Unlock instant, AI-driven research and patent intelligence for your innovation.

A password acquisition method, verification method, related device, equipment and system

An acquisition method and password technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as external attacks, affecting the popularization of smart devices, attacks, etc.

Active Publication Date: 2021-03-26
王晓华
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the currently used smart devices are connected to the network, and there is a risk of being attacked by the network. People's concerns about security have affected the popularity of smart devices to a certain extent.
In the current smart devices, the password is generally stored by the micro control unit MCU, and the micro control unit MCU has the risk of being attacked by the outside. If the MCU is attacked or illegally accessed, the password will be leaked, which will threaten the user's work or residence. Safety, bringing unnecessary troubles to users' production and life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password acquisition method, verification method, related device, equipment and system
  • A password acquisition method, verification method, related device, equipment and system
  • A password acquisition method, verification method, related device, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] An exemplary embodiment of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although the exemplary embodiments of the present disclosure are shown in the drawings, it is understood that the present disclosure can be implemented in various forms and should not be restricted herein. Instead, it is provided to provide more thoroughly understood the present disclosure, and can communicate the scope of the disclosure to those skilled in the art.

[0105] A password acquisition method, a password verification method, a related apparatus, a device, and a system of a password verification method, a related apparatus, an apparatus, and a system of the present invention will be described in detail.

[0106] Refer figure 1 As shown, the embodiment of the present invention provides a password acquisition method involving microController Unit, MCU and a safety chip, and the above methods include:

[0107] S101: Establish a secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a password obtaining method, and a related apparatus, device and system. The method comprises the steps of: establishing a safe channel with an MCU, receiving a storageand set password request through the safe channel, obtaining the set passwords stored in the set password request and performing storage of the set passwords. The problems are solved that set passwords are stored in the micro-control unit (MCU), is easy to be attacked at the outside, and the passwords are stolen. The present invention further discloses a password verification method, and an apparatus, device and system.

Description

Technical field [0001] The present invention relates to a password acquisition method, a password verification method, a related device, a device, and a system. Background technique [0002] With the development of information systems and Internet of Things technology, the equipment in daily life has achieved intelligence, such as monitoring cameras, smart door locks, etc., all network hardware and software, network hardware and software, network authentication and control, password Verification to ensure the security of intelligent equipment to prevent illegal operations of unscrupulous people. Intelligent equipment is changing people's life quality because of its convenient operation performance and advanced technical experience, bringing convenient experience. The smart device can be controlled by password access by entering the target password into the smart device. However, the currently used smart device is connected to the network, there is a risk of network attack, and pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0819H04L9/0863H04L9/0866H04L9/0869H04L9/0891H04L9/0897H04L9/3263H04L63/083H04L63/0876
Inventor 王晓华
Owner 王晓华