Visitor password generation method, verification method, server and intelligent door lock

A technology of visitor password and verification method, applied in the field of visitor password generation method, verification method, server and smart door lock, can solve the problem that the visitor password cannot be determined correctly, the door cannot be opened normally, and the increase of the visitor password is intercepted or stolen. Risks and other issues to achieve the effect of improving safety

Active Publication Date: 2019-11-12
北京百佑科技有限公司
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this solution can only be realized when the smart door lock can be connected to the network and the network is unblocked. If the smart door lock is disconnected from the network, the server cannot send the visitor password to the smart door lock. At this time, even if the visitor enters The visitor password, the smart door lock cannot determine the correctness of the visitor password, and the door cannot be opened normally
In addition, even when the smart door lock can be connected to the network, since the visitor password generated each time needs to be sent to the smart door lock, the risk of the visitor password being intercepted or stolen increases, and there is a security problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visitor password generation method, verification method, server and intelligent door lock
  • Visitor password generation method, verification method, server and intelligent door lock
  • Visitor password generation method, verification method, server and intelligent door lock

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] figure 1 A schematic flowchart of a method for generating a guest password provided by the first embodiment of the present invention is shown.

[0066] The method for generating a guest password comprises the steps of:

[0067] In step S110, start time, end time, usage times and device identification are obtained.

[0068] Specifically, the guest password generation method can be applied to a server. The user terminal sends a visitor password application to the server, wherein the visitor password application includes a start time, an end time, the number of times of use and the device identification of the smart door lock that the visitor wants to open.

[0069] In step S120, a first coding operation is performed on the start time, the end time, and the number of times of use to obtain a first code.

[0070] Further, step S120 includes:

[0071] Split the start time into a start hour unit and a start year-month-day unit; split the end time into an end-hour unit and...

Embodiment 2

[0112] figure 2 A schematic flowchart of a visitor password verification method provided by the second embodiment of the present invention is shown.

[0113] The visitor password verification method can be applied to a smart door lock, and is suitable for decrypting the visitor password generation method in Embodiment 1.

[0114] The first decoding operation in this embodiment is the inverse operation corresponding to the first encoding operation in embodiment 1, the second decoding operation is the inverse operation corresponding to the second encoding operation in embodiment 1, and the third decoding operation is Corresponds to the inverse operation of the third encoding operation in Embodiment 1.

[0115] The visitor password verification method includes the following steps:

[0116] In step S210, the visitor password is subjected to a second decoding operation to obtain a first signature value and a first code.

[0117] Specifically, after the server generates the visi...

Embodiment 3

[0152] image 3 A schematic structural diagram of a device for generating a guest password provided by the third embodiment of the present invention is shown.

[0153] The visitor password generation device 300 is corresponding to the visitor password generation method in Embodiment 1, and each option in Embodiment 1 is also applicable to this embodiment.

[0154] The visitor password generation device 300 includes an acquisition module 310 , a first encoding module 320 , a first signature module 330 and a second encoding module 340 .

[0155] The acquiring module 310 is configured to acquire the start time, the end time, the number of times of use and the device identification.

[0156] The first coding module 320 is configured to perform a first coding operation on the start time, the end time, and the usage times to obtain a first code.

[0157]The first signature module 330 is configured to perform a signature operation on the first code and the device identifier to obta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a visitor password generation method, a verification method, a server and an intelligent door lock. The generation method comprises the following steps: acquiring starting time, ending time, a using frequency and an equipment identifier; performing first coding operation on the starting time, the ending time and the using frequency to obtain a first code; carrying out signature operation on the first code and the equipment identifier to obtain a first signature value; and carrying out second coding operation on the first signature value and the first code to obtain a second code, and taking the second code as a visitor password. According to the technical scheme, a series of coding operations can be carried out according to the starting time, the ending time, the using frequency and the equipment identifier to generate the unique visitor password with the timeliness.

Description

technical field [0001] The present invention relates to the technical field of password generation, in particular to a visitor password generation method, a verification method, a server and an intelligent door lock. Background technique [0002] With the comprehensive construction of the intelligent community, the application of intelligent door locks in the intelligent community is becoming more and more extensive. For visitors, the lock is usually unlocked by the visitor password. [0003] Existing visitor passwords are usually generated by the server when the smart door lock is connected to the network, and then sent to the user terminal and the smart door lock. The door lock compares the visitor password entered by the visitor with the password issued by the server, and opens the door when the two passwords are consistent. [0004] However, this solution can only be realized when the smart door lock can be connected to the network and the network is unblocked. If the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04L9/32
CPCG07C9/00571G07C9/00817G07C2009/00825H04L9/3247
Inventor 孟宪军
Owner 北京百佑科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products