 2021-07-28
CN109315837A (zh) 2019-02-12
EP3854237A4 (en) 2021-11-17
US20210345682A1 (en) 2021-11-11

Similar Documents

Publication Publication Date Title
WO2020057640A1 (zh) 一种电子烟控制方法及电子烟
WO2020140676A1 (zh) 通过手机软件控制的电子烟及其控制方法
JP6599343B2 (ja) エアロゾル送達デバイスの充電アクセサリデバイス、ならびにエアロゾル送達デバイスに対話サービスを提供するための、関連するシステム、方法、装置、及びコンピュータプログラム製品
WO2021184964A1 (zh) 通过触控压力传感器控制启动和调节功率的电子烟及其控制方法
JP2019187428A (ja) 電子式吸入装置
JP2018531582A (ja) エアロゾル送達デバイスのための無線周波数識別(rfid)認証システム
JP2022543353A (ja) エアロゾル生成装置及びその制御方法
CN109068749A (zh) 电子烟装置的控制方法及使用这种方法的电子烟装置
EP3167601A1 (en) A system and related methods, apparatuses, and computer program products for controlling operation of a device based on a read request
WO2020233216A1 (zh) 雾化装置的控制方法及雾化装置、控制系统
WO2019200559A1 (zh) 一种电子烟、雾化芯、雾化器及电子烟的控制方法
WO2021197232A1 (zh) 气溶胶生成装置及其控制方法
TWI796551B (zh) 電池單元、霧氣生成裝置、資訊處理方法及認證連接控制程式
KR20220044961A (ko) 에어로졸 발생 장치의 작업을 활성화하기 위한 방법, 장치 및 컴퓨터 프로그램 제품
WO2021059377A1 (ja) バッテリユニット、情報処理方法、及びプログラム
JP2021519577A (ja) エアロゾル生成装置のアンロック方法及び装置
TW202224583A (zh) 控制方法、吸嚐裝置、終端裝置及程式
TWI788632B (zh) 電池單元、霧氣生成裝置、資訊處理方法及資訊處理程式
JP2023536828A (ja) エアロゾル発生装置を動作させる方法
TW202112257A (zh) 電池單元、霧氣產生裝置、資訊處理方法及程式
CN113519909A (zh) 气溶胶生成装置及其控制方法
WO2023157123A1 (ja) エアロゾル生成システム、制御方法、及びプログラム
CN111869929A (zh) 雾化装置的控制方法、装置、雾化设备及可读存储介质
WO2024038528A1 (ja) 吸引装置、制御方法、及びプログラム
KR20200059258A (ko) 임상 연구 제품 분배 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19862393

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019862393

Country of ref document: EP

Effective date: 20210421