Generation and verification method, device, device and storage medium of device password

A device password and password technology, applied in the computer field, can solve the problem of less application scenarios, and achieve the effect of enriching types and improving applicable application scenarios.

Active Publication Date: 2021-11-09
海十联(杭州 +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the device password generated by traditional technology can only be used at a certain point in time, and it is applicable to fewer application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation and verification method, device, device and storage medium of device password
  • Generation and verification method, device, device and storage medium of device password
  • Generation and verification method, device, device and storage medium of device password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The device password generation method provided by the embodiment of this application is applied to such as figure 1 system shown. The system includes: a device password generation terminal 10 and a device password verification terminal 11 . There is no direct communication between the device password generator 10 and the device password verifier 11, and the generated device password needs to be input to the device password verifier 11 through a third party, so that the device password verifier 11 can verify the validity of the input device password. verify. Optionally, the device password generating terminal 10 may be an electronic device such as a server, a personal computer, or a wearable device, and the device password verification terminal 11 may be an electronic device requiring password verification such as a smart door lock or a smart safe. Taking the device password verification terminal 11 as an example of a smart door lock, the device password generator 10 g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to a method, device, device and storage medium for generating and verifying device passwords. The method includes: obtaining the use start time and use demand information input by the user; and generating a device password according to the use start time and the use demand information. Since the use requirement information includes the use end time or password use type, and the device password generator can generate the device password according to the use start time and usage requirement information, the device password generator can not only generate interval passwords, but also generate cycle passwords, One-time passwords, permanent passwords, and other types of passwords enrich the types of generated device passwords, and improve their applicable application scenarios compared with traditional technologies.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a device password generation and verification method, device, device and storage medium. Background technique [0002] With the continuous development of Internet of Things technology, various devices with Internet access functions emerge in an endless stream. For example, devices such as smart door locks installed in long-term rental apartments. In order to ensure the safe use of such devices, it is often necessary to generate a use password for this type of device, so that when the user uses the device, the device can verify whether the user has the use authority according to the use password entered by the user. [0003] In the traditional technology, a time-based one-time password (TOTP, Time-based One-timePassword) algorithm is usually used to generate a device usage password. Specifically, the TOTP algorithm uses a cryptographic hash function to combine the ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32G07C9/00
CPCG07C9/00174G07C9/00817H04L9/0861H04L9/3226
Inventor 周建王天才袁启勇
Owner 海十联(杭州
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products